Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijact/ijact3.bht:"
@article{DBLP:journals/ijact/AgrawalCS17, author = {Megha Agrawal and Donghoon Chang and Somitra Kumar Sanadhya}, title = {A new authenticated encryption technique for handling long ciphertexts in memory constrained devices}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {3}, pages = {236--261}, year = {2017}, url = {https://doi.org/10.1504/IJACT.2017.10007291}, doi = {10.1504/IJACT.2017.10007291}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/AgrawalCS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/BansalCS17, author = {Tarun Kumar Bansal and Donghoon Chang and Somitra Kumar Sanadhya}, title = {Sponge-based {CCA2} secure asymmetric encryption for arbitrary length message (extended version)}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {3}, pages = {262--287}, year = {2017}, url = {https://doi.org/10.1504/IJACT.2017.10007290}, doi = {10.1504/IJACT.2017.10007290}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/BansalCS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/BosNP17, author = {Joppe W. Bos and Michael Naehrig and Joop van de Pol}, title = {Sieving for shortest vectors in ideal lattices: a practical perspective}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {4}, pages = {313--329}, year = {2017}, url = {https://doi.org/10.1504/IJACT.2017.10010312}, doi = {10.1504/IJACT.2017.10010312}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/BosNP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/ClearG17, author = {Michael Clear and Ciar{\'{a}}n Mc Goldrick}, title = {Attribute-based fully homomorphic encryption with a bounded number of inputs}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {4}, pages = {363--376}, year = {2017}, url = {https://doi.org/10.1504/IJACT.2017.10010329}, doi = {10.1504/IJACT.2017.10010329}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/ClearG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/FengYL17, author = {Yiteng Feng and Guomin Yang and Joseph K. Liu}, title = {A new public remote integrity checking scheme with user and data privacy}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {3}, pages = {196--209}, year = {2017}, url = {https://doi.org/10.1504/IJACT.2017.10007296}, doi = {10.1504/IJACT.2017.10007296}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/FengYL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/GhoshSSC17, author = {Shamit Ghosh and Dhiman Saha and Abhrajit Sengupta and Dipanwita Roy Chowdhury}, title = {Preventing fault attacks using fault randomisation with a case study on {AES}}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {3}, pages = {225--235}, year = {2017}, url = {https://doi.org/10.1504/IJACT.2017.10007295}, doi = {10.1504/IJACT.2017.10007295}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/GhoshSSC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/IshidaSW17, author = {Yuu Ishida and Junji Shikata and Yohei Watanabe}, title = {CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {3}, pages = {288--311}, year = {2017}, url = {https://doi.org/10.1504/IJACT.2017.10007294}, doi = {10.1504/IJACT.2017.10007294}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/IshidaSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/KurosawaP17, author = {Kaoru Kurosawa and Le Trieu Phong}, title = {{IBE} and function-private {IBE} under linear assumptions with shorter ciphertexts and private keys, and extensions}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {3}, pages = {210--224}, year = {2017}, url = {https://doi.org/10.1504/IJACT.2017.10007292}, doi = {10.1504/IJACT.2017.10007292}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/KurosawaP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/LenstraW17, author = {Arjen K. Lenstra and Benjamin Wesolowski}, title = {Trustworthy public randomness with sloth, unicorn, and trx}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {4}, pages = {330--343}, year = {2017}, url = {https://doi.org/10.1504/IJACT.2017.10010315}, doi = {10.1504/IJACT.2017.10010315}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/LenstraW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/Lipmaa17, author = {Helger Lipmaa}, title = {Prover-efficient commit-and-prove zero-knowledge SNARKs}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {4}, pages = {344--362}, year = {2017}, url = {https://doi.org/10.1504/IJACT.2017.10010328}, doi = {10.1504/IJACT.2017.10010328}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/Lipmaa17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/NakagawaNOEHSK17, author = {Sanami Nakagawa and Takashi Nishide and Eiji Okamoto and Keita Emura and Goichiro Hanaoka and Yusuke Sakai and Akihisa Kodate}, title = {A privacy-enhanced access log management mechanism in {SSO} systems from nominative signatures}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {4}, pages = {394--406}, year = {2017}, url = {https://doi.org/10.1504/IJACT.2017.10010348}, doi = {10.1504/IJACT.2017.10010348}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/NakagawaNOEHSK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/SarrE17, author = {Augustin P. Sarr and Philippe Elbaz{-}Vincent}, title = {On the separation between the {FHMQV} and {HMQV} protocols}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {4}, pages = {377--393}, year = {2017}, url = {https://doi.org/10.1504/IJACT.2017.10010330}, doi = {10.1504/IJACT.2017.10010330}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/SarrE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/AliA14, author = {Syed Taqi Ali and B. B. Amberker}, title = {Dynamic attribute-based group signature with verifier-local revocation and backward unlinkability in the standard model}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {2}, pages = {148--165}, year = {2014}, url = {https://doi.org/10.1504/IJACT.2014.062736}, doi = {10.1504/IJACT.2014.062736}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/AliA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/Farashahi14, author = {Reza Rezaeian Farashahi}, title = {Hashing into Hessian curves}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {2}, pages = {139--147}, year = {2014}, url = {https://doi.org/10.1504/IJACT.2014.062737}, doi = {10.1504/IJACT.2014.062737}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/Farashahi14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/LermanBM14, author = {Liran Lerman and Gianluca Bontempi and Olivier Markowitch}, title = {Power analysis attack: an approach based on machine learning}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {2}, pages = {97--115}, year = {2014}, url = {https://doi.org/10.1504/IJACT.2014.062722}, doi = {10.1504/IJACT.2014.062722}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/LermanBM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/LoebenbergerN14, author = {Daniel Loebenberger and Michael N{\"{u}}sken}, title = {Notions for {RSA} integers}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {2}, pages = {116--138}, year = {2014}, url = {https://doi.org/10.1504/IJACT.2014.062723}, doi = {10.1504/IJACT.2014.062723}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/LoebenbergerN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/PatelB14, author = {Hiren J. Patel and Rusty O. Baldwin}, title = {Random Forest profiling attack on advanced encryption standard}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {2}, pages = {181--194}, year = {2014}, url = {https://doi.org/10.1504/IJACT.2014.062740}, doi = {10.1504/IJACT.2014.062740}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/PatelB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/Veugen14, author = {Thijs Veugen}, title = {Encrypted integer division and secure comparison}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {2}, pages = {166--180}, year = {2014}, url = {https://doi.org/10.1504/IJACT.2014.062738}, doi = {10.1504/IJACT.2014.062738}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/Veugen14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/BuchmannDEHR13, author = {Johannes Buchmann and Erik Dahmen and Sarah Ereth and Andreas H{\"{u}}lsing and Markus R{\"{u}}ckert}, title = {On the security of the Winternitz one-time signature scheme}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {1}, pages = {84--96}, year = {2013}, url = {https://doi.org/10.1504/IJACT.2013.053435}, doi = {10.1504/IJACT.2013.053435}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijact/BuchmannDEHR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/ChatterjeeS13, author = {Sanjit Chatterjee and Palash Sarkar}, title = {Practical hybrid (hierarchical) identity-based encryption schemes based on the decisional bilinear Diffie-Hellman assumption}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {1}, pages = {47--83}, year = {2013}, url = {https://doi.org/10.1504/IJACT.2013.053434}, doi = {10.1504/IJACT.2013.053434}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/ChatterjeeS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/JarrousP13, author = {Ayman Jarrous and Benny Pinkas}, title = {Secure computation of functionalities based on Hamming distance and its application to computing document similarity}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {1}, pages = {21--46}, year = {2013}, url = {https://doi.org/10.1504/IJACT.2013.053433}, doi = {10.1504/IJACT.2013.053433}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/JarrousP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/YapKP13, author = {Huihui Yap and Khoongming Khoo and Axel Poschmann}, title = {Parallelisable variants of Camellia and {SMS4} block cipher: p-Camellia and p-SMS4}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {1}, pages = {1--20}, year = {2013}, url = {https://doi.org/10.1504/IJACT.2013.053432}, doi = {10.1504/IJACT.2013.053432}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/YapKP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.