04147oam 2200613I 450 991095781530332120251117112154.01-315-35314-81-315-37017-41-4987-2951-710.1201/9781315370170 (CKB)4100000005387985(Au-PeEL)EBL5475691(CaPaEBR)ebr11595623(OCoLC)967412336(MiAaPQ)EBC5475691(FINmELB)ELB141869(BIP)67578431(BIP)54557422(EXLCZ)99410000000538798520180706h20172017 uy 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierGuide to pairing-based cryptography /Nadia El Mrabet, SAS, Ecole des Mines de Saint Etienne, Gardanne, France, Marc Joye, NXP Semiconductors, San Jose, USA1st ed.Boca Raton :CRC Press,[2017]©20171 online resource (32 pages)Chapman & Hall/CRC cryptography and network security issues1-4987-2950-9 Includes bibliographical references and index.1. Pairing-based cryptography / Sebastien Canard and Jacques Traore? -- 2. Mathematical background / Jean-Luc Beuchat, Nadia El Mrabet, Laura Fuentes-Casta/eda, and Francisco Rodriguez-Henriquez -- 3. Pairings / Sorina Ionica and Damien Robert -- 4. Pairing-friendly elliptic curves / Safia Haloui and Edlyn Teske -- 5. Arithmetic of finite fields / Jean Luc Beuchat, Luis J. Dominguez Perez, Sylvain Duquesne, Nadia El Mrabet, Laura Fuentes-Casta/eda, and Francisco Rodriguez-Henriquez -- 6. Scalar multiplication and exponentiation in pairing groups / Joppe Bos, Craig Costello, and Michael Naehrig -- 7. Final exponentiation / Jean-Luc Beuchat, Luis J. Dominguez Perez, Laura Fuentes-Castaneda, and Francsico Rodriguez-Henriquez -- 8. Hashing into elliptic curves / Eduardo Ochoa-Jimenez, Francisco Rodriguez-Henriquez, and Mehdi Tibouchi -- 9. Discrete logarithms / Aurore Guillevic and Francois Morain -- 10. Choosing parameters / Sylvain Duquesne, Nadia El Mrabet, Safia Haloui, Damien Robert, and Franck Rondepierre -- 11. Software implementation / Diego F. Aranha, Luis J. Dominguez Perez, Amine Mrabet, and Peter Schwabe -- 12. Physical attacks / Nadia El Mrabet, Louis Goubin, Sylvain Guilley, Jacques Fournier, Damien Jauvart, Martin Moreau, Pablo Rauzy, and Franck Rondepierre.This book is devoted to efficient pairing computations and implementations, useful tools for cryptographers working on topics like identity-based cryptography and the simplification of existing protocols like signature schemes. As well as exploring the basic mathematical background of finite fields and elliptic curves, Guide to Pairing-Based Cryptography offers an overview of the most recent developments in optimizations for pairing implementation. Each chapter includes a presentation of the problem it discusses, the mathematical formulation, a discussion of implementation issues, solutions accompanied by code or pseudocode, several numerical results, and references to further reading and notes. Intended as a self-contained handbook, this book is an invaluable resource for computer scientists, applied mathematicians and security professionals interested in cryptography.Chapman & Hall/CRC cryptography and network security.Curves, EllipticCryptographySets of pairs of functions to be distinguishedData encryption (Computer science)MathematicsCurves, Elliptic.Cryptography.Sets of pairs of functions to be distinguished.Data encryption (Computer science)Mathematics.005.8/2El Mrabet Nadia1172462Joye Marc1969-FlBoTFGFlBoTFGBOOK9910957815303321Guide to pairing-based cryptography4471590UNINA01304nam 22003853 450 991104906720332120260104090358.03-032-10036-4(MiAaPQ)EBC32470056(Au-PeEL)EBL32470056(CKB)44768762500041(EXLCZ)994476876250004120260104d2025 uy 0engurcnu||||||||txtrdacontentcrdamediacrrdacarrierHuman Biomonitoring II Levels and Toxicokinetics of Environmental and Industrial Chemicals in Blood, Urine and Breast Milk1st ed.Cham :Springer,2025.©2026.1 online resource (627 pages)Chemistry and Materials Science Series3-032-10035-6 This book explores human biomonitoring (HBM) as a method to evaluate chemical exposure and its related health effects, with a specific focus on environmental and industrial chemicals.Chemistry and Materials Science SeriesFromme Hermann1434956MiAaPQMiAaPQMiAaPQBOOK9911049067203321Human Biomonitoring II4522147UNINA