


default search action
International Journal of Applied Cryptography (IJACT), Volume 2
Volume 2, Number 1, 2010
- Shaoying Cai, Yingjiu Li, Tieyan Li, Robert H. Deng

, Haixia Yao:
Achieving high security and efficiency in RFID-tagged supply chains. 3-12 - Anders Moen Hagalisletto, Lars Strand:

Designing attacks on SIP call set-up. 13-22 - Hongxia Jin, Jeffrey B. Lotspiech, Serdar Pehlivanoglu:

Defending against the pirate evolution attack. 23-34 - Chifumi Sato, Takeshi Okamoto, Eiji Okamoto:

Strongly unforgeable ID-based signatures without random oracles. 35-45 - Keita Emura

, Atsuko Miyaji
, Kazumasa Omote, Akito Nomura, Masakazu Soshi:
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length. 46-59 - Wentao Zhang, Bozhan Su, Wenling Wu, Dengguo Feng:

Some results on cryptanalysis of SMS4 block cipher. 60-67 - Ewan Fleischmann, Christian Forler, Michael Gorski, Stefan Lucks:

TWISTERpi - a framework for secure and fast hash functions. 68-81
Volume 2, Number 2, 2010
- Cas J. F. Cremers:

Session-StateReveal is stronger than eCKs EphemeralKeyReveal: using automatic analysis to attack the NAXOS protocol. 83-99 - Ian Goldberg, Atefeh Mashatan

, Douglas R. Stinson:
On message recognition protocols: recoverability and explicit confirmation. 100-120 - Emmanuel Prouff, Matthieu Rivain:

Theoretical and practical aspects of mutual information-based side channel analysis. 121-138 - Jeongdae Hong, Jinil Kim, Jihye Kim, Matthew K. Franklin, Kunsoo Park:

Fair threshold decryption with semi-trusted third parties. 139-153 - Alfred Menezes, Berkant Ustaoglu

:
On reusing ephemeral keys in Diffie-Hellman key agreement protocols. 154-158 - Arpita Patra, Ashish Choudhury

, C. Pandu Rangan, Kannan Srinathan:
Unconditionally reliable and secure message transmission in undirected synchronous networks: possibility, feasibility and optimality. 159-197
Volume 2, Number 3, 2012
- Keita Emura

, Atsuko Miyaji
, Mohammad Shahriar Rahman
:
Dynamic attribute-based signcryption without random oracles. 199-211 - Joppe W. Bos, Marcelo E. Kaihara, Thorsten Kleinjung, Arjen K. Lenstra, Peter L. Montgomery:

Solving a 112-bit prime elliptic curve discrete logarithm problem on game consoles using sloppy reduction. 212-228 - Masayuki Abe, Miyako Ohkubo:

A framework for universally composable non-committing blind signatures. 229-249 - M. Jason Hinek, Shaoquan Jiang, Reihaneh Safavi-Naini, Siamak Fayyaz Shahandashti

:
Attribute-based encryption without key cloning. 250-270 - Debrup Chakraborty

, Cuauhtemoc Mancillas-López
:
Double ciphertext mode: a proposal for secure backup. 271-287
Volume 2, Number 4, 2012
- Dana Dachman-Soled, Tal Malkin, Mariana Raykova, Moti Yung:

Efficient robust private set intersection. 289-303 - Qiang Tang

:
Public key encryption schemes supporting equality test with authorisation of different granularity. 304-321 - Marc Stevens

, Arjen K. Lenstra, Benne de Weger:
Chosen-prefix collisions for MD5 and applications. 322-359 - Abdoul Aziz Ciss, Djiby Sow

:
Randomness extraction in elliptic curves and secret key derivation at the end of Diffie-Hellman protocol. 360-365

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














