Keyword : forgery attack


Comments on an ID-Based Authenticated Group Key Agreement Protocol with Withstanding Insider Attacks
Tsu-Yang WU Yuh-Min TSENG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/10/01
Vol. E92-A  No. 10 ; pp. 2638-2640
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
group key agreementinsider colluding attackbatch verificationforgery attack
 Summary | Full Text:PDF

Cryptanalysis of an Identity Based Proxy Multi-Signature Scheme
Fagen LI Shijie ZHOU Rong SUN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/07/01
Vol. E91-A  No. 7 ; pp. 1820-1823
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
proxy multi-signaturebilinear pairingsforgery attack
 Summary | Full Text:PDF

A Security Enhanced Timestamp-Based Password Authentication Scheme Using Smart Cards
Al-Sakib Khan PATHAN Choong Seon HONG 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2007/11/01
Vol. E90-D  No. 11 ; pp. 1885-1888
Type of Manuscript:  LETTER
Category: Application Information Security
Keyword: 
authenticationcryptanalysisforgery attacksmart card
 Summary | Full Text:PDF

Vulnerabilities of Wu-Chieu's Improved Password Authentication Scheme Using Smart Cards
Wei-Chi KU Hsiu-Mei CHUANG Maw-Jinn TSAUR 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/11/01
Vol. E88-A  No. 11 ; pp. 3241-3243
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
cryptographypassword authenticationforgery attacksmart card
 Summary | Full Text:PDF

Weaknesses of a Remote User Authentication Scheme Using Smart Cards for Multi-Server Architecture
Wei-Chi KU Shen-Tien CHANG Min-Hung CHIANG 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2005/08/01
Vol. E88-B  No. 8 ; pp. 3451-3454
Type of Manuscript:  LETTER
Category: Fundamental Theories for Communications
Keyword: 
Euclidean planeforgery attackmulti-server architecturepassword authenticationsmart card
 Summary | Full Text:PDF

Security of Kuwakado-Tanaka Transitive Signature Scheme for Directed Trees
Xun YI Chik-How TAN Eiji OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/04/01
Vol. E87-A  No. 4 ; pp. 955-957
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
cryptographytransitive signatureforgery attack
 Summary | Full Text:PDF