| Keyword : key substitution attacks
|
On Waters' Signature Scheme Chik-How TAN | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/10/01
Vol. E89-A
No. 10 ;
pp. 2684-2685
Type of Manuscript:
Special Section LETTER (Special Section on Information Theory and Its Applications)
Category: Cryptography Keyword: cryptography, signature, key substitution attacks, | | Summary | Full Text:PDF(70.2KB) | |
|
Key Substitution Attacks on Provably Secure Short Signature Schemes Chik-How TAN | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/02/01
Vol. E88-A
No. 2 ;
pp. 611-612
Type of Manuscript:
LETTER
Category: Information Security Keyword: cryptography, key substitution attacks, | | Summary | Full Text:PDF(59.8KB) | |
|
Key Substitution Attacks on Some Provably Secure Signature Schemes Chik-How TAN | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A
No. 1 ;
pp. 226-227
Type of Manuscript:
Special Section LETTER (Special Section on Cryptography and Information Security)
Category: Keyword: cryptography, key substitution attacks, | | Summary | Full Text:PDF(107.8KB) | |
|
|