Sciweavers

83 search results - page 2 / 17
» ijnsec 2008
Sort
View
IJNSEC
2008
132views more  IJNSEC 2008»
13 years 5 months ago
An Authenticated Key Agreement Protocol Using Conjugacy Problem in Braid Groups
In this paper we propose an authenticated key agreement, which works in a braid group. We prove that our protocol meet the security attributes under the assumption that the Conjug...
Atul Chaturvedi, Sunder Lal
IJNSEC
2008
128views more  IJNSEC 2008»
13 years 5 months ago
Attacking LCCC Batch Verification of RSA Signatures
Batch verification of digital signatures is used to improve the computational complexity when a large number of digital signatures must be verified. Lee at al. [2] proposed a new ...
Martin Stanek
IJNSEC
2008
106views more  IJNSEC 2008»
13 years 5 months ago
Comments on "Improved Efficient Remote User Authentication Schemes"
Recently, Tian et al. presented an article, in which they discussed some security weaknesses of Yoon et al.'s scheme and subsequently proposed two "improved" scheme...
Manik Lal Das
IJNSEC
2008
87views more  IJNSEC 2008»
13 years 5 months ago
On the Security of ''Golden'' Cryptography
In this paper the security of "golden" cryptography, which has been proposed recently, is tackled. Specifically, it is shown that the security of such cryptosystem is tr...
Ángel Martín del Rey, Gerardo Rodr&i...
IJNSEC
2008
66views more  IJNSEC 2008»
13 years 5 months ago
Improving the Novikov and Kiselev User Authentication Scheme
Novikov and Kiselev [7] proposed an authentication method of a user from a remote autonomous object. Recently, Yang et al. [12] and Awasthi [1] have pointed out that the Novikov-K...
Min-Ho Kim, Çetin Kaya Koç