Showing results 1 to 20 of 24
next >
Issue Date | Title | Author(s) | Text |
- | Anonymous conference key distribution systems based on the discrete logarithm problem | Tseng, Y.M.; Jan, J.K. | - |
- | Attacks on threshold signature schemes with traceable signers | Tseng, Y.M.; Jan, J.K. | - |
- | Authenticated encryption schemes with message linkages for message flows | Tseng, Y.M.; Jan, J.K.; Chien, H.Y. | - |
- | Cryptanalysis of Liaw's broadcasting cryptosystem | Tseng, Y.M.; Jan, J.K. | - |
- | Cryptanalysis on dynamic authentication protocol for personal communication system | Chien, H.Y.; Chen, Y.H.; Jan, J.K.; Tseng, Y.M. | - |
- | Cryptanalysis on Mu-Varadharajan's e-voting schemes | Chien, H.Y.; Jan, J.K.; Tseng, Y.M. | - |
- | Digital signature with message recovery using self-certified public keys and its variants | Tseng, Y.M.; Jan, J.K.; Chien, H.Y. | - |
- | Effect of humic acid on the stability of TiO2 and ZnO nanoparticles in water | Tseng, Y.M.; Wu, S.C. | - |
- | An efficient and practical solution to remote authentication: Smart card | Chien, H.Y.; Jan, J.K.; Tseng, Y.M. | - |
- | An efficient group-oriented (t,n) threshold signature scheme with message linkage | Perng, C.Y.; Jan, J.K.; Tseng, Y.M. | - |
- | Forgery attacks on "Multisignature, schemes for authenticating mobile code delegates" | Chien, H.Y.; Jan, J.K.; Tseng, Y.M. | - |
- | Impersonation attack on Tan-Zhu's remote login scheme | Chien, H.Y.; Jan, J.K.; Tseng, Y.M. | - |
- | Improved group signature scheme based on discrete logarithm problem | Tseng, Y.M.; Jan, J.K. | - |
- | Improvement of Chikazawa-Yamagishi ID-based key sharing system | Tseng, Y.M.; Jan, J.K. | - |
- | A modified remote login authentication scheme based on geometric approach | Chien, H.Y.; Jan, J.K.; Tseng, Y.M. | - |
- | On the security of generalization of threshold signature and authenticated encryption | Tseng, Y.M.; Jan, J.K.; Chien, H.Y. | - |
- | Partially blind threshold signature based on RSA | Chien, H.Y.; Jan, J.K.; Tseng, Y.M. | - |
- | A practical (t, n) multi-secret sharing scheme | Chien, H.Y.; Jan, J.K.; Tseng, Y.M. | - |
- | A scheme and concept for limited inheritance of privileges in a user hierarchy | Tseng, Y.M.; Jan, J.K. | - |
- | Security of digital signature with one-time pair of keys | Tseng, Y.M.; Jan, J.K.; Chien, H.Y. | - |