Sciweavers

83 search results - page 4 / 17
» ijnsec 2008
Sort
View
IJNSEC
2008
91views more  IJNSEC 2008»
13 years 6 months ago
A Weakness in Authenticated Encryption Schemes Based on Tseng et al.'s Schemes
Tseng et al. have introduced in 2003 an authenticated encryption scheme by using self-certified public keys. Based on this scheme several authors have proposed new signature schem...
Luis Hernández Encinas, Ángel Mart&i...
IJNSEC
2008
112views more  IJNSEC 2008»
13 years 6 months ago
A New and Efficient Signature on Commitment Values
We present a new short signature scheme based on a variant of the Boneh-Boyen's short signatures schemes. Our short signature scheme is secure without requiring the random or...
Fangguo Zhang, Xiaofeng Chen, Yi Mu, Willy Susilo
IJNSEC
2008
90views more  IJNSEC 2008»
13 years 6 months ago
Trace Representations and Multi-rate Constructions of Two Classes of Generalized Cyclotomic Sequences
In this paper, two classes of generalized cyclotomic sequences of period pq are reconstructed by means of multirate parallel combinations of binary Legendre sequences which are cl...
Tongjiang Yan, Xiaoni Du, Shuqing Li, Guozhen Xiao
IJNSEC
2010
126views more  IJNSEC 2010»
13 years 1 months ago
Comment on Wu et al.'s Server-aided Verification Signature Schemes
In ProvSec 2008, Wu et al. constructed two server-aided verification signature (SAV-) schemes based on BLS signature. In this paper, we provide a new definition of the security of...
Zhiwei Wang, Licheng Wang, Yixian Yang, Zhengming ...
IJNSEC
2008
110views more  IJNSEC 2008»
13 years 6 months ago
Security Measures and Weaknesses of the GPRS Security Architecture
This paper presents an evaluation of the security architecture employed in the General Packet Radio Services (GPRS). More specifically, the security measures applied to protect th...
Christos Xenakis