|
Several Classes of Even-Variable Balanced Boolean Functions with Optimal Algebraic Immunity Chik-How TAN Siong-Thye GOH | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A
No. 1
pp. 165-171
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security) Category: Mathematics Keyword: cryptography, boolean function, optimal algebraic immunity, nonlinearity, | | Summary | Full Text:PDF(357.3KB) | |
|
On the Security of Provably Secure Multi-Receiver ID-Based Signcryption Scheme Chik-How TAN | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/07/01
Vol. E91-A
No. 7
pp. 1836-1838
Type of Manuscript:
LETTER Category: Cryptography and Information Security Keyword: cryptography, identity-based signcryption, | | Summary | Full Text:PDF(76.6KB) | |
|
Security Analysis of Joint Group Key Agreement Protocol Chik-How TAN | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/09/01
Vol. E90-A
No. 9
pp. 1876-1878
Type of Manuscript:
Special Section LETTER (Special Section on Information Theory and Its Applications) Category: Keyword: group key agreement, backward secrecy, | | Summary | Full Text:PDF(65.8KB) | |
|
Forgery of Provable Secure Short Signcryption Scheme Chik-How TAN | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/09/01
Vol. E90-A
No. 9
pp. 1879-1880
Type of Manuscript:
Special Section LETTER (Special Section on Information Theory and Its Applications) Category: Keyword: cryptography, signcryption, | | Summary | Full Text:PDF(62KB) | |
|
On Waters' Signature Scheme Chik-How TAN | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/10/01
Vol. E89-A
No. 10
pp. 2684-2685
Type of Manuscript:
Special Section LETTER (Special Section on Information Theory and Its Applications) Category: Cryptography Keyword: cryptography, signature, key substitution attacks, | | Summary | Full Text:PDF(70.2KB) | |
|
Signature Scheme in Multi-User Setting Chik-How TAN | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/05/01
Vol. E89-A
No. 5
pp. 1339-1345
Type of Manuscript:
Special Section PAPER (Special Section on Discrete Mathematics and Its Applications) Category: Keyword: cryptography, bilinear map, signatures, | | Summary | Full Text:PDF(166.6KB) | |
|
Security Analysis of Signcryption Scheme from q-Diffie-Hellman Problems Chik-How TAN | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A
No. 1
pp. 206-208
Type of Manuscript:
Special Section LETTER (Special Section on Cryptography and Information Security) Category: Public Key Cryptography Keyword: cryptography, signcryption, | | Summary | Full Text:PDF(77KB) | |
|
On the Security of Signcryption Scheme with Key Privacy Chik-How TAN | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/04/01
Vol. E88-A
No. 4
pp. 1093-1095
Type of Manuscript:
LETTER Category: Information Security Keyword: cryptography, signcryption, | | Summary | Full Text:PDF(69.9KB) | |
|
Key Substitution Attacks on Provably Secure Short Signature Schemes Chik-How TAN | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/02/01
Vol. E88-A
No. 2
pp. 611-612
Type of Manuscript:
LETTER Category: Information Security Keyword: cryptography, key substitution attacks, | | Summary | Full Text:PDF(59.8KB) | |
|
On Diffie-Hellman Problems in 3rd Order Shift Register Chik-How TAN Xun YI Chee-Kheong SIEW | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/05/01
Vol. E87-A
No. 5
pp. 1206-1208
Type of Manuscript:
Special Section LETTER (Special Section on Discrete Mathematics and Its Applications) Category: Keyword: cryptography, shift register, Diffie-Hellman problems, | | Summary | Full Text:PDF(96.4KB) | |
|
|
|
Key Substitution Attacks on Some Provably Secure Signature Schemes Chik-How TAN | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A
No. 1
pp. 226-227
Type of Manuscript:
Special Section LETTER (Special Section on Cryptography and Information Security) Category: Keyword: cryptography, key substitution attacks, | | Summary | Full Text:PDF(107.8KB) | |
|
A New Provably Secure Signature Scheme Chik-How TAN Xun YI Chee-Kheong SIEW | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/10/01
Vol. E86-A
No. 10
pp. 2633-2635
Type of Manuscript:
Special Section LETTER (Special Section on Information Theory and Its Applications) Category: Information Security Keyword: cryptography, digital signature, strong RSA assumption, | | Summary | Full Text:PDF(142.4KB) | |
|
On the n-th Order Shift Register Based Discrete Logarithm Chik-How TAN Xun YI Chee-Kheong SIEW | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/05/01
Vol. E86-A
No. 5
pp. 1213-1216
Type of Manuscript:
Special Section LETTER (Special Section on Discrete Mathematics and Its Applications) Category: Keyword: cryptography, shift registers, discrete logarithm, | | Summary | Full Text:PDF(148.1KB) | |
|
|
|