Identity-based cryptography - Info and Reading Options
By Marc Joye and Gregory Neven

"Identity-based cryptography" was published by IOS Press in 2009 - Amsterdam, The Netherlands, it has 263 pages and the language of the book is English.
“Identity-based cryptography” Metadata:
- Title: Identity-based cryptography
- Authors: Marc JoyeGregory Neven
- Language: English
- Number of Pages: 263
- Publisher: IOS Press
- Publish Date: 2009
- Publish Location: Amsterdam, The Netherlands
“Identity-based cryptography” Subjects and Themes:
- Subjects: ➤ Data encryption (Computer science) - Public key cryptography - Identification - Computer networks - Security measures
Edition Specifications:
- Pagination: viii, 263 p. :
Edition Identifiers:
- The Open Library ID: OL24012970M - OL18622860W
- Online Computer Library Center (OCLC) ID: 290492556
- Library of Congress Control Number (LCCN): 2008940895
- ISBN-13: 9781586039479
- ISBN-10: 1586039474
- All ISBNs: 1586039474 - 9781586039479
AI-generated Review of “Identity-based cryptography”:
"Identity-based cryptography" Table Of Contents:
- 1- Introduction to identity-based cryptography / Antoine Joux
- 2- Pairings on elliptic curves / Frederik Vercauteren
- 3- Identity-based signatures / Eike Kiltz, Gregory Neven
- 4- Identity-based encryption and hierarchical identity-based encryption / Sanjit Chatterjee, Palash Sarkar
- 5- Flexible IBE and beyond in the commutative-blinding framework / Xavier Boyen
- 6- Generalized IBE in the exponent-inversion framework / Xavier Boyen
- 7- Forward-secure hierarchical IBE with applications to broadcast encryption / Danfeng (Daphne) Yao ... [et al.]
- 8- Identity-based identification and signature schemes using error correcting codes / Pierre-Louis Cayrel, Philippe Gaborit, Marc Girault
- 9- Certificateless encryption / Sherman S. M. Chow
- 10- Attribute-based encryption / Amit Sahai, Brent Waters, Steve Lu
- 11- On generic groups and related bilinear problems / David Lubicz, Thomas Sirvent
- 12- Software implementation of pairings / Darrel Hankerson, Alfred Menezes, Michael Scott
- 13- Hardware implementation of pairings / Maurice Keller ... [et al.]
- 14- Implementation attacks & countermeasures / Claire Whelan ... [et al.].
Read “Identity-based cryptography”:
Read “Identity-based cryptography” by choosing from the options below.
Search for “Identity-based cryptography” downloads:
Visit our Downloads Search page to see if downloads are available.
Borrow "Identity-based cryptography" Online:
Check on the availability of online borrowing. Please note that online borrowing has copyright-based limitations and that the quality of ebooks may vary.
- Is Online Borrowing Available: Yes
- Preview Status: borrow
- Check if available: The Open Library & The Internet Archive
Find “Identity-based cryptography” in Libraries Near You:
Read or borrow “Identity-based cryptography” from your local library.
- The WorldCat Libraries Catalog: Find a copy of “Identity-based cryptography” at a library near you.
Buy “Identity-based cryptography” online:
Shop for “Identity-based cryptography” on popular online marketplaces.
- Ebay: New and used books.