Cryptanalysis of Tseng et al.'s authenticated encryption schemes.
Qi XieXiuyuan YuPublished in: Appl. Math. Comput. (2004)
Keyphrases
- encryption scheme
- secret key
- hash functions
- authentication scheme
- key distribution
- security analysis
- smart card
- standard model
- ciphertext
- public key
- similarity search
- diffie hellman
- signature scheme
- secure communication
- cca secure
- secret sharing scheme
- key management
- provably secure
- proxy re encryption
- security model
- public key encryption
- authentication protocol
- image encryption
- s box
- secret sharing
- databases
- homomorphic encryption
- cost effective
- image processing