Back to Results
First PageMeta Content
Cryptographic hash functions / Password-authenticated key agreement / One-way function / Password / Trapdoor function / RSA / Zero-knowledge proof / Random oracle / Isomorphism / Cryptography / Cryptographic protocols / Public-key cryptography


LNCS 3152 - <Emphasis FontCategory="SansSerif" Type="Bold">IPAKE</Emphasis>: Isomorphisms for Password-Based Authenticated Key Exchange
Add to Reading List

Document Date: 2013-06-04 22:24:52


Open Document

File Size: 279,29 KB

Share Result on Facebook

City

Paris / /

Company

Goldreich and Lindell / Xm / /

Country

France / /

Currency

pence / /

/

IndustryTerm

efficient protocol / rst applications / efficient solution / efficient algorithm / elegant solution / on-line attacks / rst practical solution / online exhaustive search / exhaustive search attack / exhaustive search / /

Organization

International Association for Cryptologic Research / United Nations / Ecole Normale Sup´erieure / /

Person

David Pointcheval / Rabin / Checkm / Trapdoor Hard / Thomas Pornin Veri / Ai / Thomas Pornin / /

Position

random-oracle model / and very intricate / player / /

Product

Franklin / /

SportsLeague

International Association / /

Technology

encryption / password-based protocols / cryptography / efficient algorithm / key exchange algorithm / public key / efficient protocol / key exchange protocol / Checkm algorithm / Checky algorithm / key exchange protocols / Encrypted Key Exchange protocol / private key / secret key / same symmetric encryption / simulation / Inv algorithm / IPAKE protocol / interactive protocol / /

SocialTag