<--- Back to Details
First PageDocument Content
Cryptography / Cryptographic protocols / Finite fields / Public-key cryptography / YAK / Elliptic curve cryptography / Password Authenticated Key Exchange by Juggling / Schnorr signature / Zero-knowledge proof / Elliptic-curve cryptography / XTR / IP
Date: 2018-05-27 06:18:56
Cryptography
Cryptographic protocols
Finite fields
Public-key cryptography
YAK
Elliptic curve cryptography
Password Authenticated Key Exchange by Juggling
Schnorr signature
Zero-knowledge proof
Elliptic-curve cryptography
XTR
IP

RFCSchnorr Non-interactive Zero-Knowledge Proof

Add to Reading List

Source URL: tools.ietf.org

Download Document from Source Website

File Size: 44,36 KB

Share Document on Facebook

Similar Documents

Thread Commissioning white paper

Thread Commissioning white paper

DocID: 1qcLY - View Document

Security of the J-PAKE Password-Authenticated Key Exchange Protocol Michel Abdalla Fabrice Benhamouda

Security of the J-PAKE Password-Authenticated Key Exchange Protocol Michel Abdalla Fabrice Benhamouda

DocID: 1mJoe - View Document

Oblivious PAKE: Efficient Handling of Password Trials F. Kiefer, M. Manulis

Oblivious PAKE: Efficient Handling of Password Trials F. Kiefer, M. Manulis

DocID: 1lVIi - View Document

LOGO_SECURITYANDTRUSTE_RUSH_36

LOGO_SECURITYANDTRUSTE_RUSH_36

DocID: 1kRAd - View Document

A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol ? SeongHan Shin1 , Kazukuni Kobara1 , and Hideki Imai2,1 1  Research Center for Information Security (RCIS),

A Secure Threshold Anonymous Password-Authenticated Key Exchange Protocol ? SeongHan Shin1 , Kazukuni Kobara1 , and Hideki Imai2,1 1 Research Center for Information Security (RCIS),

DocID: 13gC6 - View Document