Cryptology ePrint Archive: Report 2004/257

Available versions in chronological order


Interleaving Attack on ID-based Conference Key Distribution Schemes
Junghyun Nam, Seungjoo Kim, and Dongho Won

Interleaving Attack on ID-based Conference Key Distribution Schemes
Junghyun Nam, Seungjoo Kim, and Dongho Won

A Weakness in Jung-Paeng-Kim's ID-based Conference Key Distribution Scheme
Junghyun Nam, Seungjoo Kim, and Dongho Won


[ Cryptology ePrint archive ]