


default search action
International Journal of Applied Cryptography (IJACT), Volume 1
Volume 1, Number 1, 2008
- Xavier Boyen:

A tapestry of identity-based encryption: practical frameworks compared. 3-21 - Ivan Damgård, Martin Geisler, Mikkel Krøigaard:

Homomorphic encryption and secure comparison. 22-31 - Gaëtan Leurent

:
Practical key-recovery attack against APOP, an MD5-based challenge-response authentication. 32-46 - Markus Jakobsson, Steven A. Myers:

Delayed password disclosure. 47-59 - Kaoru Kurosawa, Swee-Huay Heng

:
The power of identification schemes. 60-69 - Yusuke Okada, Yoshifumi Manabe, Tatsuaki Okamoto:

An optimistic fair exchange protocol and its security in the universal composability framework. 70-77
Volume 1, Number 2, 2008
- Mike Burmester, Breno de Medeiros, Rossana Motta:

Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries. 79-90 - Emmanuel Bresson, Mark Manulis

:
Securing group key exchange against strong corruptions and key registration attacks. 91-107 - Qiong Huang, Duncan S. Wong:

On the relation among various security models for certificateless cryptography. 108-119 - Thomas Plantard

, Willy Susilo
, Khin Than Win
, Qiong Huang:
Efficient lattice-based signature scheme. 120-132 - Qiong Huang, Dennis Y. W. Liu

, Duncan S. Wong:
An efficient one-move Nominative Signature scheme. 133-143 - Amir Herzberg

, Igal Yoffe:
The layered games framework for specifications and analysis of security protocols. 144-159
Volume 1, Number 3, 2009
- Risto M. Hakala, Kaisa Nyberg

:
A multidimensional linear distinguishing attack on the Shannon cipher. 161-168 - Jiayuan Sui, Douglas R. Stinson:

A critical analysis and improvement of advanced access content system drive-host authentication. 169-180 - Colin Boyd, Yvonne Cliff, Juan Manuel González Nieto, Kenneth G. Paterson:

One-round key exchange in the standard model. 181-199 - Arpita Patra, Ashish Choudhary

, C. Pandu Rangan, Kannan Srinathan, Prasad Raghavendra:
Perfectly reliable and secure message transmission tolerating mobile adversary. 200-224 - Qingsong Ye, Huaxiong Wang, Josef Pieprzyk

, Xian-Mo Zhang:
Unconditionally secure disjointness tests for private datasets. 225-235 - Alfred Menezes, Berkant Ustaoglu

:
Comparing the pre- and post-specified peer models for key agreement. 236-250
Volume 1, Number 4, 2009
- Marko Wolf

, André Osterhues, Christian Stüble:
Secure offline superdistribution for mobile platforms. 251-263 - Jianyong Huang, Jennifer Seberry, Willy Susilo

:
A five-round algebraic property of AES and its application to the ALPHA-MAC. 264-289 - Sebastian Gajek, Mark Manulis

, Jörg Schwenk:
User-aware provably secure protocols for browser-based mutual authentication. 290-308 - Yanjiang Yang, Feng Bao, Xuhua Ding

, Robert H. Deng
:
Multiuser private queries over encrypted databases. 309-319 - Giuseppe Ateniese

, Jan Camenisch, Marc Joye, Gene Tsudik:
Remarks on ''Analysis of one popular group signature scheme'' in Asiacrypt 2006. 320-322 - Ivan Damgård, Martin Geisler, Mikkel Krøigaard:

A correction to 'efficient and secure comparison for on-line auctions'. 323-324

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














