Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:streams/journals/ijact:"
@article{DBLP:journals/ijact/BagAH22, author = {Samiran Bag and Muhammad Ajmal Azad and Feng Hao}, title = {End-to-end verifiable cumulative voting without tallying authorities}, journal = {Int. J. Appl. Cryptogr.}, volume = {4}, number = {2}, pages = {85--103}, year = {2022}, url = {https://doi.org/10.1504/IJACT.2022.10056073}, doi = {10.1504/IJACT.2022.10056073}, timestamp = {Wed, 24 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/BagAH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/Chen22, author = {Zhuo Qi Chen}, title = {A novel architecture to make anonymous blind signature-based e-coins more efficient and applicable}, journal = {Int. J. Appl. Cryptogr.}, volume = {4}, number = {2}, pages = {121--142}, year = {2022}, url = {https://doi.org/10.1504/IJACT.2022.10056083}, doi = {10.1504/IJACT.2022.10056083}, timestamp = {Wed, 24 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/Chen22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/PorwalM22, author = {Shardha Porwal and Sangeeta Mittal}, title = {Authority revocation scheme for MA-CP-ABE-based secure communication in IoMT ecosystem}, journal = {Int. J. Appl. Cryptogr.}, volume = {4}, number = {2}, pages = {104--120}, year = {2022}, url = {https://doi.org/10.1504/IJACT.2022.10056082}, doi = {10.1504/IJACT.2022.10056082}, timestamp = {Wed, 24 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/PorwalM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/SchwenkS22, author = {J{\"{o}}rg Schwenk and Douglas Stebila}, title = {A reduction-based proof for authentication and session key security in three-party Kerberos}, journal = {Int. J. Appl. Cryptogr.}, volume = {4}, number = {2}, pages = {61--84}, year = {2022}, url = {https://doi.org/10.1504/IJACT.2022.10052385}, doi = {10.1504/IJACT.2022.10052385}, timestamp = {Wed, 24 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/SchwenkS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/MbangAF20, author = {Narcisse Bang Mbang and Diego de Freitas Aranha and Emmanuel Fouotsa}, title = {Computing the optimal ate pairing over elliptic curves with embedding degrees 54 and 48 at the 256-bit security level}, journal = {Int. J. Appl. Cryptogr.}, volume = {4}, number = {1}, pages = {45--59}, year = {2020}, url = {https://doi.org/10.1504/IJACT.2020.107167}, doi = {10.1504/IJACT.2020.107167}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/MbangAF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/NandiP20, author = {Mridul Nandi and Tapas Pandit}, title = {Delegation-based conversion from {CPA} to CCA-secure predicate encryption}, journal = {Int. J. Appl. Cryptogr.}, volume = {4}, number = {1}, pages = {16--35}, year = {2020}, url = {https://doi.org/10.1504/IJACT.2020.107163}, doi = {10.1504/IJACT.2020.107163}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/NandiP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/ShamsabadD20, author = {Mohammad Reza Mirzaee Shamsabad and Seyed Mojtaba Dehnavi}, title = {Dynamic {MDS} diffusion layers with efficient software implementation}, journal = {Int. J. Appl. Cryptogr.}, volume = {4}, number = {1}, pages = {36--44}, year = {2020}, url = {https://doi.org/10.1504/IJACT.2020.107164}, doi = {10.1504/IJACT.2020.107164}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/ShamsabadD20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/Veugen20, author = {Thijs Veugen}, title = {Efficient coding for secure computing with additively-homomorphic encrypted data}, journal = {Int. J. Appl. Cryptogr.}, volume = {4}, number = {1}, pages = {1--15}, year = {2020}, url = {https://doi.org/10.1504/IJACT.2020.107160}, doi = {10.1504/IJACT.2020.107160}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/Veugen20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/AgrawalCS17, author = {Megha Agrawal and Donghoon Chang and Somitra Kumar Sanadhya}, title = {A new authenticated encryption technique for handling long ciphertexts in memory constrained devices}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {3}, pages = {236--261}, year = {2017}, url = {https://doi.org/10.1504/IJACT.2017.10007291}, doi = {10.1504/IJACT.2017.10007291}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/AgrawalCS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/BansalCS17, author = {Tarun Kumar Bansal and Donghoon Chang and Somitra Kumar Sanadhya}, title = {Sponge-based {CCA2} secure asymmetric encryption for arbitrary length message (extended