Login / Signup
A Weakness in Authenticated Encryption Schemes Based on Tseng et al.'s Schemes.
Luis Hernández Encinas
Ángel Martín del Rey
Jaime Muñoz Masqué
Published in:
Int. J. Netw. Secur. (2008)
Keyphrases
</>
encryption scheme
public key encryption
public key
authentication scheme
secret key
provably secure
standard model
hash functions
security model
ciphertext
security analysis
secret sharing scheme
cca secure
proxy re encryption
lossless compression
diffie hellman
data sharing
high dimensional