Sciweavers

110 search results - page 6 / 22
» ijnsec 2006
Sort
View
IJNSEC
2006
66views more  IJNSEC 2006»
14 years 9 months ago
On the Security of Signature Scheme with Message Recovery and Its Application
In 2004, Sekhar proposed a new signature scheme with message recovery. Based on this signature scheme with message recovery, they also proposed a designated verifier signature sch...
Eun-Jun Yoon, Kee-Young Yoo
IJNSEC
2006
113views more  IJNSEC 2006»
14 years 9 months ago
Cryptanalysis of Park's Authentication Protocol in Wireless Mobile Communication Systems
In 2004, C. Park proposed an authentication protocol to provide user anonymity and untraceability in wireless mobile communication systems. The real user identities are hidden and...
Alberto Peinado Domínguez
IJNSEC
2006
85views more  IJNSEC 2006»
14 years 9 months ago
A Forgery Attack on A Low Computation Cost User Authentication Scheme
In 2005, Lee-Lin-Chang proposed a low computation cost user authentication scheme for mobile communication. However, the current paper demonstrates the vulnerability of Lee-Lin-Ch...
Eun-Jun Yoon, Kee-Young Yoo
IJNSEC
2006
85views more  IJNSEC 2006»
14 years 9 months ago
Security Analysis of Some Batch Verifying Signatures from Pairings
Batch verification can provide large computational savings when multiple signatures are verified together. Recently, some batch verifying signature schemes have been proposed from...
Tianjie Cao, Dongdai Lin, Rui Xue
IJNSEC
2006
89views more  IJNSEC 2006»
14 years 9 months ago
Expansion of Sliding Window Method for Finding Shorter Addition/Subtraction-Chains
Finding a shorter addition/subtraction-chain for an integer is an important problem for many cryptographic systems based on number theory. Especially, execution time of multiplica...
Younho Lee, Heeyoul Kim, Seong-Min Hong, Hyunsoo Y...