Sciweavers

427 search results - page 50 / 86
» Cryptanalysis of the
Sort
View
IJNSEC
2006
72views more  IJNSEC 2006»
13 years 8 months ago
Cryptanalysis of Koyama Scheme
In this paper we analyze the security of Koyama scheme based on the singular cubic curve for some well known attacks. We provide an efficient algorithm for linearly related plaint...
Sahadeo Padhye
IJNSEC
2006
75views more  IJNSEC 2006»
13 years 8 months ago
Cryptanalysis of the Secure Sessions from Weak Secrets Protocols
The Short Secret Sharing Protocols (S3P), proposed by Roe et al in 1998 [13] and revised in 2003 [14], is a family of protocols that bootstrap secure session keys from weak secret...
Jolyon Clulow
JCM
2008
138views more  JCM 2008»
13 years 8 months ago
Cryptanalysis of Some RFID Authentication Protocols
Two effective attacks, namely de-synchronization attack and impersonation attack, against Ha et al. 's LCSS RFID authentication protocol, Song and Mitchell's protocol are...
Tianjie Cao, Peng Shen, Elisa Bertino
INFORMATICALT
2006
177views more  INFORMATICALT 2006»
13 years 8 months ago
Cryptanalysis and Improvement of Practical Convertible Authenticated Encryption Schemes Using Self-Certified Public Keys
A convertible authenticated encryption scheme allows a specified recipient to recover and verify a message simultaneously. Moreover the recipient can prove the dishonesty of the se...
Zuhua Shao
CORR
2007
Springer
89views Education» more  CORR 2007»
13 years 8 months ago
Analog Chaos-based Secure Communications and Cryptanalysis: A Brief Survey
Shujun Li, Gonzalo Álvarez, Zhong Li, Wolfg...