Search

Showing total 65 results

Search Constraints

Start Over You searched for: Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed Topic cryptography Remove constraint Topic: cryptography Language english Remove constraint Language: english Journal applied mathematics & computation Remove constraint Journal: applied mathematics & computation
65 results

Search Results

1. Still wrong use of pairings in cryptography.

2. One private-key for all DL-based cryptosystems

3. Cryptanalysis of large RSA exponent by using the LLL algorithm

4. Cryptanalysis of and improvement on the Hwang–Chen multi-proxy multi-signature schemes

5. Algorithm of asynchronous binary signed-digit recoding on fast multiexponentiation

6. A novel proxy deposit protocol for e-cash systems

7. A novel key management scheme for dynamic access control in a user hierarchy

8. A randomness test for block ciphers

9. Use of SIMD-based data parallelism to speed up sieving in integer-factoring algorithms.

10. Parallel algorithms for modular multi-exponentiation.

11. Aitken and Neville inverse interpolation methods for the Lucas logarithm problem

12. Group law on affine conics and applications to cryptography.

13. Elliptic curve scalar multiplication algorithm using complementary recoding

14. Further refinement of pairing computation based on Miller’s algorithm

15. Inefficiency of common-multiplicand multiplication and exponentiation algorithms by performing binary complements

16. Performance improvement for the GGM-construction of pseudorandom functions

17. An iterative modular multiplication algorithm in RNS

18. The design of integrating subliminal channel with access control

19. Comment on traceability on RSA-based partially signature with low computation

20. Security of meta-He digital signature scheme based on factoring and discrete logarithms

21. Comment: A new blind signature based on the discrete logarithm problem for untraceability

22. Cryptanalysis of Rijndael S-box and improvement

23. Security of Pon–Lu–Jeng’s Meta-He digital signature schemes

24. Cryptanalysis of Zhang-Xiao’s multisignature scheme for specified group of verifiers

25. Cryptanalysis of some signature schemes with message recovery

26. A secure and efficient authentication protocol for anonymous channel in wireless communications

27. Identity based group-oriented undeniable signature scheme

28. Designated verifier proxy signature scheme with message recovery

29. Two provably secure k-out-of-n oblivious transfer schemes

30. One-to-one mapping matrix

31. Off-line password-guessing attacks on the generalized key agreement and password authentication protocol

32. A note on digital signature scheme using a self-pairing map

33. ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings

34. Weakness and solution of Yang et al.’s protected password changing scheme

35. Cryptanalysis of Zhou et al.’s proxy-protected signature schemes

36. A new deniable authentication protocol from bilinear pairings

37. Forward-secure multisignature and blind signature schemes

38. Cryptanalysis of Lee–Kim–Yoo password-based key agreement scheme

39. A new efficient (t, n) verifiable multi-secret sharing (VMSS) based on YCH scheme

40. Efficient verifier-based key agreement protocol for three parties without server’s public key

41. Improvement of Chien–Jan’s authenticated multiple-key agreement protocol without using conventional one-way function

42. A new key authentication scheme for cryptosystems based on discrete logarithms

43. Weakness in ID-based one round authenticated tripartite multiple-key agreement protocol with pairings

44. Cryptanalysis of Li–Tzeng–Hwang’s improved signature schemes based on factoring and discrete logarithms

45. Fixing problems in Lin et al.’s OSPA protocol

46. Steganography of capacity required using modulo operator for embedding secret image

47. Proxy blind multi-signature scheme without a secure channel

48. Cryptanalysis of Lee–Lee authenticated key agreement scheme

49. Improvement of Tseng et al.'s authenticated encryption scheme with message linkages

50. Improvement of HWWM-authenticated key agreement protocol