Cited by 10
Convertible Authenticated Encryption Scheme Without Using Conventional One‐Way Function

2012 International Symposium on Biometrics and Security Technologies
Jia-Lun Tsai, Nai-Wei Lo, Tzong-Chen Wu
Conference:  (2012), p. 54
Proceedings. 2005 IEEE Networking, Sensing and Control, 2005.
Jianhong Zhang, Jiancheng Zou, Yumin Wang
Conference:  (2005), p. 1054
2008 International Conference on Embedded Software and Systems Symposia
Jianhong Zhang, Qin Geng
Conference:  (2008), p. 158
2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE)
Xuhong Li, Wei Zhang, Xia Wang, Muhai Li
Conference:  (2012), p. 504
A New Self-Certified Convertible Authenticated Encryption Scheme Based on Discrete Logarithm Problem
Manoj Kumar Chande, Cheng-Chi Lee, Chun-Ta Li
Journal:  Parallel Processing Letters Volume 26, Issue 04 (2016), p. 1650018
Convertible multi-authenticated encryption scheme with one-way hash function
Jia-Lun Tsai
Journal:  Computer Communications Volume 32, Issue 5 (2009), p. 783
Cryptanalysis of a convertible authenticated encryption scheme based on the ElGamal cryptosystem
Fagen Li, Zhiguang Qin
Journal:  IETE Technical Review Volume 27, Issue 3 (2010), p. 266
On the security of a convertible authenticated encryption
Jianhong Zhang, Yumin Wang
Journal:  Applied Mathematics and Computation Volume 169, Issue 2 (2005), p. 1063
Selectively Convertible Authenticated Encryption in the Random Oracle Model
H.-Y. Chien
Journal:  The Computer Journal Volume 51, Issue 4 (2007), p. 419
The ring authenticated encryption scheme – How to provide a clue wisely
Jiqiang Lv, Kui Ren, Xiaofeng Chen, Kwangjo Kim
Journal:  Information Sciences Volume 179, Issue 1-2 (2009), p. 161