default search action
International Journal of Applied Cryptography (IJACT), Volume 1
Volume 1, Number 1, 2008
- Xavier Boyen:
A tapestry of identity-based encryption: practical frameworks compared. 3-21 - Ivan Damgård, Martin Geisler, Mikkel Krøigaard:
Homomorphic encryption and secure comparison. 22-31 - Gaëtan Leurent:
Practical key-recovery attack against APOP, an MD5-based challenge-response authentication. 32-46 - Markus Jakobsson, Steven A. Myers:
Delayed password disclosure. 47-59 - Kaoru Kurosawa, Swee-Huay Heng:
The power of identification schemes. 60-69 - Yusuke Okada, Yoshifumi Manabe, Tatsuaki Okamoto:
An optimistic fair exchange protocol and its security in the universal composability framework. 70-77
Volume 1, Number 2, 2008
- Mike Burmester, Breno de Medeiros, Rossana Motta:
Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries. 79-90 - Emmanuel Bresson, Mark Manulis:
Securing group key exchange against strong corruptions and key registration attacks. 91-107 - Qiong Huang, Duncan S. Wong:
On the relation among various security models for certificateless cryptography. 108-119 - Thomas Plantard, Willy Susilo, Khin Than Win, Qiong Huang:
Efficient lattice-based signature scheme. 120-132 - Qiong Huang, Dennis Y. W. Liu, Duncan S. Wong:
An efficient one-move Nominative Signature scheme. 133-143 - Amir Herzberg, Igal Yoffe:
The layered games framework for specifications and analysis of security protocols. 144-159
Volume 1, Number 3, 2009
- Risto M. Hakala, Kaisa Nyberg:
A multidimensional linear distinguishing attack on the Shannon cipher. 161-168 - Jiayuan Sui, Douglas R. Stinson:
A critical analysis and improvement of advanced access content system drive-host authentication. 169-180 - Colin Boyd, Yvonne Cliff, Juan Manuel González Nieto, Kenneth G. Paterson:
One-round key exchange in the standard model. 181-199 - Arpita Patra, Ashish Choudhary, C. Pandu Rangan, Kannan Srinathan, Prasad Raghavendra:
Perfectly reliable and secure message transmission tolerating mobile adversary. 200-224 - Qingsong Ye, Huaxiong Wang, Josef Pieprzyk, Xian-Mo Zhang:
Unconditionally secure disjointness tests for private datasets. 225-235 - Alfred Menezes, Berkant Ustaoglu:
Comparing the pre- and post-specified peer models for key agreement. 236-250
Volume 1, Number 4, 2009
- Marko Wolf, André Osterhues, Christian Stüble:
Secure offline superdistribution for mobile platforms. 251-263 - Jianyong Huang, Jennifer Seberry, Willy Susilo:
A five-round algebraic property of AES and its application to the ALPHA-MAC. 264-289 - Sebastian Gajek, Mark Manulis, Jörg Schwenk:
User-aware provably secure protocols for browser-based mutual authentication. 290-308 - Yanjiang Yang, Feng Bao, Xuhua Ding, Robert H. Deng:
Multiuser private queries over encrypted databases. 309-319 - Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik:
Remarks on ''Analysis of one popular group signature scheme'' in Asiacrypt 2006. 320-322 - Ivan Damgård, Martin Geisler, Mikkel Krøigaard:
A correction to 'efficient and secure comparison for on-line auctions'. 323-324
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.