IEEE - Institute of Electrical and Electronics Engineers, Inc. - P1363.3/D8, Apr 2013

IEEE Approved Draft Standard for Identity-Based Cryptographic Techniques using Pairings

inactive
Buy Now
Organization: IEEE - Institute of Electrical and Electronics Engineers, Inc.
Publication Date: 27 August 2013
Status: inactive
Page(s): 1 - 136
ICS Code (Information coding): 35.040
ISBN (Online): 978-0-7381-8402-9
Standard:

This standard specifies common identity-based public-key cryptographic techniques that use pairings, including mathematical primitives for secret value (key) derivation, public-key encryption, and... View More

Document History

November 15, 2013
IEEE Standard for Identity-Based Cryptographic Techniques using Pairings
Common identity-based public-key cryptographic techniques that use pairings, including mathematical primitives for secret value (key) derivation, public-key encryption, and digital signatures, as...
November 15, 2013
IEEE Standard for Identity-Based Cryptographic Techniques using Pairings
Common identity-based public-key cryptographic techniques that use pairings, including mathematical primitives for secret value (key) derivation, public-key encryption, and digital signatures, as...
P1363.3/D8, Apr 2013
August 27, 2013
IEEE Approved Draft Standard for Identity-Based Cryptographic Techniques using Pairings
This standard specifies common identity-based public-key cryptographic techniques that use pairings, including mathematical primitives for secret value (key) derivation, public-key encryption, and...
April 26, 2013
IEEE Draft Standard for Identity-Based Cryptographic Techniques using Pairings
This standard specifies common identity-based public-key cryptographic techniques that use pairings, including mathematical primitives for secret value (key) derivation, public-key encryption, and...
December 15, 2011
IEEE Draft Standard for Identity-Based Cryptographic Techniques using Pairings
This standard specifies common identity-based public-key cryptographic techniques that use pairings, including mathematical primitives for secret value (key) derivation, public-key encryption, and...
Advertisement