Keyword : key substitution attacks


On Waters' Signature Scheme
Chik-How TAN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/10/01
Vol. E89-A  No. 10 ; pp. 2684-2685
Type of Manuscript:  Special Section LETTER (Special Section on Information Theory and Its Applications)
Category: Cryptography
Keyword: 
cryptographysignaturekey substitution attacks
 Summary | Full Text:PDF(70.2KB)

Key Substitution Attacks on Provably Secure Short Signature Schemes
Chik-How TAN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/02/01
Vol. E88-A  No. 2 ; pp. 611-612
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
cryptographykey substitution attacks
 Summary | Full Text:PDF(59.8KB)

Key Substitution Attacks on Some Provably Secure Signature Schemes
Chik-How TAN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A  No. 1 ; pp. 226-227
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
cryptographykey substitution attacks
 Summary | Full Text:PDF(107.8KB)