Cited by 10
Convertible Authenticated Encryption Scheme Without Using Conventional One‐Way Function

2008 International Conference on Embedded Software and Systems Symposia
Jianhong Zhang, Qin Geng
Conference  (2008), p. 158
2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE)
Xuhong Li, Wei Zhang, Xia Wang, Muhai Li
Conference  (2012), p. 504
2012 International Symposium on Biometrics and Security Technologies
Jia-Lun Tsai, Nai-Wei Lo, Tzong-Chen Wu
Conference  (2012), p. 54
A New Self-Certified Convertible Authenticated Encryption Scheme Based on Discrete Logarithm Problem
Manoj Kumar Chande, Cheng-Chi Lee, Chun-Ta Li
Journal  Parallel Processing Letters Volume 26, Issue 04 (2016), p. 1650018
Convertible multi-authenticated encryption scheme with one-way hash function
Jia-Lun Tsai
Journal  Computer Communications Volume 32, Issue 5 (2009), p. 783
Cryptanalysis of a convertible authenticated encryption scheme based on the ElGamal cryptosystem
Fagen Li, Zhiguang Qin
Journal  IETE Technical Review Volume 27, Issue 3 (2010), p. 266
On the security of a convertible authenticated encryption
Jianhong Zhang, Yumin Wang
Journal  Applied Mathematics and Computation Volume 169, Issue 2 (2005), p. 1063
Proceedings. 2005 IEEE Networking, Sensing and Control, 2005.
Jianhong Zhang, Jiancheng Zou, Yumin Wang
Conference  (2005), p. 1054
Selectively Convertible Authenticated Encryption in the Random Oracle Model
H.-Y. Chien
Journal  The Computer Journal Volume 51, Issue 4 (2007), p. 419
The ring authenticated encryption scheme – How to provide a clue wisely
Jiqiang Lv, Kui Ren, Xiaofeng Chen, Kwangjo Kim
Journal  Information Sciences Volume 179, Issue 1-2 (2009), p. 161