Search dblp for Publications

export results for "stream:streams/journals/ijact:"

 download as .bib file

@article{DBLP:journals/ijact/BagAH22,
  author       = {Samiran Bag and
                  Muhammad Ajmal Azad and
                  Feng Hao},
  title        = {End-to-end verifiable cumulative voting without tallying authorities},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {4},
  number       = {2},
  pages        = {85--103},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJACT.2022.10056073},
  doi          = {10.1504/IJACT.2022.10056073},
  timestamp    = {Wed, 24 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/BagAH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/Chen22,
  author       = {Zhuo Qi Chen},
  title        = {A novel architecture to make anonymous blind signature-based e-coins
                  more efficient and applicable},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {4},
  number       = {2},
  pages        = {121--142},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJACT.2022.10056083},
  doi          = {10.1504/IJACT.2022.10056083},
  timestamp    = {Wed, 24 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/Chen22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/PorwalM22,
  author       = {Shardha Porwal and
                  Sangeeta Mittal},
  title        = {Authority revocation scheme for MA-CP-ABE-based secure communication
                  in IoMT ecosystem},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {4},
  number       = {2},
  pages        = {104--120},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJACT.2022.10056082},
  doi          = {10.1504/IJACT.2022.10056082},
  timestamp    = {Wed, 24 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/PorwalM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/SchwenkS22,
  author       = {J{\"{o}}rg Schwenk and
                  Douglas Stebila},
  title        = {A reduction-based proof for authentication and session key security
                  in three-party Kerberos},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {4},
  number       = {2},
  pages        = {61--84},
  year         = {2022},
  url          = {https://doi.org/10.1504/IJACT.2022.10052385},
  doi          = {10.1504/IJACT.2022.10052385},
  timestamp    = {Wed, 24 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/SchwenkS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/MbangAF20,
  author       = {Narcisse Bang Mbang and
                  Diego de Freitas Aranha and
                  Emmanuel Fouotsa},
  title        = {Computing the optimal ate pairing over elliptic curves with embedding
                  degrees 54 and 48 at the 256-bit security level},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {4},
  number       = {1},
  pages        = {45--59},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJACT.2020.107167},
  doi          = {10.1504/IJACT.2020.107167},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/MbangAF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/NandiP20,
  author       = {Mridul Nandi and
                  Tapas Pandit},
  title        = {Delegation-based conversion from {CPA} to CCA-secure predicate encryption},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {4},
  number       = {1},
  pages        = {16--35},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJACT.2020.107163},
  doi          = {10.1504/IJACT.2020.107163},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/NandiP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/ShamsabadD20,
  author       = {Mohammad Reza Mirzaee Shamsabad and
                  Seyed Mojtaba Dehnavi},
  title        = {Dynamic {MDS} diffusion layers with efficient software implementation},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {4},
  number       = {1},
  pages        = {36--44},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJACT.2020.107164},
  doi          = {10.1504/IJACT.2020.107164},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/ShamsabadD20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/Veugen20,
  author       = {Thijs Veugen},
  title        = {Efficient coding for secure computing with additively-homomorphic
                  encrypted data},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {4},
  number       = {1},
  pages        = {1--15},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJACT.2020.107160},
  doi          = {10.1504/IJACT.2020.107160},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/Veugen20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/AgrawalCS17,
  author       = {Megha Agrawal and
                  Donghoon Chang and
                  Somitra Kumar Sanadhya},
  title        = {A new authenticated encryption technique for handling long ciphertexts
                  in memory constrained devices},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {3},
  pages        = {236--261},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJACT.2017.10007291},
  doi          = {10.1504/IJACT.2017.10007291},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/AgrawalCS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/BansalCS17,
  author       = {Tarun Kumar Bansal and
                  Donghoon Chang and
                  Somitra Kumar Sanadhya},
  title        = {Sponge-based {CCA2} secure asymmetric encryption for arbitrary length
                  message (extended version)},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {3},
  pages        = {262--287},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJACT.2017.10007290},
  doi          = {10.1504/IJACT.2017.10007290},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/BansalCS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/BosNP17,
  author       = {Joppe W. Bos and
                  Michael Naehrig and
                  Joop van de Pol},
  title        = {Sieving for shortest vectors in ideal lattices: a practical perspective},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {4},
