


default search action
International Journal of Applied Cryptography, Volume 5
Volume 5, Number 1, 2024
- Alessandro Aldini
, Suzana Mesquita de Borba Maranhão Moreno, Jean-Marc Seigneur:
Enabling compliant and inclusive financial services using a rule-language. 1-12 - Chengzu Dong, Zhiyu Xu, Shantanu Pal, Frank Jiang, Shiping Chen, Chong Zhang, Xiao Liu:
BlockFedL: a blockchain-based federated learning framework for securing smart UAV delivery systems at the edge. 13-29 - Sigurd Eskeland:
Private set intersection with constant-size encryptions using RSA subgroups. 30-40 - Subinoy Sikdar, Joydeep Biswas, Malay Kule:
Cryptanalysis of Markle-Hellman knapsack cipher using nature inspired algorithms. 41-56
Volume 5, Number 2, 2025
- Shrabani Sutradhar
, Rajesh Bose, Sudipta Majumder, Haraprasad Mondal:
Fortifying cloud-based healthcare: a link load balancer infused with NTRU, honey, and proxy algorithms for robust identity and access management. 71-88 - Manmohan Pundir, Abhimanyu Kumar:
A pairing-free ID-based group key agreement protocol using elliptic curve cryptography for secure group communication. 89-105 - Souvik Sur:
Necessity of large primes and delay commitment in efficient verifiable delay function. 106-118 - Aida Abouelseoud Nasr, Khalid Mohamed Sharaf, Fatma M. Talaat:
Securing continuum computing networks: towards robust encryption protocols for saving digital transformation procedures. 119-130
Volume 5, Number 5, 2025
- Thijs Veugen, Robert S. Wezeman, Alessandro Amadori, Sven Bootsma, Bart Kamphorst:
Secure addition of floating points. 1-11

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.