Sciweavers

106 search results - page 4 / 22
» Cryptanalysis of Koyama Scheme
Sort
View
AINA
2005
IEEE
14 years 3 months ago
A CAC Scheme for Multimedia Applications Based on Fuzzy Logic
The purpose of admission control is to support the Quality of Service (QoS) demands of real time applications via resource reservation. In order to deal with admission control for...
Leonard Barolli, Mimoza Durresi, Kaoru Sugita, Arj...
IJNSEC
2011
108views more  IJNSEC 2011»
13 years 4 months ago
Cryptanalysis and Fixed of Short Signature Scheme without Random Oracle from Bilinear Parings
We first analyze the security of a short signature scheme without random oracles called ZCSM scheme and point out that it cannot support unforgeable under the chosen message and ...
Mingwu Zhang, Bo Yang, Yusheng Zhong, Pengcheng Li...
CORR
2010
Springer
97views Education» more  CORR 2010»
13 years 10 months ago
Cryptanalysis of an Efficient Signcryption Scheme with Forward Secrecy Based on Elliptic Curve
The signcryption is a relatively new cryptographic technique that is supposed to fulfill the functionalities of encryption and digital signature in a single logical step. Several ...
Mohsen Toorani, Ali Asghar Beheshti Shirazi
CSR
2008
Springer
13 years 11 months ago
Cryptanalysis of Stickel's Key Exchange Scheme
We offer cryptanalysis of a key exchange scheme due to Stickel [11], which was inspired by the well-known Diffie-Hellman protocol. We show that Stickel's choice of platform (t...
Vladimir Shpilrain
CORR
2008
Springer
141views Education» more  CORR 2008»
13 years 10 months ago
Cryptanalysis of Yang-Wang-Chang's Password Authentication Scheme with Smart Cards
In 2005, Yang, Wang, and Chang proposed an improved timestamp-based password authentication scheme in an attempt to overcome the flaws of Yang-Shieh's legendary timestamp-base...
Al-Sakib Khan Pathan, Choong Seon Hong