  pages        = {313--329},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJACT.2017.10010312},
  doi          = {10.1504/IJACT.2017.10010312},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/BosNP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/ClearG17,
  author       = {Michael Clear and
                  Ciar{\'{a}}n Mc Goldrick},
  title        = {Attribute-based fully homomorphic encryption with a bounded number
                  of inputs},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {4},
  pages        = {363--376},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJACT.2017.10010329},
  doi          = {10.1504/IJACT.2017.10010329},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/ClearG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/FengYL17,
  author       = {Yiteng Feng and
                  Guomin Yang and
                  Joseph K. Liu},
  title        = {A new public remote integrity checking scheme with user and data privacy},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {3},
  pages        = {196--209},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJACT.2017.10007296},
  doi          = {10.1504/IJACT.2017.10007296},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/FengYL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/GhoshSSC17,
  author       = {Shamit Ghosh and
                  Dhiman Saha and
                  Abhrajit Sengupta and
                  Dipanwita Roy Chowdhury},
  title        = {Preventing fault attacks using fault randomisation with a case study
                  on {AES}},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {3},
  pages        = {225--235},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJACT.2017.10007295},
  doi          = {10.1504/IJACT.2017.10007295},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/GhoshSSC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/IshidaSW17,
  author       = {Yuu Ishida and
                  Junji Shikata and
                  Yohei Watanabe},
  title        = {CCA-secure revocable identity-based encryption schemes with decryption
                  key exposure resistance},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {3},
  pages        = {288--311},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJACT.2017.10007294},
  doi          = {10.1504/IJACT.2017.10007294},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/IshidaSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/KurosawaP17,
  author       = {Kaoru Kurosawa and
                  Le Trieu Phong},
  title        = {{IBE} and function-private {IBE} under linear assumptions with shorter
                  ciphertexts and private keys, and extensions},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {3},
  pages        = {210--224},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJACT.2017.10007292},
  doi          = {10.1504/IJACT.2017.10007292},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/KurosawaP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/LenstraW17,
  author       = {Arjen K. Lenstra and
                  Benjamin Wesolowski},
  title        = {Trustworthy public randomness with sloth, unicorn, and trx},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {4},
  pages        = {330--343},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJACT.2017.10010315},
  doi          = {10.1504/IJACT.2017.10010315},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/LenstraW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/Lipmaa17,
  author       = {Helger Lipmaa},
  title        = {Prover-efficient commit-and-prove zero-knowledge SNARKs},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {4},
  pages        = {344--362},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJACT.2017.10010328},
  doi          = {10.1504/IJACT.2017.10010328},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/Lipmaa17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/NakagawaNOEHSK17,
  author       = {Sanami Nakagawa and
                  Takashi Nishide and
                  Eiji Okamoto and
                  Keita Emura and
                  Goichiro Hanaoka and
                  Yusuke Sakai and
                  Akihisa Kodate},
  title        = {A privacy-enhanced access log management mechanism in {SSO} systems
                  from nominative signatures},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {4},
  pages        = {394--406},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJACT.2017.10010348},
  doi          = {10.1504/IJACT.2017.10010348},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/NakagawaNOEHSK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/SarrE17,
  author       = {Augustin P. Sarr and
                  Philippe Elbaz{-}Vincent},
  title        = {On the separation between the {FHMQV} and {HMQV} protocols},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {4},
  pages        = {377--393},
  year         = {2017},
  url          = {https://doi.org/10.1504/IJACT.2017.10010330},
  doi          = {10.1504/IJACT.2017.10010330},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/SarrE17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/AliA14,
  author       = {Syed Taqi Ali and
                  B. B. Amberker},
  title        = {Dynamic attribute-based group signature with verifier-local revocation
                  and backward unlinkability in the standard model},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {2},
  pages        = {148--165},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJACT.2014.062736},
  doi          = {10.1504/IJACT.2014.062736},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/AliA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/Farashahi14,
  author       = {Reza Rezaeian Farashahi},
  title        = {Hashing into Hessian curves},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {2},
