Login
Register
Home
Issues
Volume 14, Issue 4 (2003)
Convertible Authenticated Encryption Sch ...
Informatica
Information
Submit your article
For Referees
Help
ATTENTION!
Article info
Related articles
Cited by
More
Article info
Related articles
Cited by
Cited by
10
Convertible Authenticated Encryption Scheme Without Using Conventional One‐Way Function
2012 International Symposium on Biometrics and Security Technologies
Jia-Lun Tsai, Nai-Wei Lo, Tzong-Chen Wu
https://doi.org/10.1109/ISBAST.2012.25
Conference:
(2012), p. 54
Proceedings. 2005 IEEE Networking, Sensing and Control, 2005.
Jianhong Zhang, Jiancheng Zou, Yumin Wang
https://doi.org/10.1109/ICNSC.2005.1461343
Conference:
(2005), p. 1054
2008 International Conference on Embedded Software and Systems Symposia
Jianhong Zhang, Qin Geng
https://doi.org/10.1109/ICESS.Symposia.2008.22
Conference:
(2008), p. 158
2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE)
Xuhong Li, Wei Zhang, Xia Wang, Muhai Li
https://doi.org/10.1109/CSAE.2012.6272647
Conference:
(2012), p. 504
A New Self-Certified Convertible Authenticated Encryption Scheme Based on Discrete Logarithm Problem
Manoj Kumar Chande, Cheng-Chi Lee, Chun-Ta Li
https://doi.org/10.1142/S0129626416500183
Journal:
Parallel Processing Letters
Volume 26, Issue 04 (2016), p. 1650018
Convertible multi-authenticated encryption scheme with one-way hash function
Jia-Lun Tsai
https://doi.org/10.1016/j.comcom.2008.12.009
Journal:
Computer Communications
Volume 32, Issue 5 (2009), p. 783
Cryptanalysis of a convertible authenticated encryption scheme based on the ElGamal cryptosystem
Fagen Li, Zhiguang Qin
https://doi.org/10.4103/0256-4602.62781
Journal:
IETE Technical Review
Volume 27, Issue 3 (2010), p. 266
On the security of a convertible authenticated encryption
Jianhong Zhang, Yumin Wang
https://doi.org/10.1016/j.amc.2004.11.010
Journal:
Applied Mathematics and Computation
Volume 169, Issue 2 (2005), p. 1063
Selectively Convertible Authenticated Encryption in the Random Oracle Model
H.-Y. Chien
https://doi.org/10.1093/comjnl/bxm090
Journal:
The Computer Journal
Volume 51, Issue 4 (2007), p. 419
The ring authenticated encryption scheme – How to provide a clue wisely
Jiqiang Lv, Kui Ren, Xiaofeng Chen, Kwangjo Kim
https://doi.org/10.1016/j.ins.2008.09.014
Journal:
Information Sciences
Volume 179, Issue 1-2 (2009), p. 161
Export citation
Copy and paste formatted citation
Formatted citation
Placeholder
Citation style
AMS -- Americal Mathematical Society
APA -- American Psychological Association 6th ed.
Chicago -- The Chicago Manual of Style 17th ed.
Download citation in file
Export format
BibTeX
RIS
Authors
Placeholder
Share
RSS
To top