Keyword : signcryption


One-Round Authenticated Key Exchange with Strong Forward Secrecy in the Standard Model against Constrained Adversary
Kazuki YONEYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/06/01
Vol. E96-A  No. 6 ; pp. 1124-1138
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
authenticated key exchangestrong forward secrecysigncryption
 Summary | Full Text:PDF(302.3KB)

Forgery of Provable Secure Short Signcryption Scheme
Chik-How TAN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/09/01
Vol. E90-A  No. 9 ; pp. 1879-1880
Type of Manuscript:  Special Section LETTER (Special Section on Information Theory and Its Applications)
Category: 
Keyword: 
cryptographysigncryption
 Summary | Full Text:PDF(62KB)

Security Analysis of Signcryption Scheme from q-Diffie-Hellman Problems
Chik-How TAN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A  No. 1 ; pp. 206-208
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography
Keyword: 
cryptographysigncryption
 Summary | Full Text:PDF(77KB)

On the Security of Signcryption Scheme with Key Privacy
Chik-How TAN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/04/01
Vol. E88-A  No. 4 ; pp. 1093-1095
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
cryptographysigncryption
 Summary | Full Text:PDF(69.9KB)

A Secure LITESET Scheme
Jau-Ji SHEN Iuon-Chang LIN Min-Shiang HWANG 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2004/11/01
Vol. E87-D  No. 11 ; pp. 2509-2512
Type of Manuscript:  LETTER
Category: Application Information Security
Keyword: 
cryptographyLITESETSETsigncryption
 Summary | Full Text:PDF(84.7KB)

Cryptanalysis of Publicly Verifiable Authenticated Encryption
Ting-Yi CHANG Chou-Chen YANG Min-Shiang HWANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/06/01
Vol. E87-A  No. 6 ; pp. 1645-1646
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
authenticated encryption schemediscrete logarithmssigncryption
 Summary | Full Text:PDF(55.1KB)

Unconditionally Secure Authenticated Encryption
Junji SHIKATA Goichiro HANAOKA Yuliang ZHENG Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/05/01
Vol. E87-A  No. 5 ; pp. 1119-1131
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
unconditional securityencryptionauthenticated encryptionsigncryption
 Summary | Full Text:PDF(293.6KB)

A Distributed Sign-and-Encryption for Anonymity
DongJin KWAK SangJae MOON 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A  No. 1 ; pp. 228-230
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
cryptographysecuritysignaturegroup signaturesigncryptionanonymity
 Summary | Full Text:PDF(131.7KB)

Improving the Secure Electronic Transaction Protocol by Using Signcryption
Goichiro HANAOKA Yuliang ZHENG Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/08/01
Vol. E84-A  No. 8 ; pp. 2042-2051
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
signcryptionSETcomputational overheadmessage overhead
 Summary | Full Text:PDF(413KB)