Stop the war!
Остановите войну!
for scientists:
default search action
International Journal of Applied Cryptography, Volume 4
Volume 4, Number 1, 2020
- Thijs Veugen:
Efficient coding for secure computing with additively-homomorphic encrypted data. 1-15 - Mridul Nandi, Tapas Pandit:
Delegation-based conversion from CPA to CCA-secure predicate encryption. 16-35 - Mohammad Reza Mirzaee Shamsabad, Seyed Mojtaba Dehnavi:
Dynamic MDS diffusion layers with efficient software implementation. 36-44 - Narcisse Bang Mbang, Diego de Freitas Aranha, Emmanuel Fouotsa:
Computing the optimal ate pairing over elliptic curves with embedding degrees 54 and 48 at the 256-bit security level. 45-59
Volume 4, Number 2, 2022
- Jörg Schwenk, Douglas Stebila:
A reduction-based proof for authentication and session key security in three-party Kerberos. 61-84 - Samiran Bag, Muhammad Ajmal Azad, Feng Hao:
End-to-end verifiable cumulative voting without tallying authorities. 85-103 - Shardha Porwal, Sangeeta Mittal:
Authority revocation scheme for MA-CP-ABE-based secure communication in IoMT ecosystem. 104-120 - Zhuo Qi Chen:
A novel architecture to make anonymous blind signature-based e-coins more efficient and applicable. 121-142
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.