  pages        = {139--147},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJACT.2014.062737},
  doi          = {10.1504/IJACT.2014.062737},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/Farashahi14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/LermanBM14,
  author       = {Liran Lerman and
                  Gianluca Bontempi and
                  Olivier Markowitch},
  title        = {Power analysis attack: an approach based on machine learning},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {2},
  pages        = {97--115},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJACT.2014.062722},
  doi          = {10.1504/IJACT.2014.062722},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/LermanBM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/LoebenbergerN14,
  author       = {Daniel Loebenberger and
                  Michael N{\"{u}}sken},
  title        = {Notions for {RSA} integers},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {2},
  pages        = {116--138},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJACT.2014.062723},
  doi          = {10.1504/IJACT.2014.062723},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/LoebenbergerN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/PatelB14,
  author       = {Hiren J. Patel and
                  Rusty O. Baldwin},
  title        = {Random Forest profiling attack on advanced encryption standard},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {2},
  pages        = {181--194},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJACT.2014.062740},
  doi          = {10.1504/IJACT.2014.062740},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/PatelB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/Veugen14,
  author       = {Thijs Veugen},
  title        = {Encrypted integer division and secure comparison},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {2},
  pages        = {166--180},
  year         = {2014},
  url          = {https://doi.org/10.1504/IJACT.2014.062738},
  doi          = {10.1504/IJACT.2014.062738},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/Veugen14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/BuchmannDEHR13,
  author       = {Johannes Buchmann and
                  Erik Dahmen and
                  Sarah Ereth and
                  Andreas H{\"{u}}lsing and
                  Markus R{\"{u}}ckert},
  title        = {On the security of the Winternitz one-time signature scheme},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {1},
  pages        = {84--96},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJACT.2013.053435},
  doi          = {10.1504/IJACT.2013.053435},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijact/BuchmannDEHR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/ChatterjeeS13,
  author       = {Sanjit Chatterjee and
                  Palash Sarkar},
  title        = {Practical hybrid (hierarchical) identity-based encryption schemes
                  based on the decisional bilinear Diffie-Hellman assumption},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {1},
  pages        = {47--83},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJACT.2013.053434},
  doi          = {10.1504/IJACT.2013.053434},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/ChatterjeeS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/JarrousP13,
  author       = {Ayman Jarrous and
                  Benny Pinkas},
  title        = {Secure computation of functionalities based on Hamming distance and
                  its application to computing document similarity},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {1},
  pages        = {21--46},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJACT.2013.053433},
  doi          = {10.1504/IJACT.2013.053433},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/JarrousP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/YapKP13,
  author       = {Huihui Yap and
                  Khoongming Khoo and
                  Axel Poschmann},
  title        = {Parallelisable variants of Camellia and {SMS4} block cipher: p-Camellia
                  and p-SMS4},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {3},
  number       = {1},
  pages        = {1--20},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJACT.2013.053432},
  doi          = {10.1504/IJACT.2013.053432},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/YapKP13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/AbeO12,
  author       = {Masayuki Abe and
                  Miyako Ohkubo},
  title        = {A framework for universally composable non-committing blind signatures},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {2},
  number       = {3},
  pages        = {229--249},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJACT.2012.045581},
  doi          = {10.1504/IJACT.2012.045581},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/AbeO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/BosKKLM12,
  author       = {Joppe W. Bos and
                  Marcelo E. Kaihara and
                  Thorsten Kleinjung and
                  Arjen K. Lenstra and
                  Peter L. Montgomery},
  title        = {Solving a 112-bit prime elliptic curve discrete logarithm problem
                  on game consoles using sloppy reduction},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {2},
  number       = {3},
  pages        = {212--228},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJACT.2012.045590},
  doi          = {10.1504/IJACT.2012.045590},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/BosKKLM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/ChakrabortyM12,
  author       = {Debrup Chakraborty and
                  Cuauhtemoc Mancillas{-}L{\'{o}}pez},
  title        = {Double ciphertext mode: a proposal for secure backup},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {2},
  number       = {3},
  pages        = {271--287},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJACT.2012.045588},
