Sciweavers

29 search results - page 2 / 6
» ijnsec 2010
Sort
View
IJNSEC
2010
91views more  IJNSEC 2010»
12 years 11 months ago
An Improvement on a Three-party Password-based Key Exchange Protocol Using Weil Pairing
The three-party password-based key exchange protocols using Weil pairing proposed by Wen is vulnerable to impersonation attack. By introducing hard artificial intelligence problem...
Yong Zeng, Jianfeng Ma, Sang-Jae Moon
IJNSEC
2010
105views more  IJNSEC 2010»
12 years 11 months ago
A Note on the Constructions of Orthomorphic Permutations
Orthomorphic permutations have important applications in the design of block ciphers. A practical algorithm is derived to generate all orthomorphic permutations over Fm 2 , and it...
Jianqin Zhou
IJNSEC
2010
127views more  IJNSEC 2010»
12 years 11 months ago
Identity-based Threshold Signature Secure in the Standard Model
Recently, design of Identity-based (ID-based) threshold signature schemes which are efficient and provably secure in the standard model has drawn great concerns. In this paper, an...
Hu Xiong, Zhiguang Qin, Fagen Li
IJNSEC
2010
144views more  IJNSEC 2010»
12 years 11 months ago
A Note On Self-Shrinking Lagged Fibonacci Generator
Lagged Fibonacci Generators (LFG) are used as a building block of key-streamgenerator in stream cipher cryptography. In this note we have used the self-shrinkingconcept in LFG and ...
Moon K. Chetry, W. B. Vasantha Kandaswamy
IJNSEC
2010
126views more  IJNSEC 2010»
12 years 11 months ago
Comment on Wu et al.'s Server-aided Verification Signature Schemes
In ProvSec 2008, Wu et al. constructed two server-aided verification signature (SAV-) schemes based on BLS signature. In this paper, we provide a new definition of the security of...
Zhiwei Wang, Licheng Wang, Yixian Yang, Zhengming ...