2007
DOI: 10.1007/978-3-540-73489-5
|View full text |Cite
|
Sign up to set email alerts
|

Pairing-Based Cryptography – Pairing 2007

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2014
2014
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 12 publications
(1 citation statement)
references
References 0 publications
0
1
0
Order By: Relevance
“…Consequences of the above are given in [48], notably i 2 = 2m + 2s 1 + i 1 and i 3 = 9m + 3s 1 + i 1 , neglecting additions. Recursive application yields i k for k = 2, 3, 4, 6, 8, 12, 16.…”
Section: Pairing Costmentioning
confidence: 99%
“…Consequences of the above are given in [48], notably i 2 = 2m + 2s 1 + i 1 and i 3 = 9m + 3s 1 + i 1 , neglecting additions. Recursive application yields i k for k = 2, 3, 4, 6, 8, 12, 16.…”
Section: Pairing Costmentioning
confidence: 99%