Search dblp for Publications

export results for "toc:db/journals/ijact/ijact3.bht:"

 download as .bib file

@article{DBLP:journals/ijact/AgrawalCS17,
  author       = {Megha Agrawal and
                  Donghoon Chang and
                  Somitra Kumar Sanadhya},
  title        = {A new authenticated encryption technique for handling long ciphertexts
                  in memory constrained devices},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {3},
  pages        = {236--261},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJACT.2017.10007291},
  doi          = {10.1504/IJACT.2017.10007291},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/AgrawalCS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/BansalCS17,
  author       = {Tarun Kumar Bansal and
                  Donghoon Chang and
                  Somitra Kumar Sanadhya},
  title        = {Sponge-based {CCA2} secure asymmetric encryption for arbitrary length
                  message (extended version)},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {3},
  pages        = {262--287},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJACT.2017.10007290},
  doi          = {10.1504/IJACT.2017.10007290},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/BansalCS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/BosNP17,
  author       = {Joppe W. Bos and
                  Michael Naehrig and
                  Joop van de Pol},
  title        = {Sieving for shortest vectors in ideal lattices: a practical perspective},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {4},
  pages        = {313--329},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJACT.2017.10010312},
  doi          = {10.1504/IJACT.2017.10010312},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/BosNP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/ClearG17,
  author       = {Michael Clear and
                  Ciar{\'{a}}n Mc Goldrick},
  title        = {Attribute-based fully homomorphic encryption with a bounded number
                  of inputs},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {4},
  pages        = {363--376},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJACT.2017.10010329},
  doi          = {10.1504/IJACT.2017.10010329},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/ClearG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/FengYL17,
  author       = {Yiteng Feng and
                  Guomin Yang and
                  Joseph K. Liu},
  title        = {A new public remote integrity checking scheme with user and data privacy},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {3},
  pages        = {196--209},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJACT.2017.10007296},
  doi          = {10.1504/IJACT.2017.10007296},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/FengYL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/GhoshSSC17,
  author       = {Shamit Ghosh and
                  Dhiman Saha and
                  Abhrajit Sengupta and
                  Dipanwita Roy Chowdhury},
  title        = {Preventing fault attacks using fault randomisation with a case study
                  on {AES}},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {3},
  pages        = {225--235},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJACT.2017.10007295},
  doi          = {10.1504/IJACT.2017.10007295},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/GhoshSSC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/IshidaSW17,
  author       = {Yuu Ishida and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {CCA-secure revocable identity-based encryption schemes with decryption
                  key exposure resistance},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {3},
  pages        = {288--311},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJACT.2017.10007294},
  doi          = {10.1504/IJACT.2017.10007294},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/IshidaSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/KurosawaP17,
  author       = {Kaoru Kurosawa and
                  Le Trieu Phong},
  title        = {{IBE} and function-private {IBE} under linear assumptions with shorter
                  ciphertexts and private keys, and extensions},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {3},
  pages        = {210--224},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJACT.2017.10007292},
  doi          = {10.1504/IJACT.2017.10007292},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/KurosawaP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/LenstraW17,
  author       = {Arjen K. Lenstra and
                  Benjamin Wesolowski},
  title        = {Trustworthy public randomness with sloth, unicorn, and trx},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {4},
  pages        = {330--343},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJACT.2017.10010315},
  doi          = {10.1504/IJACT.2017.10010315},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/LenstraW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/Lipmaa17,
  author       = {Helger Lipmaa},
  title        = {Prover-efficient commit-and-prove zero-knowledge SNARKs},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {4},
  pages        = {344--362},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJACT.2017.10010328},
  doi          = {10.1504/IJACT.2017.10010328},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/Lipmaa17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/NakagawaNOEHSK17,
  author       = {Sanami Nakagawa and
                  Takashi Nishide and
                  Eiji Okamoto and
                  Keita Emura and
                  Goichiro Hanaoka and
                  Yusuke Sakai and
                  Akihisa Kodate},
  title        = {A privacy-enhanced access log management mechanism in {SSO} systems
                  from nominative signatures},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {4},