  doi          = {10.1504/IJACT.2012.045588},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/ChakrabortyM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/CissS12,
  author       = {Abdoul Aziz Ciss and
                  Djiby Sow},
  title        = {Randomness extraction in elliptic curves and secret key derivation
                  at the end of Diffie-Hellman protocol},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {2},
  number       = {4},
  pages        = {360--365},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJACT.2012.048083},
  doi          = {10.1504/IJACT.2012.048083},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/CissS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/Dachman-SoledM0Y12,
  author       = {Dana Dachman{-}Soled and
                  Tal Malkin and
                  Mariana Raykova and
                  Moti Yung},
  title        = {Efficient robust private set intersection},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {2},
  number       = {4},
  pages        = {289--303},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJACT.2012.048080},
  doi          = {10.1504/IJACT.2012.048080},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/Dachman-SoledM0Y12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/EmuraMR12,
  author       = {Keita Emura and
                  Atsuko Miyaji and
                  Mohammad Shahriar Rahman},
  title        = {Dynamic attribute-based signcryption without random oracles},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {2},
  number       = {3},
  pages        = {199--211},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJACT.2012.045589},
  doi          = {10.1504/IJACT.2012.045589},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/EmuraMR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/HinekJSS12,
  author       = {M. Jason Hinek and
                  Shaoquan Jiang and
                  Reihaneh Safavi{-}Naini and
                  Siamak Fayyaz Shahandashti},
  title        = {Attribute-based encryption without key cloning},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {2},
  number       = {3},
  pages        = {250--270},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJACT.2012.045587},
  doi          = {10.1504/IJACT.2012.045587},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/HinekJSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/StevensLW12,
  author       = {Marc Stevens and
                  Arjen K. Lenstra and
                  Benne de Weger},
  title        = {Chosen-prefix collisions for {MD5} and applications},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {2},
  number       = {4},
  pages        = {322--359},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJACT.2012.048084},
  doi          = {10.1504/IJACT.2012.048084},
  timestamp    = {Tue, 02 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijact/StevensLW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/Tang12,
  author       = {Qiang Tang},
  title        = {Public key encryption schemes supporting equality test with authorisation
                  of different granularity},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {2},
  number       = {4},
  pages        = {304--321},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJACT.2012.048079},
  doi          = {10.1504/IJACT.2012.048079},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/Tang12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/CaiLLDY10,
  author       = {Shaoying Cai and
                  Yingjiu Li and
                  Tieyan Li and
                  Robert H. Deng and
                  Haixia Yao},
  title        = {Achieving high security and efficiency in RFID-tagged supply chains},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {2},
  number       = {1},
  pages        = {3--12},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJACT.2010.033794},
  doi          = {10.1504/IJACT.2010.033794},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/CaiLLDY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/Cremers10,
  author       = {Cas J. F. Cremers},
  title        = {Session-StateReveal is stronger than eCKs EphemeralKeyReveal: using
                  automatic analysis to attack the {NAXOS} protocol},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {2},
  number       = {2},
  pages        = {83--99},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJACT.2010.038304},
  doi          = {10.1504/IJACT.2010.038304},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/Cremers10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/EmuraMONS10,
  author       = {Keita Emura and
                  Atsuko Miyaji and
                  Kazumasa Omote and
                  Akito Nomura and
                  Masakazu Soshi},
  title        = {A ciphertext-policy attribute-based encryption scheme with constant
                  ciphertext length},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {2},
  number       = {1},
  pages        = {46--59},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJACT.2010.033798},
  doi          = {10.1504/IJACT.2010.033798},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/EmuraMONS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/FleischmannFGL10,
  author       = {Ewan Fleischmann and
                  Christian Forler and
                  Michael Gorski and
                  Stefan Lucks},
  title        = {TWISTER\({}_{\mbox{pi}}\) - a framework for secure and fast hash functions},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {2},
  number       = {1},
  pages        = {68--81},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJACT.2010.033800},
  doi          = {10.1504/IJACT.2010.033800},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/FleischmannFGL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/GoldbergMS10,
  author       = {Ian Goldberg and
                  Atefeh Mashatan and
                  Douglas R. Stinson},
