default search action
International Journal of Applied Cryptography, Volume 4
Volume 4, Number 1, 2020
- Thijs Veugen:
Efficient coding for secure computing with additively-homomorphic encrypted data. 1-15 - Mridul Nandi, Tapas Pandit:
Delegation-based conversion from CPA to CCA-secure predicate encryption. 16-35 - Mohammad Reza Mirzaee Shamsabad, Seyed Mojtaba Dehnavi:
Dynamic MDS diffusion layers with efficient software implementation. 36-44 - Narcisse Bang Mbang, Diego de Freitas Aranha
, Emmanuel Fouotsa:
Computing the optimal ate pairing over elliptic curves with embedding degrees 54 and 48 at the 256-bit security level. 45-59
Volume 4, Number 2, 2022
- Jörg Schwenk, Douglas Stebila
:
A reduction-based proof for authentication and session key security in three-party Kerberos. 61-84 - Samiran Bag, Muhammad Ajmal Azad, Feng Hao:
End-to-end verifiable cumulative voting without tallying authorities. 85-103 - Shardha Porwal, Sangeeta Mittal:
Authority revocation scheme for MA-CP-ABE-based secure communication in IoMT ecosystem. 104-120 - Zhuo Qi Chen:
A novel architecture to make anonymous blind signature-based e-coins more efficient and applicable. 121-142
Volume 4, Numbers 3/4, 2024
- Guojun Tang, Rongxing Lu, Mohammad Mamun:
WeightedSim: privacy-preserving weighted similarity query over encrypted healthcare data. 143-155 - Emanuele Bellini, Juan Grados, Rusydi H. Makarim, Carlo Sanna:
Finding differential trails on ChaCha by means of state functions. 156-175 - Zhifa Deng, Jiageng Chen, Shixiong Yao, Pei Li:
PPADMA-ABE: a novel privacy-preserving and auditable attribute-based encryption under dynamic multi-authority setting. 176-194 - Maroti Deshmukh, Arjun Singh Rawat:
Image and object encryption using multiplicative cipher and K-means clustering algorithm. 195-204 - Jiaojiao Du, Sha Ma, Tian Yang, Qiong Huang:
Efficient revocable identity-based encryption with equality test. 205-218 - Abdelrahman Desoky, Hany H. Ammar, Gamal Fahmy, Shaker H. Ali El-Sappagh, Abdeltawab M. Hendawi, Sameh Hassanien Basha:
A novel keyless cryptosystem based on Latin square and cognitive artificial intelligence for blockchain and covert communications. 219-237 - Sandip Kumar Mondal, Mostafizar Rahman, Santanu Sarkar, Avishek Adhikari:
Yoyo cryptanalysis on Future. 238-249
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.