Abstract is missing.
- Bilinear Groups of Composite OrderDan Boneh. 1 [doi]
- Public Key Encryption with Conjunctive Keyword Search and Its Extension to a Multi-user SystemYong Ho Hwang, Pil Joong Lee. 2-22 [doi]
- Practical Time Capsule Signatures in the Standard Model from Bilinear MapsBenoît Libert, Jean-Jacques Quisquater. 23-38 [doi]
- Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption KeysCécile Delerablée, Pascal Paillier, David Pointcheval. 39-59 [doi]
- Certificateless Public Key Encryption in the Selective-ID Security Model (Without Random Oracles)Jong Hwan Park, Kyu Young Choi, Jung Yeon Hwang, Dong-Hoon Lee. 60-82 [doi]
- General and Efficient Certificateless Public Key Encryption ConstructionsZhaohui Cheng, Liqun Chen, Li Ling, Richard Comley. 83-107 [doi]
- Hyperelliptic PairingsSteven D. Galbraith, Florian Hess, Frederik Vercauteren. 108-131 [doi]
- Zeta Function and Cryptographic Exponent of Supersingular Curves of Genus 2Gabriel Cardona, Enric Nart. 132-151 [doi]
- Constructing Pairing-Friendly Genus 2 Curves with Ordinary JacobiansDavid Freeman. 152-176 [doi]
- Implementing Cryptographic Pairings over Barreto-Naehrig CurvesAugusto Jun Devegili, Michael Scott, Ricardo Dahab. 197-207 [doi]
- Instruction Set Extensions for Pairing-Based CryptographyTobias Vejda, Dan Page, Johann Großschädl. 208-224 [doi]
- The Importance of the Final Exponentiation in Pairings When Considering Fault AttacksClaire Whelan, Michael Scott. 225-246 [doi]
- Proxy Re-encryption Systems for Identity-Based EncryptionToshihiko Matsuo. 247-267 [doi]
- Fair Blind Signatures RevisitedEmeline Hufschmitt, Jacques Traoré. 268-292 [doi]
- Supersingular Elliptic Curves in CryptographyAlfred Menezes. 293 [doi]
- On the Minimal Embedding FieldLaura Hitt. 294-301 [doi]
- Remarks on Cheon s Algorithms for Pairing-Related ProblemsShunji Kozaki, Taketeru Kutsuma, Kazuto Matsuo. 302-316 [doi]
- On Pairing Inversion ProblemsTakakazu Satoh. 317-328 [doi]
- The Tate Pairing Via Elliptic NetsKatherine E. Stange. 329-348 [doi]
- Eta Pairing Computation on General Divisors over Hyperelliptic Curves y:::2::: = x:::7:::-x+/-1Eunjeong Lee, Hyang-Sook Lee, Yoonjin Lee. 349-366 [doi]
- Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature LengthXinyi Huang, Yi Mu, Willy Susilo, Wei Wu. 367-391 [doi]
- Identity-Based Encryption: How to Decrypt Multiple Ciphertexts Using a Single Decryption KeyFuchun Guo, Yi Mu, Zhide Chen. 392-406 [doi]