03494nam 22007335 450 99646624740331620220222210638.03-642-36334-210.1007/978-3-642-36334-4(CKB)3520000000003532(SSID)ssj0000880052(PQKBManifestationID)11456386(PQKBTitleCode)TC0000880052(PQKBWorkID)10895197(PQKB)11480032(DE-He213)978-3-642-36334-4(MiAaPQ)EBC3093045(PPN)168330032(EXLCZ)99352000000000353220130131d2013 u| 0engurnn#008mamaatxtccrPairing-Based Cryptography -- Pairing 2012[electronic resource] 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers /edited by Michel Abdalla, Tanja Lange1st ed. 2013.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2013.1 online resource (XVI, 333 p. 18 illus.)Security and Cryptology ;7708Bibliographic Level Mode of Issuance: Monograph3-642-36333-4 Includes bibliographical references and author index.This book constitutes the refereed proceedings of the 5th International Conference on Pairing-Based Cryptography, Pairing 2012, held in Cologne, Germany, in May 2012. The 17 full papers for presentation at the academic track and 3 full papers for presentation at the industrial track were carefully reviewed and selected from 49 submissions. These papers are presented together with 6 invited talks. The contributions are organized in topical sections on: algorithms for pairing computation, security models for encryption, functional encryption, implementations in hardware and software, industry track, properties of pairings, and signature schemes and applications.Security and Cryptology ;7708Data encryption (Computer science)Computer securityCoding theoryInformation theoryAlgorithmsCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Coding and Information Theoryhttps://scigraph.springernature.com/ontologies/product-market-codes/I15041Algorithm Analysis and Problem Complexityhttps://scigraph.springernature.com/ontologies/product-market-codes/I16021Conference proceedings.fastData encryption (Computer science).Computer security.Coding theory.Information theory.Algorithms.Cryptology.Systems and Data Security.Coding and Information Theory.Algorithm Analysis and Problem Complexity.005.8/2Abdalla Micheledthttp://id.loc.gov/vocabulary/relators/edtLange Tanjaedthttp://id.loc.gov/vocabulary/relators/edtMiAaPQMiAaPQMiAaPQBOOK996466247403316Pairing-Based Cryptography -- Pairing 20122593587UNISA