Sciweavers

29 search results - page 1 / 6
» ijnsec 2010
Sort
View
IJNSEC
2010
104views more  IJNSEC 2010»
12 years 11 months ago
Construction of Large Families of Pseudorandom Subsets of the Set {1, 2, ..., N} Using Elliptic Curves
Pseudo-random subsets of the set {1, 2, . . . , N} have many applications in the fields of network security, cryptography and other security issues. Recently, Dartyge and S
Zhixiong Chen, Li Xu, Chenhuang Wu
IJNSEC
2010
100views more  IJNSEC 2010»
12 years 11 months ago
On the Security of Yuan et al.'s Undeniable Signature Scheme
Undeniable signatures were proposed to limit the public verification property of ordinary digital signature. In fact, the verification of such signatures cannot be obtained withou...
Wei Zhao
IJNSEC
2010
138views more  IJNSEC 2010»
12 years 11 months ago
A Modified Hill Cipher Involving Interweaving and Iteration
This paper deals with a modification of the Hill cipher. In this, we have introduced interweaving in each step of the iteration. The interweaving of the resulting plaintext, at ea...
V. Umakanta Sastry, N. Ravi Shankar, S. Durga Bhav...
IJNSEC
2010
127views more  IJNSEC 2010»
12 years 11 months ago
A Better Improvement on the Integrated Diffie-Hellman-DSA Key Agreement Protocol
Harn et al. proposed a series of Diffie-Hellman key exchange protocols which are integrated into Digital Signature Algorithm in 2004. Recently, Phan pointed out that Harn et al.&#...
Jie Liu, Jianhua Li