Login
Register
Home
Issues
Volume 14, Issue 4 (2003)
Convertible Authenticated Encryption Sch ...
Informatica
Information
Submit your article
For Referees
Help
ATTENTION!
Article info
Related articles
Cited by
More
Article info
Related articles
Cited by
Cited by
10
Convertible Authenticated Encryption Scheme Without Using Conventional One‐Way Function
2008 International Conference on Embedded Software and Systems Symposia
Jianhong Zhang, Qin Geng
https://doi.org/10.1109/ICESS.Symposia.2008.22
Conference
(2008), p. 158
2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE)
Xuhong Li, Wei Zhang, Xia Wang, Muhai Li
https://doi.org/10.1109/CSAE.2012.6272647
Conference
(2012), p. 504
2012 International Symposium on Biometrics and Security Technologies
Jia-Lun Tsai, Nai-Wei Lo, Tzong-Chen Wu
https://doi.org/10.1109/ISBAST.2012.25
Conference
(2012), p. 54
A New Self-Certified Convertible Authenticated Encryption Scheme Based on Discrete Logarithm Problem
Manoj Kumar Chande, Cheng-Chi Lee, Chun-Ta Li
https://doi.org/10.1142/S0129626416500183
Journal
Parallel Processing Letters
Volume 26, Issue 04 (2016), p. 1650018
Convertible multi-authenticated encryption scheme with one-way hash function
Jia-Lun Tsai
https://doi.org/10.1016/j.comcom.2008.12.009
Journal
Computer Communications
Volume 32, Issue 5 (2009), p. 783
Cryptanalysis of a convertible authenticated encryption scheme based on the ElGamal cryptosystem
Fagen Li, Zhiguang Qin
https://doi.org/10.4103/0256-4602.62781
Journal
IETE Technical Review
Volume 27, Issue 3 (2010), p. 266
On the security of a convertible authenticated encryption
Jianhong Zhang, Yumin Wang
https://doi.org/10.1016/j.amc.2004.11.010
Journal
Applied Mathematics and Computation
Volume 169, Issue 2 (2005), p. 1063
Proceedings. 2005 IEEE Networking, Sensing and Control, 2005.
Jianhong Zhang, Jiancheng Zou, Yumin Wang
https://doi.org/10.1109/ICNSC.2005.1461343
Conference
(2005), p. 1054
Selectively Convertible Authenticated Encryption in the Random Oracle Model
H.-Y. Chien
https://doi.org/10.1093/comjnl/bxm090
Journal
The Computer Journal
Volume 51, Issue 4 (2007), p. 419
The ring authenticated encryption scheme – How to provide a clue wisely
Jiqiang Lv, Kui Ren, Xiaofeng Chen, Kwangjo Kim
https://doi.org/10.1016/j.ins.2008.09.014
Journal
Information Sciences
Volume 179, Issue 1-2 (2009), p. 161
Export citation
Copy and paste formatted citation
Formatted citation
Placeholder
Citation style
AMS -- Americal Mathematical Society
APA -- American Psychological Association 6th ed.
Chicago -- The Chicago Manual of Style 17th ed.
Download citation in file
Export format
BibTeX
RIS
Authors
Placeholder
Share
RSS
To top