CY Tsai, CY Liu, SC Tsaur,
MS Hwang - Int. J. Netw. Secur., 2017 - ijns.jalaxy.com.tw
In this article, we propose a publicly verifiable authenticated encryption scheme based on
factoring and discrete logarithms. We point out that even if either factoring or discrete …