Pointcheval–Stern signature algorithm

Known as: Pointcheval-Stern signature algorithm 
In cryptography, the Pointcheval–Stern signature algorithm is a digital signature scheme based on the closely related ElGamal signature scheme. It… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1982-2016
012319822016

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Suppose that X is a torus bundle over a closed surface with homologically essential fibers. LetXK be the manifold obtained by… (More)
Is this relevant?
2013
2013
Password-authenticated key exchange (PAKE) protocols allow two players to agree on a shared high entropy secret key, that depends… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
2011
2011
We describe and analyze the password-based key establishment protocol PACE v2 Integrated Mapping (IM), an evolution of PACE v1… (More)
Is this relevant?
2009
2009
We here describe a new Password-based Authenticated Key Exchange (PAKE) protocol based on elliptic curve cryptography. We prove… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2008
2008
other Proof Models for Key Agreement Protocols Xia Jinyue, Wang Jiandong, Fang Liming, Ren Yongjun, Bian Shizhu ( College of… (More)
  • figure 1
  • table 3
Is this relevant?
2006
2006
The Bresson-Chevassut-Pointcheval (BCP) model is a formalism for the analysis of authenticated group key exchange protocols. Also… (More)
Is this relevant?
Highly Cited
2005
Highly Cited
2005
We examine various indistinguishability-based proof models for key establishment protocols, namely the Bellare & Rogaway (1993… (More)
  • table 1
  • figure 1
  • figure 2
  • table 2
  • table 3
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Proofs are invaluable tools in assuring protocol implementers about the security properties of protocols. However, several… (More)
  • table 1
  • table 2
  • figure 1
  • figure 2
  • table 3
Is this relevant?
2005
2005
Despite the importance of proofs in assuring protocol implementers about the security properties of key establishment protocols… (More)
  • figure 1
  • figure 2
  • table 2
  • figure 5
  • figure 4
Is this relevant?
Review
1982
Review
1982
An approach, based on recent work by Stern [56], is de~t:ribed for obtaining the approximate tiansient behavior of both the M / M… (More)
  • table 2.2
  • figure 3
  • figure 3.2
  • figure 3.3
  • table 3.2
Is this relevant?