<--- Back to Details
First PageDocument Content
Cryptography / Finite fields / Computational hardness assumptions / Password-authenticated key agreement / Password Authenticated Key Exchange by Juggling / SPEKE / DiffieHellman problem / Zero-knowledge proof / XTR / Digital signature / Proof of knowledge
Date: 2015-03-20 08:39:27
Cryptography
Finite fields
Computational hardness assumptions
Password-authenticated key agreement
Password Authenticated Key Exchange by Juggling
SPEKE
DiffieHellman problem
Zero-knowledge proof
XTR
Digital signature
Proof of knowledge

Security of the J-PAKE Password-Authenticated Key Exchange Protocol Michel Abdalla Fabrice Benhamouda

Add to Reading List

Source URL: www.normalesup.org

Download Document from Source Website

File Size: 457,80 KB

Share Document on Facebook

Similar Documents

The SPEKE Protocol Revisited Feng Hao, Siamak F. Shahandashti Newcastle University, UK {feng.hao, siamak.shahandashti}@ncl.ac.uk  Abstract. The SPEKE protocol is commonly considered one of the classic Password Authentica

The SPEKE Protocol Revisited Feng Hao, Siamak F. Shahandashti Newcastle University, UK {feng.hao, siamak.shahandashti}@ncl.ac.uk Abstract. The SPEKE protocol is commonly considered one of the classic Password Authentica

DocID: 1u0wr - View Document

Preface  Whoso shal telle a tale after a man, He moot reherce as ny as evere he kan Everich a word, if it be in his charge, Al speke he never so rudeliche and large,

Preface Whoso shal telle a tale after a man, He moot reherce as ny as evere he kan Everich a word, if it be in his charge, Al speke he never so rudeliche and large,

DocID: 1tQtz - View Document

North West Axcis Education Recruitment Business Frist Block A 25 Goodlass Road Speke

North West Axcis Education Recruitment Business Frist Block A 25 Goodlass Road Speke

DocID: 1tgj2 - View Document

Algorithm and Implementation Optimisation of Cryptographic Computation over Elliptic Curves (F2m ) Jean-Marc ROBERT Team DALI/LIRMM, University of Perpignan, France  Perpignan, the 30th of may 2012

Algorithm and Implementation Optimisation of Cryptographic Computation over Elliptic Curves (F2m ) Jean-Marc ROBERT Team DALI/LIRMM, University of Perpignan, France Perpignan, the 30th of may 2012

DocID: 1r4wa - View Document

HILLSON PRAGA Imported specimen 107 Praga E.114 OK-PGC. Regd G-ADXL (CofRto F Hills & Son Ltd; dd Speke to BartonCofV 91 issued wefDdto Harold Leslie Brook; flown by him

HILLSON PRAGA Imported specimen 107 Praga E.114 OK-PGC. Regd G-ADXL (CofRto F Hills & Son Ltd; dd Speke to BartonCofV 91 issued wefDdto Harold Leslie Brook; flown by him

DocID: 1qji3 - View Document