메뉴 건너뛰기




Volumn 14, Issue 4, 2003, Pages 445-454

Convertible Authenticated Encryption Scheme without Using Conventional One-Way Function

Author keywords

Authenticated encryption; Discrete logarithm; One way function

Indexed keywords


EID: 0742288853     PISSN: 08684952     EISSN: None     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (20)

References (20)
  • 1
    • 0032682993 scopus 로고    scopus 로고
    • The limited verifier signature and its application
    • Araki, S., S. Uehara and K. Imamura (1999). The limited verifier signature and its application. IEICE Trans. On Fundamentals, E82A(1), 63-68.
    • (1999) IEICE Trans. On Fundamentals , vol.E82A , Issue.1 , pp. 63-68
    • Araki, S.1    Uehara, S.2    Imamura, K.3
  • 2
    • 0742283360 scopus 로고    scopus 로고
    • Improved authenticated multiple-key agreement protocol without using conventional one-way function
    • Chien, H.Y., and J.K. Jan (2003). Improved authenticated multiple-key agreement protocol without using conventional one-way function. Accepted in Applied Mathematics and Computation.
    • (2003) Accepted in Applied Mathematics and Computation
    • Chien, H.Y.1    Jan, J.K.2
  • 3
    • 0036879984 scopus 로고    scopus 로고
    • Forgery attacks on multi-signature schemes for authenticating mobile code delegates
    • Chien, H.Y., J.K. Jan and Y.M. Tseng (2002). Forgery attacks on multi-signature schemes for authenticating mobile code delegates. IEEE Transactions on Vehicular Technology, 51(6), 1669-1671.
    • (2002) IEEE Transactions on Vehicular Technology , vol.51 , Issue.6 , pp. 1669-1671
    • Chien, H.Y.1    Jan, J.K.2    Tseng, Y.M.3
  • 5
    • 0029223753 scopus 로고
    • Two algorithms for modular exponentiation using nonstandard arithmetic
    • Dimitrov, V., and T. Cooklev (1995). Two algorithms for modular exponentiation using nonstandard arithmetic. IEICE Trans. Fundamentals, E78-A(1), 82-87.
    • (1995) IEICE Trans. Fundamentals , vol.E78-A , Issue.1 , pp. 82-87
    • Dimitrov, V.1    Cooklev, T.2
  • 6
    • 0001849866 scopus 로고    scopus 로고
    • The status of MD5 after a recent attack
    • Dobbertin, H. (1996). The status of MD5 after a recent attack. CryptoBytes, 2(2), 1-6.
    • (1996) CryptoBytes , vol.2 , Issue.2 , pp. 1-6
    • Dobbertin, H.1
  • 7
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • Elgamal, T. (1985). A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. On Information Theory, IT-31(4), 469-472.
    • (1985) IEEE Trans. On Information Theory , vol.IT-31 , Issue.4 , pp. 469-472
    • Elgamal, T.1
  • 8
    • 0003018867 scopus 로고    scopus 로고
    • An authenticated key agreement protocol without using one-way function
    • Kaohsiung, Taiwan, May 1998
    • Harn, L., and H.Y. Lin (1998). An authenticated key agreement protocol without using one-way function. In Proc. 8th National Conf. Information Security, Kaohsiung, Taiwan, May 1998. pp. 155-160.
    • (1998) Proc. 8th National Conf. Information Security , pp. 155-160
    • Harn, L.1    Lin, H.Y.2
  • 9
    • 0032655531 scopus 로고    scopus 로고
    • Cryptanalysis and improvement of Petersen-Michel's signcryption scheme
    • He, W.H., and T.C. Wu (1999). Cryptanalysis and improvement of Petersen-Michel's signcryption scheme. In IEE proceedings - Computers and Digital Techniques, 146(2). pp. 123-124.
    • (1999) IEE Proceedings - Computers and Digital Techniques , vol.146 , Issue.2 , pp. 123-124
    • He, W.H.1    Wu, T.C.2
  • 10
    • 84934275826 scopus 로고
    • Authenticated encryption schemes with low communication costs
    • Horster, P., M. Michel and H. Petersen (1994). Authenticated encryption schemes with low communication costs. Electronics Letters, 30(15), 1212-1213.
    • (1994) Electronics Letters , vol.30 , Issue.15 , pp. 1212-1213
    • Horster, P.1    Michel, M.2    Petersen, H.3
  • 11
    • 0029375592 scopus 로고
    • Authenticated encryption scheme without using a one-way function
    • Lee, W.B., and C.C. Chang (1995). Authenticated encryption scheme without using a one-way function. Electronics Letters, 31(19), 1656-1657.
    • (1995) Electronics Letters , vol.31 , Issue.19 , pp. 1656-1657
    • Lee, W.B.1    Chang, C.C.2
  • 13
    • 84936033986 scopus 로고
    • The digital signature standard by NIST
    • NIST (1992). The digital signature standard by NIST. Comm. ACM, 35(7), 36-40.
    • (1992) Comm. ACM , vol.35 , Issue.7 , pp. 36-40
  • 14
    • 0003629990 scopus 로고
    • Nist Fip Pub 180. National Institute of Standards and Technology, US department of Commerce, DRAFT 1993
    • NIST FIP PUB 180 (1993). Secure hash standard, National Institute of Standards and Technology, US department of Commerce, DRAFT 1993.
    • (1993) Secure Hash Standard
  • 16
    • 0017930809 scopus 로고
    • A method for obtaining digital signature and public-key cryptosystem
    • Rivest, R.L., A. Shamir and L. Adleman (1978). A method for obtaining digital signature and public-key cryptosystem. Communications of the ACM, 21(2), 120-126.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 17
    • 0003602325 scopus 로고
    • The MD5 message-digest algorithm
    • Internet Activities Board, Internet Privacy Task Force
    • Rivest, R.L. (1993). The MD5 message-digest algorithm. RFC 1231, Internet Activities Board, Internet Privacy Task Force.
    • (1993) RFC 1231
    • Rivest, R.L.1
  • 18
    • 85020598353 scopus 로고
    • Identity-based cryptosystems and signature schemes
    • Springer, New York
    • Shamir, A. (1984). Identity-based cryptosystems and signature schemes. In Advances in Cryptography - CRYPTO'84. Springer, New York. pp. 47-53.
    • (1984) Advances in Cryptography - CRYPTO'84 , pp. 47-53
    • Shamir, A.1
  • 19
    • 0037097054 scopus 로고    scopus 로고
    • Convertible authenticated encryption scheme
    • Wu, T.S., and C.L. Hsu (2002). Convertible authenticated encryption scheme. The Journal of Systems and Software, 62, 205-209.
    • (2002) The Journal of Systems and Software , vol.62 , pp. 205-209
    • Wu, T.S.1    Hsu, C.L.2
  • 20
    • 63449122349 scopus 로고    scopus 로고
    • Digital signcryption or how to achieve cost (signature & encryption) « cost (signature) + cost (encryption)
    • Springer, New York
    • Zheng, Y. (1997). Digital signcryption or how to achieve cost (signature & encryption) « cost (signature) + cost (encryption). In Advances in Cryptology - CRYPTO'97. Springer, New York. pp. 165-179.
    • (1997) Advances in Cryptology - CRYPTO'97 , pp. 165-179
    • Zheng, Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.