  title        = {On message recognition protocols: recoverability and explicit confirmation},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {2},
  number       = {2},
  pages        = {100--120},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJACT.2010.038305},
  doi          = {10.1504/IJACT.2010.038305},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/GoldbergMS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/HagalislettoS10,
  author       = {Anders Moen Hagalisletto and
                  Lars Strand},
  title        = {Designing attacks on {SIP} call set-up},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {2},
  number       = {1},
  pages        = {13--22},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJACT.2010.033795},
  doi          = {10.1504/IJACT.2010.033795},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/HagalislettoS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/HongKKFP10,
  author       = {Jeongdae Hong and
                  Jinil Kim and
                  Jihye Kim and
                  Matthew K. Franklin and
                  Kunsoo Park},
  title        = {Fair threshold decryption with semi-trusted third parties},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {2},
  number       = {2},
  pages        = {139--153},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJACT.2010.038307},
  doi          = {10.1504/IJACT.2010.038307},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/HongKKFP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/JinLP10,
  author       = {Hongxia Jin and
                  Jeffrey B. Lotspiech and
                  Serdar Pehlivanoglu},
  title        = {Defending against the pirate evolution attack},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {2},
  number       = {1},
  pages        = {23--34},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJACT.2010.033796},
  doi          = {10.1504/IJACT.2010.033796},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/JinLP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/MenezesU10,
  author       = {Alfred Menezes and
                  Berkant Ustaoglu},
  title        = {On reusing ephemeral keys in Diffie-Hellman key agreement protocols},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {2},
  number       = {2},
  pages        = {154--158},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJACT.2010.038308},
  doi          = {10.1504/IJACT.2010.038308},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/MenezesU10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/PatraCRS10,
  author       = {Arpita Patra and
                  Ashish Choudhury and
                  C. Pandu Rangan and
                  Kannan Srinathan},
  title        = {Unconditionally reliable and secure message transmission in undirected
                  synchronous networks: possibility, feasibility and optimality},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {2},
  number       = {2},
  pages        = {159--197},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJACT.2010.038309},
  doi          = {10.1504/IJACT.2010.038309},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/PatraCRS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/ProuffR10,
  author       = {Emmanuel Prouff and
                  Matthieu Rivain},
  title        = {Theoretical and practical aspects of mutual information-based side
                  channel analysis},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {2},
  number       = {2},
  pages        = {121--138},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJACT.2010.038306},
  doi          = {10.1504/IJACT.2010.038306},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/ProuffR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/SatoOO10,
  author       = {Chifumi Sato and
                  Takeshi Okamoto and
                  Eiji Okamoto},
  title        = {Strongly unforgeable ID-based signatures without random oracles},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {2},
  number       = {1},
  pages        = {35--45},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJACT.2010.033797},
  doi          = {10.1504/IJACT.2010.033797},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/SatoOO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/ZhangSWF10,
  author       = {Wentao Zhang and
                  Bozhan Su and
                  Wenling Wu and
                  Dengguo Feng},
  title        = {Some results on cryptanalysis of {SMS4} block cipher},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {2},
  number       = {1},
  pages        = {60--67},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJACT.2010.033799},
  doi          = {10.1504/IJACT.2010.033799},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/ZhangSWF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/AtenieseCJT09,
  author       = {Giuseppe Ateniese and
                  Jan Camenisch and
                  Marc Joye and
                  Gene Tsudik},
  title        = {Remarks on ''Analysis of one popular group signature scheme'' in Asiacrypt
                  2006},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {1},
  number       = {4},
  pages        = {320--322},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJACT.2009.028030},
  doi          = {10.1504/IJACT.2009.028030},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/AtenieseCJT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/BoydCNP09,
  author       = {Colin Boyd and
                  Yvonne Cliff and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Kenneth G. Paterson},
  title        = {One-round key exchange in the standard model},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {1},
  number       = {3},
  pages        = {181--199},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJACT.2009.023466},
  doi          = {10.1504/IJACT.2009.023466},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/BoydCNP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/DamgardGK09,
