Sciweavers

123 search results - page 6 / 25
» Cryptanalysis of 2R- Schemes
Sort
View
ACISP
2000
Springer
15 years 2 months ago
Cryptanalysis of the m-Permutation Protection Schemes
Anderson and Kuhn have proposed the EEPROM modification attack to recover the secret key stored in the EEPROM. At ACISP'98, Fung and Gray proposed an −m permutation protecti...
Hongjun Wu, Feng Bao, Dingfeng Ye, Robert H. Deng
INFORMATICALT
2006
177views more  INFORMATICALT 2006»
14 years 9 months ago
Cryptanalysis and Improvement of Practical Convertible Authenticated Encryption Schemes Using Self-Certified Public Keys
A convertible authenticated encryption scheme allows a specified recipient to recover and verify a message simultaneously. Moreover the recipient can prove the dishonesty of the se...
Zuhua Shao
PERCOM
2007
ACM
15 years 9 months ago
Cryptanalysis of Two Lightweight RFID Authentication Schemes
Benessa Defend, Kevin Fu, Ari Juels
78
Voted
PCM
2004
Springer
116views Multimedia» more  PCM 2004»
15 years 3 months ago
Cryptanalysis of a Chaotic Neural Network Based Multimedia Encryption Scheme
Recently, Yen and Guo proposed a chaotic neural network (CNN) for signal encryption, which was suggested as a solution for protection of digital images and videos. The present pape...
Chengqing Li, Shujun Li, Dan Zhang, Guanrong Chen
AMC
2005
147views more  AMC 2005»
14 years 9 months ago
Cryptanalysis of and improvement on the Hwang-Chen multi-proxy multi-signature schemes
Hwang and Chen recently proposed new multi-proxy multi-signature schemes that allow a group of authorized proxy signers to sign messages on behalf of a group of original signers. ...
Yuh-Dauh Lyuu, Ming-Luen Wu