Be the first to like this
Presentation for Information Security PhD students, 2003.
Short survey on how something that was first used to attack elliptic curve cryptography protocols gave birth to a popular new area, Identity-based cryptography.
(Note: since then, the open problem referred as been solved by Barreto/Naerigh and Freeman)
Clipping is a handy way to collect important slides you want to go back to later.