Gwoboa HORNG


Cryptanalysis of an Efficient User Identification Scheme Based on ID-Based Cryptosystem
Chao-Liang LIU Gwoboa HORNG Hsin-Yu LIU 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2005/05/01
Vol. E88-B  No. 5  pp. 2171-2172
Type of Manuscript:  LETTER
Category: Fundamental Theories for Communications
Keyword: 
cryptanalysisuser identificationID-based cryptosystemwireless network
 Summary | Full Text:PDF

Security Analysis of a Threshold Access Control Scheme Based on Smart Cards
Gwoboa HORNG Chao-Liang LIU Yao-Te HWANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/08/01
Vol. E87-A  No. 8  pp. 2177-2179
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
cryptanalysisaccess controlthreshold schemeimpersonation attack
 Summary | Full Text:PDF

Cryptanalysis of a Key Management Scheme for Secure Multicast Communications
Gwoboa HORNG 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2002/05/01
Vol. E85-B  No. 5  pp. 1050-1051
Type of Manuscript:  LETTER
Category: Internet
Keyword: 
multicast communicationskey managementcryptographyone-way function tree
 Summary | Full Text:PDF

Secret Sharing Schemes with Cheating Detection
Gwoboa HORNG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/03/01
Vol. E84-A  No. 3  pp. 845-850
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
secret sharingcheating detectionaccess structurethreshold schememultiple assignment scheme
 Summary | Full Text:PDF

Active Attacks on Two Efficient Server-Aided RSA Secret Computation Protocols
Gwoboa HORNG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/10/25
Vol. E80-A  No. 10  pp. 2038-2039
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
RSA signature schemeserver-aided secret computationactive attacks
 Summary | Full Text:PDF