Key Substitution Attacks on Multisignature Schemes
スポンサーリンク
概要
- 論文の詳細を見る
- 2013-01-01
著者
-
Dou Bennian
School Of Science Nanjing University Of Science & Technology
-
Zhang Hong
School Of Computer Science Nanjing University Of Science & Technology
-
DOU Bennian
School of Science, Nanjing University of Science and Technology
-
ZHANG Hong
School of Computer Science, Nanjing University of Science and Technology
-
XU Chungen
School of Science, Nanjing University of Science and Technology
-
CHEN Chun-Hua
Dept. of Computer and Communication, Chienkuo Technology University
関連論文
- Relationship between Hydrophobicity and Structure of Hydrolyzable Tannins, and Association of Tannins with Crude Drug Constituents in Aqueous Solution
- A High-Linearity 264-MHz Source-Follower-Based Low-Pass Filter with High-Q Second-Order Cell for MB-OFDM UWB
- D404 FATIGUE RELIABILITY ANALYSIS OF FREIGHT CAR AXLE UNDER RANDOM LOADS
- Key Substitution Attacks on the CFS Signature
- On the Security of the Verifiably Encrypted Signature Scheme of Boneh, Gentry, Lynn and Shacham Revisited
- Message and Key Substitution Attacks on Verifiably Encrypted Signature Schemes
- A new algorithm for computing the fuzzy weighted average
- Workspace Generation for Multifingered Manipulation
- Key Substitution Attacks on Multisignature Schemes
- Rogue Key Attacks on Lu et al.'s Verifiably Encrypted Signature Scheme