


default search action
International Journal of Applied Cryptography, Volume 4
Volume 4, Number 1, 2020
- Thijs Veugen:

Efficient coding for secure computing with additively-homomorphic encrypted data. 1-15 - Mridul Nandi, Tapas Pandit:

Delegation-based conversion from CPA to CCA-secure predicate encryption. 16-35 - Mohammad Reza Mirzaee Shamsabad, Seyed Mojtaba Dehnavi:

Dynamic MDS diffusion layers with efficient software implementation. 36-44 - Narcisse Bang Mbang, Diego de Freitas Aranha

, Emmanuel Fouotsa:
Computing the optimal ate pairing over elliptic curves with embedding degrees 54 and 48 at the 256-bit security level. 45-59
Volume 4, Number 2, 2022
- Jörg Schwenk, Douglas Stebila

:
A reduction-based proof for authentication and session key security in three-party Kerberos. 61-84 - Samiran Bag, Muhammad Ajmal Azad, Feng Hao:

End-to-end verifiable cumulative voting without tallying authorities. 85-103 - Shardha Porwal, Sangeeta Mittal:

Authority revocation scheme for MA-CP-ABE-based secure communication in IoMT ecosystem. 104-120 - Zhuo Qi Chen:

A novel architecture to make anonymous blind signature-based e-coins more efficient and applicable. 121-142
Volume 4, Numbers 3/4, 2024
- Guojun Tang, Rongxing Lu, Mohammad Mamun:

WeightedSim: privacy-preserving weighted similarity query over encrypted healthcare data. 143-155 - Emanuele Bellini, Juan Grados, Rusydi H. Makarim, Carlo Sanna:

Finding differential trails on ChaCha by means of state functions. 156-175 - Zhifa Deng, Jiageng Chen

, Shixiong Yao, Pei Li:
PPADMA-ABE: a novel privacy-preserving and auditable attribute-based encryption under dynamic multi-authority setting. 176-194 - Maroti Deshmukh, Arjun Singh Rawat

:
Image and object encryption using multiplicative cipher and K-means clustering algorithm. 195-204 - Jiaojiao Du, Sha Ma, Tian Yang, Qiong Huang:

Efficient revocable identity-based encryption with equality test. 205-218 - Abdelrahman Desoky, Hany H. Ammar, Gamal Fahmy, Shaker H. Ali El-Sappagh, Abdeltawab M. Hendawi, Sameh Hassanien Basha:

A novel keyless cryptosystem based on Latin square and cognitive artificial intelligence for blockchain and covert communications. 219-237 - Sandip Kumar Mondal, Mostafizar Rahman, Santanu Sarkar, Avishek Adhikari:

Yoyo cryptanalysis on Future. 238-249

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














