Sciweavers

123 search results - page 7 / 25
» Cryptanalysis of 2R- Schemes
Sort
View
IJNSEC
2006
72views more  IJNSEC 2006»
14 years 9 months ago
Cryptanalysis of Koyama Scheme
In this paper we analyze the security of Koyama scheme based on the singular cubic curve for some well known attacks. We provide an efficient algorithm for linearly related plaint...
Sahadeo Padhye
WISA
2005
Springer
15 years 3 months ago
Cryptanalysis of Some Group-Oriented Proxy Signature Schemes
Abstract. A proxy signature scheme allows an entity to delegate its signing power to another entity. Since the notion of proxy signatures was first introduced, many proxy signatur...
Je Hong Park, Bo Gyeong Kang, Sangwoo Park
EUC
2008
Springer
14 years 11 months ago
Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme
Abstract. Signcryption is a cryptographic primitive that aims at providing confidentiality and authentication simultaneously. Recently in May 2008, a scheme for identity based thre...
S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Ra...
CHES
2007
Springer
95views Cryptology» more  CHES 2007»
15 years 3 months ago
Side Channel Cryptanalysis of a Higher Order Masking Scheme
Abstract. In the recent years, DPA attacks have been widely investigated. In particular, 2-nd order DPA have been improved and successfully applied to break many masked implementat...
Jean-Sébastien Coron, Emmanuel Prouff, Matt...
77
Voted
IJNSEC
2008
143views more  IJNSEC 2008»
14 years 9 months ago
New Cryptanalysis Paradigm on a Nonce-based Mutual Authentication Scheme
In 2005, Lee, Kim, and Yoo proposed a nonce-based mutual authentication scheme using smart cards. However, this paper demonstrates that Lee-Kim-Yoo's scheme is vulnerable to ...
Da-Zhi Sun, Zhen-Fu Cao