Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,298 papers from all fields of science
Search
Sign In
Create Free Account
Pointcheval–Stern signature algorithm
Known as:
Pointcheval-Stern signature algorithm
In cryptography, the Pointcheval–Stern signature algorithm is a digital signature scheme based on the closely related ElGamal signature scheme. It…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
4 relations
Cryptography
Digital signature
Forking lemma
Broader (1)
Public-key cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2017
2017
A New Efficient Leakage-Free Certificateless Signature
Z. Gao
,
Liang Hu
,
Hongtu Li
2017
Corpus ID: 55539986
Digital signature, a cryptographic algorithm, provides integrity, authentication and non repudiation messages.In the literature…
Expand
2015
2015
Fintushel–Stern knot surgery in torus bundles
Yi Ni
2015
Corpus ID: 39744274
Suppose that X is a torus bundle over a closed surface with homologically essential fibers. Let XK be the manifold obtained by…
Expand
2013
2013
Hurwitz-type bound, knot surgery, and smooth $\s^1$-four-manifolds
Weimin Chen
2013
Corpus ID: 119138832
In this paper we prove several related results concerning smooth $\Z_p$ or $\s^1$ actions on 4-manifolds. We show that there…
Expand
2011
2011
A broadcast signcryption protocol for ad hoc networks
Xiaoming Wang
,
Guoqing Yao
,
Zhiwei Liao
Wuhan University Journal of Natural Sciences
2011
Corpus ID: 23297845
Many previous broadcast encryption schemes can only guarantee confidentiality but cannot verify integrity and authenticity for…
Expand
2010
2010
Password Based Key Exchange Protocols on Elliptic Curves Which Conceal the Public Parameters
Julien Bringer
,
H. Chabanne
,
T. Icart
International Conference on Applied Cryptography…
2010
Corpus ID: 425076
We here describe a new Password-based Authenticated Key Exchange (PAKE) protocol based on elliptic curve cryptography. We prove…
Expand
2009
2009
Password Based Key Exchange with Hidden Elliptic Curve Public Parameters
Julien Bringer
,
H. Chabanne
,
T. Icart
IACR Cryptology ePrint Archive
2009
Corpus ID: 16470786
We here describe a new Password-based Authenticated Key Exchange (PAKE) protocol based on elliptic curve cryptography. We prove…
Expand
2008
2008
Formal Proof of Relative Strengths of Security between ECK2007 Model and other Proof Models for Key Agreement Protocols
Jinyue Xia
,
Jiandong Wang
,
Liming Fang
,
Yongjun Ren
,
Shizhu Bian
IACR Cryptology ePrint Archive
2008
Corpus ID: 18884746
other Proof Models for Key Agreement Protocols Xia Jinyue, Wang Jiandong, Fang Liming, Ren Yongjun, Bian Shizhu ( College of…
Expand
2006
2006
Security Extension for Bresson-Chevassut-Pointcheval's model
C. Cao
,
Jianfeng Ma
,
S. Moon
2006
Corpus ID: 18629357
Summary The Bresson-Chevassut-Pointcheval (BCP) model is a formalism for the analysis of authenticated group key exchange…
Expand
2005
2005
The Importance of Proofs of Security for Key Establishment Protocols : Formal Analysis
Kim-Kwang Raymond Choo
,
C. Boyd
,
Yvonne Hitchcock
2005
Corpus ID: 15115893
Despite the importance of proofs in assuring protocol implementers about the security properties of key establishment protocols…
Expand
Review
1982
Review
1982
An approximate transient analysis of the M(t)/M/1 queue
R. Upton
,
S. Tripathi
Performance evaluation (Print)
1982
Corpus ID: 33231375
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE