Please use this identifier to cite or link to this item: http://hdl.handle.net/11455/43765
DC FieldValueLanguage
dc.contributor.authorTsai, C.S.en_US
dc.contributor.author蔡垂雄zh_TW
dc.contributor.authorLin, S.C.en_US
dc.contributor.authorHwang, M.S.en_US
dc.date2005zh_TW
dc.date.accessioned2014-06-06T08:11:29Z-
dc.date.available2014-06-06T08:11:29Z-
dc.identifier.issn0096-3003zh_TW
dc.identifier.urihttp://hdl.handle.net/11455/43765-
dc.description.abstractRecently, Tseng et al. proposed an authenticated encryption scheme using self-certified public keys. In their scheme, only the specified receiver can verify and recover the message. In this article, we will demonstrate their scheme cannot withstand the known plaintext-ciphertext attack. The intruder has ability to expose every message sent between the signer and the specified receiver. (c) 2004 Elsevier Inc. All rights reserved.en_US
dc.language.isoen_USzh_TW
dc.relationApplied Mathematics and Computationen_US
dc.relation.ispartofseriesApplied Mathematics and Computation, Volume 166, Issue 1, Page(s) 118-122.en_US
dc.relation.urihttp://dx.doi.org/10.1016/j.amc.2004.04.073en_US
dc.subjectauthenticated encryptionen_US
dc.subjectdigital signatureen_US
dc.subjectself-certified public keyen_US
dc.subjectcryptosystemen_US
dc.titleCryptanalysis of an authenticated encryption scheme using self-certified public keysen_US
dc.typeJournal Articlezh_TW
dc.identifier.doi10.1016/j.amc.2004.04.073zh_TW
item.grantfulltextnone-
item.openairetypeJournal Article-
item.languageiso639-1en_US-
item.fulltextno fulltext-
item.cerifentitytypePublications-
item.openairecristypehttp://purl.org/coar/resource_type/c_18cf-
Appears in Collections:資訊管理學系
Show simple item record
 

Google ScholarTM

Check

Altmetric

Altmetric


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.