![]() | ![]() |
2005 | ||
---|---|---|
2 | EE | Shin-Jia Hwang, Hao-Chih Liao: Security of Hsu-Wu's authenticated encryption scheme with (t, n) shared verification. Applied Mathematics and Computation 167(1): 281-285 (2005) |
1 | EE | Shin-Jia Hwang, Hao-Chih Liao: Security of Tzeng-Hwang's authenticated encryption scheme based on elliptic curve discrete logarithm problems. Applied Mathematics and Computation 168(1): 717-721 (2005) |
1 | Shin-Jia Hwang | [1] [2] |