Please use this identifier to cite or link to this item: http://hdl.handle.net/11455/43765
DC FieldValueLanguage
dc.contributor.authorTsai, C.S.en_US
dc.contributor.author蔡垂雄zh_TW
dc.contributor.authorLin, S.C.en_US
dc.contributor.authorHwang, M.S.en_US
dc.date2005zh_TW
dc.date.accessioned2014-06-06T08:11:29Z-
dc.date.available2014-06-06T08:11:29Z-
dc.identifier.issn0096-3003zh_TW
dc.identifier.urihttp://hdl.handle.net/11455/43765-
dc.description.abstractRecently, Tseng et al. proposed an authenticated encryption scheme using self-certified public keys. In their scheme, only the specified receiver can verify and recover the message. In this article, we will demonstrate their scheme cannot withstand the known plaintext-ciphertext attack. The intruder has ability to expose every message sent between the signer and the specified receiver. (c) 2004 Elsevier Inc. All rights reserved.en_US
dc.language.isoen_USzh_TW
dc.relationApplied Mathematics and Computationen_US
dc.relation.ispartofseriesApplied Mathematics and Computation, Volume 166, Issue 1, Page(s) 118-122.en_US
dc.relation.urihttp://dx.doi.org/10.1016/j.amc.2004.04.073en_US
dc.subjectauthenticated encryptionen_US
dc.subjectdigital signatureen_US
dc.subjectself-certified public keyen_US
dc.subjectcryptosystemen_US
dc.titleCryptanalysis of an authenticated encryption scheme using self-certified public keysen_US
dc.typeJournal Articlezh_TW
dc.identifier.doi10.1016/j.amc.2004.04.073zh_TW
Appears in Collections:資訊管理學系
文件中的檔案:

取得全文請前往華藝線上圖書館



Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.