AbstractIn 2006, Hwang et al. presented a forgery attack against Tseng et al.’s efficient authenticated encryption schemes with message linkages for message flows. Moreover, they proposed some modified schemes to repair these flaws. In this paper, we show that the improved authenticated encryption schemes proposed by Hwang et al. are insecure by presenting another attack that allows a dishonest referee, dealing with a dispute, to decrypt all the future and past authenticated ciphertext between the contending parties. This attack proves that Hwang et al.’s schemes contradict the forward and backward confidentiality requirements of authenticated encryption schemes
In this article, we analyze and investigate two authenticated encryption algorithms: GIFT-COFB and H...
AbstractIn public key cryptosystem, the protecting of public keys against intruders is very importan...
AbstractIn 2007, Liu proposed an improvement of Shieh et al. multi-signature scheme in mobile code s...
AbstractIn 2006, Hwang et al. presented a forgery attack against Tseng et al.’s efficient authentica...
Tseng et al. proposed two efficient authenticated encryption schemes with message linkages for messa...
Tseng and his colleagues have proposed two variants of authenticated encryption scheme using self-ce...
[[abstract]]An attack is proposed to show that Tseng et al.’s authenticated encryption scheme is not...
The paper proposes a new scheme of authenticated encryption that is either publicly verifiable or no...
In 2000, Wang et al. proposed a (t, n) threshold signature scheme with (k, l) threshold shared verif...
In 1999, Yang and shieh proposed two password authentication schemes using smart cards. But in 2003,...
AbstractRecently, Yen and Joye showed that Harn and Lin's authenticated multiple-key agreement proto...
Abstract — An authenticated encryption scheme allows messages to be encrypted and authenticated simu...
Digital signature plays a key role in bringing authenticity to cryptographic communications. A signa...
[[abstract]]Zheng proposed two new authenticated encryption schemes, called signcryption, in 1997. B...
AbstractAuthenticated key agreement protocols are to authenticate the users who will start a convers...
In this article, we analyze and investigate two authenticated encryption algorithms: GIFT-COFB and H...
AbstractIn public key cryptosystem, the protecting of public keys against intruders is very importan...
AbstractIn 2007, Liu proposed an improvement of Shieh et al. multi-signature scheme in mobile code s...
AbstractIn 2006, Hwang et al. presented a forgery attack against Tseng et al.’s efficient authentica...
Tseng et al. proposed two efficient authenticated encryption schemes with message linkages for messa...
Tseng and his colleagues have proposed two variants of authenticated encryption scheme using self-ce...
[[abstract]]An attack is proposed to show that Tseng et al.’s authenticated encryption scheme is not...
The paper proposes a new scheme of authenticated encryption that is either publicly verifiable or no...
In 2000, Wang et al. proposed a (t, n) threshold signature scheme with (k, l) threshold shared verif...
In 1999, Yang and shieh proposed two password authentication schemes using smart cards. But in 2003,...
AbstractRecently, Yen and Joye showed that Harn and Lin's authenticated multiple-key agreement proto...
Abstract — An authenticated encryption scheme allows messages to be encrypted and authenticated simu...
Digital signature plays a key role in bringing authenticity to cryptographic communications. A signa...
[[abstract]]Zheng proposed two new authenticated encryption schemes, called signcryption, in 1997. B...
AbstractAuthenticated key agreement protocols are to authenticate the users who will start a convers...
In this article, we analyze and investigate two authenticated encryption algorithms: GIFT-COFB and H...
AbstractIn public key cryptosystem, the protecting of public keys against intruders is very importan...
AbstractIn 2007, Liu proposed an improvement of Shieh et al. multi-signature scheme in mobile code s...