default search action
International Journal of Applied Cryptography (IJACT), Volume 2
Volume 2, Number 1, 2010
- Shaoying Cai, Yingjiu Li, Tieyan Li, Robert H. Deng, Haixia Yao:
Achieving high security and efficiency in RFID-tagged supply chains. 3-12 - Anders Moen Hagalisletto, Lars Strand:
Designing attacks on SIP call set-up. 13-22 - Hongxia Jin, Jeffrey B. Lotspiech, Serdar Pehlivanoglu:
Defending against the pirate evolution attack. 23-34 - Chifumi Sato, Takeshi Okamoto, Eiji Okamoto:
Strongly unforgeable ID-based signatures without random oracles. 35-45 - Keita Emura, Atsuko Miyaji, Kazumasa Omote, Akito Nomura, Masakazu Soshi:
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length. 46-59 - Wentao Zhang, Bozhan Su, Wenling Wu, Dengguo Feng:
Some results on cryptanalysis of SMS4 block cipher. 60-67 - Ewan Fleischmann, Christian Forler, Michael Gorski, Stefan Lucks:
TWISTERpi - a framework for secure and fast hash functions. 68-81
Volume 2, Number 2, 2010
- Cas J. F. Cremers:
Session-StateReveal is stronger than eCKs EphemeralKeyReveal: using automatic analysis to attack the NAXOS protocol. 83-99 - Ian Goldberg, Atefeh Mashatan, Douglas R. Stinson:
On message recognition protocols: recoverability and explicit confirmation. 100-120 - Emmanuel Prouff, Matthieu Rivain:
Theoretical and practical aspects of mutual information-based side channel analysis. 121-138 - Jeongdae Hong, Jinil Kim, Jihye Kim, Matthew K. Franklin, Kunsoo Park:
Fair threshold decryption with semi-trusted third parties. 139-153 - Alfred Menezes, Berkant Ustaoglu:
On reusing ephemeral keys in Diffie-Hellman key agreement protocols. 154-158 - Arpita Patra, Ashish Choudhury, C. Pandu Rangan, Kannan Srinathan:
Unconditionally reliable and secure message transmission in undirected synchronous networks: possibility, feasibility and optimality. 159-197
Volume 2, Number 3, 2012
- Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman:
Dynamic attribute-based signcryption without random oracles. 199-211 - Joppe W. Bos, Marcelo E. Kaihara, Thorsten Kleinjung, Arjen K. Lenstra, Peter L. Montgomery:
Solving a 112-bit prime elliptic curve discrete logarithm problem on game consoles using sloppy reduction. 212-228 - Masayuki Abe, Miyako Ohkubo:
A framework for universally composable non-committing blind signatures. 229-249 - M. Jason Hinek, Shaoquan Jiang, Reihaneh Safavi-Naini, Siamak Fayyaz Shahandashti:
Attribute-based encryption without key cloning. 250-270 - Debrup Chakraborty, Cuauhtemoc Mancillas-López:
Double ciphertext mode: a proposal for secure backup. 271-287
Volume 2, Number 4, 2012
- Dana Dachman-Soled, Tal Malkin, Mariana Raykova, Moti Yung:
Efficient robust private set intersection. 289-303 - Qiang Tang:
Public key encryption schemes supporting equality test with authorisation of different granularity. 304-321 - Marc Stevens, Arjen K. Lenstra, Benne de Weger:
Chosen-prefix collisions for MD5 and applications. 322-359 - Abdoul Aziz Ciss, Djiby Sow:
Randomness extraction in elliptic curves and secret key derivation at the end of Diffie-Hellman protocol. 360-365
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.