메뉴 건너뛰기




Volumn , Issue , 2008, Pages 428-432

Cryptanalysis of an efficient signcryption scheme with forward secrecy based on elliptic curve

Author keywords

[No Author keywords available]

Indexed keywords

ELECTRICAL ENGINEERING; SECURITY OF DATA;

EID: 62949128002     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICCEE.2008.147     Document Type: Conference Paper
Times cited : (12)

References (12)
  • 1
    • 63449122349 scopus 로고    scopus 로고
    • Digital signcryption or how to achieve Cost (Signature & Encryption) << Cost (Signature) + Cost (Encryption)
    • Advances in Cryptology-CRYPTO'97, Springer-Verlag
    • Y. Zheng, "Digital signcryption or how to achieve Cost (Signature & Encryption) << Cost (Signature) + Cost (Encryption)," Advances in Cryptology-CRYPTO'97, LNCS 1294, pp. 165-179, Springer-Verlag, 1997.
    • (1997) LNCS , vol.1294 , pp. 165-179
    • Zheng, Y.1
  • 3
    • 0040712314 scopus 로고    scopus 로고
    • How to construct efficient signcryption schemes on elliptic curves
    • Elsevier Inc
    • Y. Zheng, and H. Imai, "How to construct efficient signcryption schemes on elliptic curves," Information Processing Letters, Vol. 68, pp. 227-233, Elsevier Inc., 1998.
    • (1998) Information Processing Letters , vol.68 , pp. 227-233
    • Zheng, Y.1    Imai, H.2
  • 4
    • 25144467465 scopus 로고    scopus 로고
    • An efficient signcryption scheme with forward secrecy based on elliptic curve
    • Elsevier Inc
    • R.-J. Hwang, C.-H. Lai, and F.-F. Su, "An efficient signcryption scheme with forward secrecy based on elliptic curve," Journal of Applied Mathematics and Computation, Vol. 167, No. 2, pp. 870-881, Elsevier Inc., 2005.
    • (2005) Journal of Applied Mathematics and Computation , vol.167 , Issue.2 , pp. 870-881
    • Hwang, R.-J.1    Lai, C.-H.2    Su, F.-F.3
  • 5
    • 33947512019 scopus 로고    scopus 로고
    • Formal Proofs for the Security of Signcryption
    • J. Baek, R. Steinfeld, Y, Zheng, "Formal Proofs for the Security of Signcryption," Journal of Cryptology, Vol. 20, pp. 203-235, 2007.
    • (2007) Journal of Cryptology , vol.20 , pp. 203-235
    • Baek, J.1    Steinfeld, R.2    Zheng, Y.3
  • 8
    • 35048856922 scopus 로고    scopus 로고
    • Validation of elliptic curve public keys
    • Advances in Cryptology-PKC'03, Springer-Verlag
    • A. Antipa, D. Brown, A. Menezes, R. Struik, and S. Vanstone, "Validation of elliptic curve public keys," Advances in Cryptology-PKC'03, LNCS 2567, pp. 211-223, Springer-Verlag, 2003.
    • (2003) LNCS , vol.2567 , pp. 211-223
    • Antipa, A.1    Brown, D.2    Menezes, A.3    Struik, R.4    Vanstone, S.5
  • 10
    • 62949140659 scopus 로고    scopus 로고
    • M. Myers, C. Adams, D. Solo, and D. Kemp, Internet X.509 Certificate Request Message Format, RFC 2511, March 1999. Available at: http://www.ietf.org/rfc/rfc2511.txt
    • M. Myers, C. Adams, D. Solo, and D. Kemp, "Internet X.509 Certificate Request Message Format," RFC 2511, March 1999. Available at: http://www.ietf.org/rfc/rfc2511.txt
  • 11
    • 84956866842 scopus 로고    scopus 로고
    • Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol
    • Advances in Cryptology-PKC'99, Springer-Verlag
    • S. Blake-Wilson, and A. Menezes, "Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol", Advances in Cryptology-PKC'99, LNCS 1560, pp. 154-170, Springer-Verlag, 1999.
    • (1999) LNCS , vol.1560 , pp. 154-170
    • Blake-Wilson, S.1    Menezes, A.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.