𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Security of the redefined Liaw’s broadcasting cryptosystem

✍ Scribed by Wen-Tao Zhu; Chuan-Kun Wu


Publisher
Elsevier Science
Year
2008
Tongue
English
Weight
206 KB
Volume
56
Category
Article
ISSN
0898-1221

No coin nor oath required. For personal study only.

✦ Synopsis


Liaw proposed a broadcasting cryptosystem [H.T. Liaw, Broadcasting cryptosystem in computer networks, Computers & Mathematics with Applications 37 (Mar. 1999) 85-87] which claims to involve fewer broadcasting messages, and has attracted quite some research efforts on iterative analysis and improvement [H.M. Sun, Security of broadcasting cryptosystem in computer networks,


📜 SIMILAR VOLUMES


Cryptanalysis of Liaw's broadcasting Cry
✍ Yuh-Min Tseng; Jinn-Ke Jan 📂 Article 📅 2001 🏛 Elsevier Science 🌐 English ⚖ 195 KB

In 1999, Liaw proposed a new broadcasting cryptosystem, which requires smaller bandwidth as compared to the previously proposed broadcasting cryptosystems. However, this article will show that the proposed system is insecure enough by presenting a conspiracy attack on it. We will also point out some

cover
✍ Toohey, Brian 📂 Fiction 📅 2019 🏛 Melbourne University Publishing 🌐 English ⚖ 354 KB 👁 2 views

Intro; Title; Copyright; Contents; Abbreviations; Preface; PART 1: THE CLANDESTINE AGENCIES; 1 The security scandal that the US hid from the newborn ASIO; 2 ASIO struggles with change; 3 An information gatherer mutates into a secret police agency; 4 ASIS: The government agency you pay to break the l

cover
✍ Schwartz, A. Brad 📂 Fiction 📅 2015;2016 🏛 Farrar, Straus and Giroux;Hill and Wang 🌐 English ⚖ 503 KB 👁 2 views

Introduction -- Journalism and showmanship -- Winged Mercury -- Martians of the mind's eye -- Yours in terror -- Public frightener no. 1 -- Air racketeers -- The public interest -- The story of the century -- A matter of psychology -- The horror man -- Conclusion.;On the evening of October 30, 1938,

Comments on the security of Chen’s authe
✍ Mohamed Rasslan; Amr Youssef 📂 Article 📅 2011 🏛 Elsevier Science 🌐 English ⚖ 169 KB

Chen (Computers and Electrical Engineering, vol. 30, 2004) illustrated that Tseng et al.'s authenticated encryption schemes, with message linkages for message flows, do not achieve their claimed integrity and authenticity properties. Furthermore, Chen presented some modified schemes to repair these