Abstract is missing.
- Pairings in Trusted ComputingLiqun Chen, Paul Morrissey, Nigel P. Smart. 1-17 [doi]
- Pairing LatticesFlorian Hess. 18-38 [doi]
- The Uber-Assumption FamilyXavier Boyen. 39-56 [doi]
- Homomorphic Encryption and Signatures from Vector DecompositionTatsuaki Okamoto, Katsuyuki Takashima. 57-74 [doi]
- Hidden-Vector Encryption with Groups of Prime OrderVincenzo Iovino, Giuseppe Persiano. 75-88 [doi]
- The Hidden Root ProblemFrederik Vercauteren. 89-99 [doi]
- Evaluating Large Degree Isogenies and Applications to Pairing Based CryptographyReinier Bröker, Denis Xavier Charles, Kristin Lauter. 100-112 [doi]
- Computing the Cassels Pairing on Kolyvagin Classes in the Shafarevich-Tate GroupKirsten Eisenträger, Dimitar Jetchev, Kristin Lauter. 113-125 [doi]
- Constructing Brezing-Weng Pairing-Friendly Elliptic Curves Using Elements in the Cyclotomic FieldEzekiel J. Kachisa, Edward F. Schaefer, Michael Scott. 126-135 [doi]
- Constructing Pairing-Friendly Elliptic Curves Using Factorization of Cyclotomic PolynomialsSatoru Tanaka, Ken Nakamula. 136-145 [doi]
- A Generalized Brezing-Weng Algorithm for Constructing Pairing-Friendly Ordinary Abelian VarietiesDavid Freeman. 146-163 [doi]
- Pairing-Friendly Hyperelliptic Curves with Ordinary Jacobians of Type y:::2:::=x:::5:::axMitsuru Kawazoe, Tetsuya Takahashi. 164-177 [doi]
- Integer Variable chi-Based Ate PairingYasuyuki Nogami, Masataka Akane, Yumi Sakemi, Hidehiro Katou, Yoshitaka Morikawa. 178-191 [doi]
- Pairing Computation on Twisted Edwards Form Elliptic CurvesM. Prem Laxman Das, Palash Sarkar. 192-210 [doi]
- Exponentiation in Pairing-Friendly Groups Using HomomorphismsSteven D. Galbraith, Michael Scott. 211-224 [doi]
- Generators for the l-Torsion Subgroup of Jacobians of Genus Two CurvesChristian Robenhagen Ravnshøj. 225-242 [doi]
- Speeding Up Pairing Computations on Genus 2 Hyperelliptic Curves with Efficiently Computable AutomorphismsXinxin Fan, Guang Gong, David Jao. 243-264 [doi]
- Pairings on Hyperelliptic Curves with a Real ModelSteven D. Galbraith, Xibin Lin, David J. Mireles Morales. 265-281 [doi]
- Faster Implementation of eta-T Pairing over GF(3:::m:::) Using Minimum Number of Logical Instructions for GF(3)-AdditionYuto Kawahara, Kazumaro Aoki, Tsuyoshi Takagi. 282-296 [doi]
- A Comparison between Hardware Accelerators for the Modified Tate Pairing over F::2:::m::::: and F::3:::m:::::Jean-Luc Beuchat, Nicolas Brisebarre, Jérémie Detrey, Eiji Okamoto, Francisco Rodríguez-Henríquez. 297-315 [doi]
- One-Round ID-Based Blind Signature Scheme without ROS AssumptionWei Gao, Guilin Wang, Xueli Wang, Fei Li. 316-331 [doi]
- Tracing Malicious Proxies in Proxy Re-encryptionBenoît Libert, Damien Vergnaud. 332-353 [doi]
- Security and Anonymity of Identity-Based Encryption with Multiple Trusted AuthoritiesKenneth G. Paterson, Sriramkrishnan Srinivasan. 354-375 [doi]