  author       = {Ivan Damg{\aa}rd and
                  Martin Geisler and
                  Mikkel Kr{\o}igaard},
  title        = {A correction to 'efficient and secure comparison for on-line auctions'},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {1},
  number       = {4},
  pages        = {323--324},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJACT.2009.028031},
  doi          = {10.1504/IJACT.2009.028031},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/DamgardGK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/GajekMS09,
  author       = {Sebastian Gajek and
                  Mark Manulis and
                  J{\"{o}}rg Schwenk},
  title        = {User-aware provably secure protocols for browser-based mutual authentication},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {1},
  number       = {4},
  pages        = {290--308},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJACT.2009.028028},
  doi          = {10.1504/IJACT.2009.028028},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/GajekMS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/HakalaN09,
  author       = {Risto M. Hakala and
                  Kaisa Nyberg},
  title        = {A multidimensional linear distinguishing attack on the Shannon cipher},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {1},
  number       = {3},
  pages        = {161--168},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJACT.2009.023463},
  doi          = {10.1504/IJACT.2009.023463},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/HakalaN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/HuangSS09,
  author       = {Jianyong Huang and
                  Jennifer Seberry and
                  Willy Susilo},
  title        = {A five-round algebraic property of {AES} and its application to the
                  {ALPHA-MAC}},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {1},
  number       = {4},
  pages        = {264--289},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJACT.2009.028027},
  doi          = {10.1504/IJACT.2009.028027},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/HuangSS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/MenezesU09,
  author       = {Alfred Menezes and
                  Berkant Ustaoglu},
  title        = {Comparing the pre- and post-specified peer models for key agreement},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {1},
  number       = {3},
  pages        = {236--250},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJACT.2009.023472},
  doi          = {10.1504/IJACT.2009.023472},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/MenezesU09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/PatraCRSR09,
  author       = {Arpita Patra and
                  Ashish Choudhary and
                  C. Pandu Rangan and
                  Kannan Srinathan and
                  Prasad Raghavendra},
  title        = {Perfectly reliable and secure message transmission tolerating mobile
                  adversary},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {1},
  number       = {3},
  pages        = {200--224},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJACT.2009.023467},
  doi          = {10.1504/IJACT.2009.023467},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/PatraCRSR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/SuiS09,
  author       = {Jiayuan Sui and
                  Douglas R. Stinson},
  title        = {A critical analysis and improvement of advanced access content system
                  drive-host authentication},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {1},
  number       = {3},
  pages        = {169--180},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJACT.2009.023464},
  doi          = {10.1504/IJACT.2009.023464},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/SuiS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/WolfOS09,
  author       = {Marko Wolf and
                  Andr{\'{e}} Osterhues and
                  Christian St{\"{u}}ble},
  title        = {Secure offline superdistribution for mobile platforms},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {1},
  number       = {4},
  pages        = {251--263},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJACT.2009.028026},
  doi          = {10.1504/IJACT.2009.028026},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/WolfOS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/YangBDD09,
  author       = {Yanjiang Yang and
                  Feng Bao and
                  Xuhua Ding and
                  Robert H. Deng},
  title        = {Multiuser private queries over encrypted databases},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {1},
  number       = {4},
  pages        = {309--319},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJACT.2009.028029},
  doi          = {10.1504/IJACT.2009.028029},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/YangBDD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/YeWPZ09,
  author       = {Qingsong Ye and
                  Huaxiong Wang and
                  Josef Pieprzyk and
                  Xian{-}Mo Zhang},
  title        = {Unconditionally secure disjointness tests for private datasets},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {1},
  number       = {3},
  pages        = {225--235},
  year         = {2009},
  url          = {https://doi.org/10.1504/IJACT.2009.023471},
  doi          = {10.1504/IJACT.2009.023471},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/YeWPZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/Boyen08,
  author       = {Xavier Boyen},
  title        = {A tapestry of identity-based encryption: practical frameworks compared},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {1},
  number       = {1},
  pages        = {3--21},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJACT.2008.017047},
