欢迎您!
东篱公司
退出
申报数据库
申报指南
立项数据库
成果数据库
期刊论文
会议论文
著 作
专 利
项目获奖数据库
位置:
成果数据库
>
会议
> 会议详情页
Key Substitution Attacks on Two Short Signature Schemes from Bilinear Pairings
所属机构名称:青岛大学
会议名称:The 4th International Conference on Intelligent Information Technology Application ( IITA 2010)
成果类型:会议
相关项目:前向安全签名和前向安全门限签名的研究
作者:
Jia Yu|Fanyu Kong|
同会议论文项目
前向安全签名和前向安全门限签名的研究
期刊论文 20
会议论文 17
同项目会议论文
Server-Assisted Signature with Forward-Security for Mobile User
Cryptanalysis of Two Threshold Proxy Signature Schemes Based on RSA Cryptosystem
Cryptanalysis of a Robust Protocol for Generating Shared RSA Parameters
新的可验证多秘密共享方案
How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing Scheme
Construction of Server-assisted Forward Secure Signature Using Bellare-Miner Scheme
Security Analysis of A Flexible Forward-Secure Signature Scheme
A Note on the Security Proof of Yet Another Forward Secure Signature From Bilinear Pairings
Cryptanalysis of Vo-Kim Forward Secure Signature in ICISC2005
Number-Theoretic Attack on Lyuu-Wu's Multi-proxy Multi-signature Scheme
Security Analysis of a Shared Modular Inversion Protocol for RSA Cryptosystem
Security analysis of a provably secure identity-based signature scheme using bilinear parings
Two efficient algorithms against power attacks for elliptic curve cryptosystems
Key Substitution Attack on an Improved Short Signature Scheme without Random Oracles
A Publicly Verifiable Dynamic Sharing Protocol for Data Secure Storage
Construction of Yet Another Forward Secure Signature Scheme Using Bilinear Maps