173:
36:
89:
60:
48:
22:
113:
72:
77:
118:
17:
154:
167:
142:
130:
101:
35:
The following 11 pages are in this category, out of 11 total.
32:Pages in category "Pairing-based cryptography"
8:
37:This list may not reflect recent changes
7:
41:
29:
14:
1:
190:
90:Decision Linear assumption
61:Attribute-based encryption
49:Pairing-based cryptography
23:Pairing-based cryptography
16:The main article for this
15:
174:Public-key cryptography
114:Sakai–Kasahara scheme
78:BLS digital signature
73:Boneh–Franklin scheme
181:
119:Sub-group hiding
189:
188:
184:
183:
182:
180:
179:
178:
164:
163:
162:
161:
160:
159:
147:
135:
123:
106:
94:
82:
65:
53:
28:
27:
12:
11:
5:
187:
185:
177:
176:
166:
165:
158:
157:
155:XDH assumption
151:
148:
146:
145:
139:
136:
134:
133:
127:
124:
122:
121:
116:
110:
107:
105:
104:
98:
95:
93:
92:
86:
83:
81:
80:
75:
69:
66:
64:
63:
57:
54:
52:
51:
45:
43:
42:
33:
30:
13:
10:
9:
6:
4:
3:
2:
186:
175:
172:
171:
169:
156:
153:
152:
149:
144:
141:
140:
137:
132:
129:
128:
125:
120:
117:
115:
112:
111:
108:
103:
100:
99:
96:
91:
88:
87:
84:
79:
76:
74:
71:
70:
67:
62:
59:
58:
55:
50:
47:
46:
44:
40:
38:
31:
25:
24:
19:
143:Weil pairing
131:Tate pairing
34:
21:
168:Category
18:category
102:Pairing
20:is
170::
39:.
150:X
138:W
126:T
109:S
97:P
85:D
68:B
56:A
26:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.