  doi          = {10.1504/IJACT.2008.017047},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/Boyen08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/BressonM08,
  author       = {Emmanuel Bresson and
                  Mark Manulis},
  title        = {Securing group key exchange against strong corruptions and key registration
                  attacks},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {1},
  number       = {2},
  pages        = {91--107},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJACT.2008.021083},
  doi          = {10.1504/IJACT.2008.021083},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/BressonM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/BurmesterMM08,
  author       = {Mike Burmester and
                  Breno de Medeiros and
                  Rossana Motta},
  title        = {Anonymous {RFID} authentication supporting constant-cost key-lookup
                  against active adversaries},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {1},
  number       = {2},
  pages        = {79--90},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJACT.2008.021082},
  doi          = {10.1504/IJACT.2008.021082},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/BurmesterMM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/DamgardGK08,
  author       = {Ivan Damg{\aa}rd and
                  Martin Geisler and
                  Mikkel Kr{\o}igaard},
  title        = {Homomorphic encryption and secure comparison},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {1},
  number       = {1},
  pages        = {22--31},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJACT.2008.017048},
  doi          = {10.1504/IJACT.2008.017048},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/DamgardGK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/HerzbergY08,
  author       = {Amir Herzberg and
                  Igal Yoffe},
  title        = {The layered games framework for specifications and analysis of security
                  protocols},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {1},
  number       = {2},
  pages        = {144--159},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJACT.2008.021087},
  doi          = {10.1504/IJACT.2008.021087},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/HerzbergY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/HuangLW08,
  author       = {Qiong Huang and
                  Dennis Y. W. Liu and
                  Duncan S. Wong},
  title        = {An efficient one-move Nominative Signature scheme},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {1},
  number       = {2},
  pages        = {133--143},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJACT.2008.021086},
  doi          = {10.1504/IJACT.2008.021086},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijact/HuangLW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/HuangW08,
  author       = {Qiong Huang and
                  Duncan S. Wong},
  title        = {On the relation among various security models for certificateless
                  cryptography},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {1},
  number       = {2},
  pages        = {108--119},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJACT.2008.021084},
  doi          = {10.1504/IJACT.2008.021084},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijact/HuangW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/JakobssonM08,
  author       = {Markus Jakobsson and
                  Steven A. Myers},
  title        = {Delayed password disclosure},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {1},
  number       = {1},
  pages        = {47--59},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJACT.2008.017051},
  doi          = {10.1504/IJACT.2008.017051},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/JakobssonM08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/KurosawaH08,
  author       = {Kaoru Kurosawa and
                  Swee{-}Huay Heng},
  title        = {The power of identification schemes},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {1},
  number       = {1},
  pages        = {60--69},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJACT.2008.017050},
  doi          = {10.1504/IJACT.2008.017050},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/KurosawaH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/Leurent08,
  author       = {Ga{\"{e}}tan Leurent},
  title        = {Practical key-recovery attack against APOP, an MD5-based challenge-response
                  authentication},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {1},
  number       = {1},
  pages        = {32--46},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJACT.2008.017049},
  doi          = {10.1504/IJACT.2008.017049},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/Leurent08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/OkadaMO08,
  author       = {Yusuke Okada and
                  Yoshifumi Manabe and
                  Tatsuaki Okamoto},
  title        = {An optimistic fair exchange protocol and its security in the universal
                  composability framework},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {1},
  number       = {1},
  pages        = {70--77},
  year         = {2008},
  url          = {http://www.inderscience.com/filter.php?aid=17052},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/OkadaMO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/PlantardSWH08,
  author       = {Thomas Plantard and
                  Willy Susilo and
                  Khin Than Win and
                  Qiong Huang},
  title        = {Efficient lattice-based signature scheme},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {1},
  number       = {2},
  pages        = {120--132},
  year         = {2008},
  url          = {https://doi.org/10.1504/IJACT.2008.021085},
  doi          = {10.1504/IJACT.2008.021085},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/PlantardSWH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics