Fagen LI


Linearization Equation Attack on 2-Layer Nonlinear Piece in Hand Method
Xuyun NIE Albrecht PETZOLDT Johannes BUCHMANN Fagen LI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/09/01
Vol. E97-A  No. 9  pp. 1952-1961
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
multivariate cryptographyquadratic polynomialsalgebraic cryptanalysislinearization equationspiece in hand
 Summary | Full Text:PDF(805.9KB)

Improvement on a Knapsack-Based Probabilistic Encryption Scheme
Baocang WANG Fagen LI Yupu HU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/01/01
Vol. E97-A  No. 1  pp. 421-424
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
public key cryptographyknapsack problemsecurity analysistrapdoor knapsack
 Summary | Full Text:PDF(96.3KB)

Identity-Based Public Verification with Privacy-Preserving for Data Storage Security in Cloud Computing
Jining ZHAO Chunxiang XU Fagen LI Wenzheng ZHANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/12/01
Vol. E96-A  No. 12  pp. 2709-2716
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
cloud computingstorage securityidentity-basedpublic verificationprivacy-preserving
 Summary | Full Text:PDF(697.5KB)

Analysis and Improvement of a Secret Broadcast with Binding Encryption in Broadcasting Networks
Mingwu ZHANG Fagen LI Tsuyoshi TAKAGI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/02/01
Vol. E95-D  No. 2  pp. 686-689
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
secret broadcastbinding encryptionpublic keydecryption consistency
 Summary | Full Text:PDF(83.7KB)

Security Flaw of an Improved User Authentication Scheme with User Anonymity for Wireless Communications
Hu XIONG Xiaofeng WANG Fagen LI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1  pp. 256-258
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
wireless communicationuser authenticationanonymitycryptanalysis
 Summary | Full Text:PDF(63.3KB)

Cryptanalysis of Strong Designated Verifier Signature Scheme with Non-delegatability and Non-transferability
Mingwu ZHANG Tsuyoshi TAKAGI Bo YANG Fagen LI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1  pp. 259-262
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
strong designated verifier signatureunforgeabilitynon-delegatabilitynon-transferabilityprivacy of signer identity
 Summary | Full Text:PDF(86.2KB)

An Improved Authenticated Encryption Scheme
Fagen LI Jiang DENG Tsuyoshi TAKAGI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/11/01
Vol. E94-D  No. 11  pp. 2171-2172
Type of Manuscript:  Special Section LETTER (Special Section on Information and Communication System Security)
Category: 
Keyword: 
authenticated encryptionunforgeabilityconfidentialitynon-repudiation
 Summary | Full Text:PDF(54.6KB)

Analysis of an Identity-Based Signcryption Scheme in the Standard Model
Fagen LI Yongjian LIAO Zhiguang QIN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1  pp. 268-269
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
cryptographyidentity-based signcryptionstandard modelattack
 Summary | Full Text:PDF(78.7KB)

Cryptanalysis of an Identity Based Proxy Multi-Signature Scheme
Fagen LI Shijie ZHOU Rong SUN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/07/01
Vol. E91-A  No. 7  pp. 1820-1823
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
proxy multi-signaturebilinear pairingsforgery attack
 Summary | Full Text:PDF(81.4KB)