


default search action
International Journal of Applied Cryptography, Volume 3
Volume 3, Number 1, 2013
- Huihui Yap, Khoongming Khoo, Axel Poschmann:

Parallelisable variants of Camellia and SMS4 block cipher: p-Camellia and p-SMS4. 1-20 - Ayman Jarrous, Benny Pinkas:

Secure computation of functionalities based on Hamming distance and its application to computing document similarity. 21-46 - Sanjit Chatterjee, Palash Sarkar:

Practical hybrid (hierarchical) identity-based encryption schemes based on the decisional bilinear Diffie-Hellman assumption. 47-83 - Johannes Buchmann, Erik Dahmen, Sarah Ereth, Andreas Hülsing

, Markus Rückert:
On the security of the Winternitz one-time signature scheme. 84-96
Volume 3, Number 2, 2014
- Liran Lerman, Gianluca Bontempi

, Olivier Markowitch:
Power analysis attack: an approach based on machine learning. 97-115 - Daniel Loebenberger

, Michael Nüsken:
Notions for RSA integers. 116-138 - Reza Rezaeian Farashahi

:
Hashing into Hessian curves. 139-147 - Syed Taqi Ali

, B. B. Amberker:
Dynamic attribute-based group signature with verifier-local revocation and backward unlinkability in the standard model. 148-165 - Thijs Veugen:

Encrypted integer division and secure comparison. 166-180 - Hiren J. Patel, Rusty O. Baldwin:

Random Forest profiling attack on advanced encryption standard. 181-194
Volume 3, Number 3, 2017
- Yiteng Feng, Guomin Yang, Joseph K. Liu:

A new public remote integrity checking scheme with user and data privacy. 196-209 - Kaoru Kurosawa, Le Trieu Phong:

IBE and function-private IBE under linear assumptions with shorter ciphertexts and private keys, and extensions. 210-224 - Shamit Ghosh, Dhiman Saha, Abhrajit Sengupta, Dipanwita Roy Chowdhury:

Preventing fault attacks using fault randomisation with a case study on AES. 225-235 - Megha Agrawal, Donghoon Chang, Somitra Kumar Sanadhya:

A new authenticated encryption technique for handling long ciphertexts in memory constrained devices. 236-261 - Tarun Kumar Bansal, Donghoon Chang, Somitra Kumar Sanadhya:

Sponge-based CCA2 secure asymmetric encryption for arbitrary length message (extended version). 262-287 - Yuu Ishida, Junji Shikata, Yohei Watanabe:

CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance. 288-311
Volume 3, Number 4, 2017
- Joppe W. Bos, Michael Naehrig, Joop van de Pol:

Sieving for shortest vectors in ideal lattices: a practical perspective. 313-329 - Arjen K. Lenstra, Benjamin Wesolowski:

Trustworthy public randomness with sloth, unicorn, and trx. 330-343 - Helger Lipmaa:

Prover-efficient commit-and-prove zero-knowledge SNARKs. 344-362 - Michael Clear, Ciarán Mc Goldrick:

Attribute-based fully homomorphic encryption with a bounded number of inputs. 363-376 - Augustin P. Sarr, Philippe Elbaz-Vincent:

On the separation between the FHMQV and HMQV protocols. 377-393 - Sanami Nakagawa, Takashi Nishide, Eiji Okamoto, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, Akihisa Kodate:

A privacy-enhanced access log management mechanism in SSO systems from nominative signatures. 394-406

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














