<--- Back to Details
First PageDocument Content
Cryptography / Finite fields / Computational hardness assumptions / Password-authenticated key agreement / Password Authenticated Key Exchange by Juggling / SPEKE / DiffieHellman problem / Zero-knowledge proof / XTR / Digital signature / Proof of knowledge
Date: 2015-03-20 08:39:27
Cryptography
Finite fields
Computational hardness assumptions
Password-authenticated key agreement
Password Authenticated Key Exchange by Juggling
SPEKE
DiffieHellman problem
Zero-knowledge proof
XTR
Digital signature
Proof of knowledge

Security of the J-PAKE Password-Authenticated Key Exchange Protocol Michel Abdalla Fabrice Benhamouda

Add to Reading List

Source URL: www.normalesup.org

Download Document from Source Website

File Size: 457,80 KB

Share Document on Facebook

Similar Documents

ZKProof Charter Boston, May 10th and 11th 2018 The goal of the ZKProof Standardardization effort is to advance the use of Zero Knowledge Proof technology by bringing together experts from industry and academia. To furthe

ZKProof Charter Boston, May 10th and 11th 2018 The goal of the ZKProof Standardardization effort is to advance the use of Zero Knowledge Proof technology by bringing together experts from industry and academia. To furthe

DocID: 1xVl8 - View Document

Merchant Security System Upgrade Guide Click HERE for information on SHA-256 compliance. Future-Proof Your Integration Global security threats are constantly changing, and the security of our merchants continues to be ou

Merchant Security System Upgrade Guide Click HERE for information on SHA-256 compliance. Future-Proof Your Integration Global security threats are constantly changing, and the security of our merchants continues to be ou

DocID: 1t7t6 - View Document

Computational Soundness of (Interactive) Zero-Knowledge Proof Systems in the Presence of Active Adversaries Yusuke Kawamoto1 (Jointly with Gergei Bana2 and Hideki Sakurada3) 1

Computational Soundness of (Interactive) Zero-Knowledge Proof Systems in the Presence of Active Adversaries Yusuke Kawamoto1 (Jointly with Gergei Bana2 and Hideki Sakurada3) 1

DocID: 1sZcs - View Document

3 DecemberRecommendation on Optimised Proof of Concept Support in the Transfer of Knowledge  Background

3 DecemberRecommendation on Optimised Proof of Concept Support in the Transfer of Knowledge Background

DocID: 1sE3o - View Document

Rubric for Grading Student Solutions Katherine E. Stange In a proof, we seek: 1. First, a complete and correct logical proof of the assertion. 2. Second, a readable exposition.

Rubric for Grading Student Solutions Katherine E. Stange In a proof, we seek: 1. First, a complete and correct logical proof of the assertion. 2. Second, a readable exposition.

DocID: 1rlOE - View Document