default search action
International Journal of Applied Cryptography, Volume 3
Volume 3, Number 1, 2013
- Huihui Yap, Khoongming Khoo, Axel Poschmann:
Parallelisable variants of Camellia and SMS4 block cipher: p-Camellia and p-SMS4. 1-20 - Ayman Jarrous, Benny Pinkas:
Secure computation of functionalities based on Hamming distance and its application to computing document similarity. 21-46 - Sanjit Chatterjee, Palash Sarkar:
Practical hybrid (hierarchical) identity-based encryption schemes based on the decisional bilinear Diffie-Hellman assumption. 47-83 - Johannes Buchmann, Erik Dahmen, Sarah Ereth, Andreas Hülsing, Markus Rückert:
On the security of the Winternitz one-time signature scheme. 84-96
Volume 3, Number 2, 2014
- Liran Lerman, Gianluca Bontempi, Olivier Markowitch:
Power analysis attack: an approach based on machine learning. 97-115 - Daniel Loebenberger, Michael Nüsken:
Notions for RSA integers. 116-138 - Reza Rezaeian Farashahi:
Hashing into Hessian curves. 139-147 - Syed Taqi Ali, B. B. Amberker:
Dynamic attribute-based group signature with verifier-local revocation and backward unlinkability in the standard model. 148-165 - Thijs Veugen:
Encrypted integer division and secure comparison. 166-180 - Hiren J. Patel, Rusty O. Baldwin:
Random Forest profiling attack on advanced encryption standard. 181-194
Volume 3, Number 3, 2017
- Yiteng Feng, Guomin Yang, Joseph K. Liu:
A new public remote integrity checking scheme with user and data privacy. 196-209 - Kaoru Kurosawa, Le Trieu Phong:
IBE and function-private IBE under linear assumptions with shorter ciphertexts and private keys, and extensions. 210-224 - Shamit Ghosh, Dhiman Saha, Abhrajit Sengupta, Dipanwita Roy Chowdhury:
Preventing fault attacks using fault randomisation with a case study on AES. 225-235 - Megha Agrawal, Donghoon Chang, Somitra Kumar Sanadhya:
A new authenticated encryption technique for handling long ciphertexts in memory constrained devices. 236-261 - Tarun Kumar Bansal, Donghoon Chang, Somitra Kumar Sanadhya:
Sponge-based CCA2 secure asymmetric encryption for arbitrary length message (extended version). 262-287 - Yuu Ishida, Junji Shikata, Yohei Watanabe:
CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance. 288-311
Volume 3, Number 4, 2017
- Joppe W. Bos, Michael Naehrig, Joop van de Pol:
Sieving for shortest vectors in ideal lattices: a practical perspective. 313-329 - Arjen K. Lenstra, Benjamin Wesolowski:
Trustworthy public randomness with sloth, unicorn, and trx. 330-343 - Helger Lipmaa:
Prover-efficient commit-and-prove zero-knowledge SNARKs. 344-362 - Michael Clear, Ciarán Mc Goldrick:
Attribute-based fully homomorphic encryption with a bounded number of inputs. 363-376 - Augustin P. Sarr, Philippe Elbaz-Vincent:
On the separation between the FHMQV and HMQV protocols. 377-393 - Sanami Nakagawa, Takashi Nishide, Eiji Okamoto, Keita Emura, Goichiro Hanaoka, Yusuke Sakai, Akihisa Kodate:
A privacy-enhanced access log management mechanism in SSO systems from nominative signatures. 394-406
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.