  pages        = {394--406},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJACT.2017.10010348},
  doi          = {10.1504/IJACT.2017.10010348},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/NakagawaNOEHSK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/SarrE17,
  author       = {Augustin P. Sarr and
                  Philippe Elbaz{-}Vincent},
  title        = {On the separation between the {FHMQV} and {HMQV} protocols},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {4},
  pages        = {377--393},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJACT.2017.10010330},
  doi          = {10.1504/IJACT.2017.10010330},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/SarrE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/AliA14,
  author       = {Syed Taqi Ali and
                  B. B. Amberker},
  title        = {Dynamic attribute-based group signature with verifier-local revocation
                  and backward unlinkability in the standard model},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {2},
  pages        = {148--165},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJACT.2014.062736},
  doi          = {10.1504/IJACT.2014.062736},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/AliA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/Farashahi14,
  author       = {Reza Rezaeian Farashahi},
  title        = {Hashing into Hessian curves},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {2},
  pages        = {139--147},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJACT.2014.062737},
  doi          = {10.1504/IJACT.2014.062737},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/Farashahi14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/LermanBM14,
  author       = {Liran Lerman and
                  Gianluca Bontempi and
                  Olivier Markowitch},
  title        = {Power analysis attack: an approach based on machine learning},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {2},
  pages        = {97--115},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJACT.2014.062722},
  doi          = {10.1504/IJACT.2014.062722},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/LermanBM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/LoebenbergerN14,
  author       = {Daniel Loebenberger and
                  Michael N{\"{u}}sken},
  title        = {Notions for {RSA} integers},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {2},
  pages        = {116--138},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJACT.2014.062723},
  doi          = {10.1504/IJACT.2014.062723},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/LoebenbergerN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/PatelB14,
  author       = {Hiren J. Patel and
                  Rusty O. Baldwin},
  title        = {Random Forest profiling attack on advanced encryption standard},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {2},
  pages        = {181--194},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJACT.2014.062740},
  doi          = {10.1504/IJACT.2014.062740},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/PatelB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/Veugen14,
  author       = {Thijs Veugen},
  title        = {Encrypted integer division and secure comparison},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {2},
  pages        = {166--180},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJACT.2014.062738},
  doi          = {10.1504/IJACT.2014.062738},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/Veugen14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/BuchmannDEHR13,
  author       = {Johannes Buchmann and
                  Erik Dahmen and
                  Sarah Ereth and
                  Andreas H{\"{u}}lsing and
                  Markus R{\"{u}}ckert},
  title        = {On the security of the Winternitz one-time signature scheme},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {1},
  pages        = {84--96},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJACT.2013.053435},
  doi          = {10.1504/IJACT.2013.053435},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijact/BuchmannDEHR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/ChatterjeeS13,
  author       = {Sanjit Chatterjee and
                  Palash Sarkar},
  title        = {Practical hybrid (hierarchical) identity-based encryption schemes
                  based on the decisional bilinear Diffie-Hellman assumption},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {1},
  pages        = {47--83},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJACT.2013.053434},
  doi          = {10.1504/IJACT.2013.053434},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/ChatterjeeS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/JarrousP13,
  author       = {Ayman Jarrous and
                  Benny Pinkas},
  title        = {Secure computation of functionalities based on Hamming distance and
                  its application to computing document similarity},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {1},
  pages        = {21--46},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJACT.2013.053433},
  doi          = {10.1504/IJACT.2013.053433},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/JarrousP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/YapKP13,
  author       = {Huihui Yap and
                  Khoongming Khoo and
                  Axel Poschmann},
  title        = {Parallelisable variants of Camellia and {SMS4} block cipher: p-Camellia
                  and p-SMS4},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {1},
  pages        = {1--20},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJACT.2013.053432},
  doi          = {10.1504/IJACT.2013.053432},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/YapKP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics