In cryptography, the Pointcheval–Stern signature algorithm is a digital signature scheme based on the closely related ElGamal signature scheme. It… (More)

Semantic Scholar uses AI to extract papers important to this topic.

2016

2016

- Yi Ni
- 2016

Suppose that X is a torus bundle over a closed surface with homologically essential fibers. LetXK be the manifold obtained by… (More)

Is this relevant?

2013

2013

Password-authenticated key exchange (PAKE) protocols allow two players to agree on a shared high entropy secret key, that depends… (More)

Is this relevant?

2011

2011

- Jean-Sébastien Coron, Aline Gouget, Thomas Icart, Pascal Paillier
- Cryptography and Security
- 2011

We describe and analyze the password-based key establishment protocol PACE v2 Integrated Mapping (IM), an evolution of PACE v1… (More)

Is this relevant?

2009

2009

- Julien Bringer, Hervé Chabanne, Thomas Icart
- IACR Cryptology ePrint Archive
- 2009

We here describe a new Password-based Authenticated Key Exchange (PAKE) protocol based on elliptic curve cryptography. We prove… (More)

Is this relevant?

2008

2008

- Jinyue Xia, Jiandong Wang, Liming Fang, Yongjun Ren, Shizhu Bian
- IACR Cryptology ePrint Archive
- 2008

other Proof Models for Key Agreement Protocols Xia Jinyue, Wang Jiandong, Fang Liming, Ren Yongjun, Bian Shizhu ( College of… (More)

Is this relevant?

2006

2006

The Bresson-Chevassut-Pointcheval (BCP) model is a formalism for the analysis of authenticated group key exchange protocols. Also… (More)

Is this relevant?

Highly Cited

2005

Highly Cited

2005

- Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock
- ASIACRYPT
- 2005

We examine various indistinguishability-based proof models for key establishment protocols, namely the Bellare & Rogaway (1993… (More)

Is this relevant?

Highly Cited

2005

Highly Cited

2005

- Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock
- ASIACRYPT
- 2005

Proofs are invaluable tools in assuring protocol implementers about the security properties of protocols. However, several… (More)

Is this relevant?

2005

2005

Despite the importance of proofs in assuring protocol implementers about the security properties of key establishment protocols… (More)

Is this relevant?

Review

1982

Review

1982

- Richard A. Upton, Satish K. Tripathi
- Perform. Eval.
- 1982

An approach, based on recent work by Stern [56], is de~t:ribed for obtaining the approximate tiansient behavior of both the M / M… (More)

Is this relevant?