version)}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {3}, pages = {262--287}, year = {2017}, url = {https://doi.org/10.1504/IJACT.2017.10007290}, doi = {10.1504/IJACT.2017.10007290}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/BansalCS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/BosNP17, author = {Joppe W. Bos and Michael Naehrig and Joop van de Pol}, title = {Sieving for shortest vectors in ideal lattices: a practical perspective}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {4}, pages = {313--329}, year = {2017}, url = {https://doi.org/10.1504/IJACT.2017.10010312}, doi = {10.1504/IJACT.2017.10010312}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/BosNP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/ClearG17, author = {Michael Clear and Ciar{\'{a}}n Mc Goldrick}, title = {Attribute-based fully homomorphic encryption with a bounded number of inputs}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {4}, pages = {363--376}, year = {2017}, url = {https://doi.org/10.1504/IJACT.2017.10010329}, doi = {10.1504/IJACT.2017.10010329}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/ClearG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/FengYL17, author = {Yiteng Feng and Guomin Yang and Joseph K. Liu}, title = {A new public remote integrity checking scheme with user and data privacy}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {3}, pages = {196--209}, year = {2017}, url = {https://doi.org/10.1504/IJACT.2017.10007296}, doi = {10.1504/IJACT.2017.10007296}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/FengYL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/GhoshSSC17, author = {Shamit Ghosh and Dhiman Saha and Abhrajit Sengupta and Dipanwita Roy Chowdhury}, title = {Preventing fault attacks using fault randomisation with a case study on {AES}}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {3}, pages = {225--235}, year = {2017}, url = {https://doi.org/10.1504/IJACT.2017.10007295}, doi = {10.1504/IJACT.2017.10007295}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/GhoshSSC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/IshidaSW17, author = {Yuu Ishida and Junji Shikata and Yohei Watanabe}, title = {CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {3}, pages = {288--311}, year = {2017}, url = {https://doi.org/10.1504/IJACT.2017.10007294}, doi = {10.1504/IJACT.2017.10007294}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/IshidaSW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/KurosawaP17, author = {Kaoru Kurosawa and Le Trieu Phong}, title = {{IBE} and function-private {IBE} under linear assumptions with shorter ciphertexts and private keys, and extensions}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {3}, pages = {210--224}, year = {2017}, url = {https://doi.org/10.1504/IJACT.2017.10007292}, doi = {10.1504/IJACT.2017.10007292}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/KurosawaP17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/LenstraW17, author = {Arjen K. Lenstra and Benjamin Wesolowski}, title = {Trustworthy public randomness with sloth, unicorn, and trx}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {4}, pages = {330--343}, year = {2017}, url = {https://doi.org/10.1504/IJACT.2017.10010315}, doi = {10.1504/IJACT.2017.10010315}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/LenstraW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/Lipmaa17, author = {Helger Lipmaa}, title = {Prover-efficient commit-and-prove zero-knowledge SNARKs}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {4}, pages = {344--362}, year = {2017}, url = {https://doi.org/10.1504/IJACT.2017.10010328}, doi = {10.1504/IJACT.2017.10010328}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/Lipmaa17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/NakagawaNOEHSK17, author = {Sanami Nakagawa and Takashi Nishide and Eiji Okamoto and Keita Emura and Goichiro Hanaoka and Yusuke Sakai and Akihisa Kodate}, title = {A privacy-enhanced access log management mechanism in {SSO} systems from nominative signatures}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {4}, pages = {394--406}, year = {2017}, url = {https://doi.org/10.1504/IJACT.2017.10010348}, doi = {10.1504/IJACT.2017.10010348}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/NakagawaNOEHSK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/SarrE17, author = {Augustin P. Sarr and Philippe Elbaz{-}Vincent}, title = {On the separation between the {FHMQV} and {HMQV} protocols}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {4}, pages = {377--393}, year = {2017}, url = {https://doi.org/10.1504/IJACT.2017.10010330}, doi = {10.1504/IJACT.2017.10010330}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/SarrE17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/AliA14, author = {Syed Taqi Ali and B. B. Amberker}, title = {Dynamic attribute-based group signature with verifier-local revocation and backward unlinkability in the standard model}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {2}, pages = {148--165}, year = {2014}, url = {https://doi.org/10.1504/IJACT.2014.062736}, doi = {10.1504/IJACT.2014.062736}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/AliA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/Farashahi14, author = {Reza Rezaeian Farashahi}, title = {Hashing into Hessian curves}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {2}, pages = {139--147}, year = {2014}, url = {https://doi.org/10.1504/IJACT.2014.062737}, doi = {10.1504/IJACT.2014.062737}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/Farashahi14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/LermanBM14, author = {Liran Lerman and Gianluca Bontempi and Olivier Markowitch}, title = {Power analysis attack: an approach based on machine learning}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {2}, pages = {97--115}, year = {2014}, url = {https://doi.org/10.1504/IJACT.2014.062722}, doi = {10.1504/IJACT.2014.062722}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/LermanBM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/LoebenbergerN14, author = {Daniel Loebenberger and Michael N{\"{u}}sken}, title = {Notions for {RSA} integers}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {2}, pages = {116--138}, year = {2014}, url = {https://doi.org/10.1504/IJACT.2014.062723}, doi = {10.1504/IJACT.2014.062723}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/LoebenbergerN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/PatelB14, author = {Hiren J. Patel and Rusty O. Baldwin}, title = {Random Forest profiling attack on advanced encryption standard}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {2}, pages = {181--194}, year = {2014}, url = {https://doi.org/10.1504/IJACT.2014.062740}, doi = {10.1504/IJACT.2014.062740}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/PatelB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/Veugen14, author = {Thijs Veugen}, title = {Encrypted integer division and secure comparison}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {2}, pages = {166--180}, year = {2014}, url = {https://doi.org/10.1504/IJACT.2014.062738}, doi = {10.1504/IJACT.2014.062738}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/Veugen14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/BuchmannDEHR13, author = {Johannes Buchmann and Erik Dahmen and Sarah Ereth and Andreas H{\"{u}}lsing and Markus R{\"{u}}ckert}, title = {On the security of the Winternitz one-time signature scheme}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {1}, pages = {84--96}, year = {2013}, url = {https://doi.org/10.1504/IJACT.2013.053435}, doi = {10.1504/IJACT.2013.053435}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijact/BuchmannDEHR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/ChatterjeeS13, author = {Sanjit Chatterjee and Palash Sarkar}, title = {Practical hybrid (hierarchical) identity-based encryption schemes based on the decisional bilinear Diffie-Hellman assumption}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {1}, pages = {47--83}, year = {2013}, url = {https://doi.org/10.1504/IJACT.2013.053434}, doi = {10.1504/IJACT.2013.053434}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/ChatterjeeS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/JarrousP13, author = {Ayman Jarrous and Benny Pinkas}, title = {Secure computation of functionalities based on Hamming distance and its application to computing document similarity}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {1}, pages = {21--46}, year = {2013}, url = {https://doi.org/10.1504/IJACT.2013.053433}, doi = {10.1504/IJACT.2013.053433}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/JarrousP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/YapKP13, author = {Huihui Yap and Khoongming Khoo and Axel Poschmann}, title = {Parallelisable variants of Camellia and {SMS4} block cipher: p-Camellia and p-SMS4}, journal = {Int. J. Appl. Cryptogr.}, volume = {3}, number = {1}, pages = {1--20}, year = {2013}, url = {https://doi.org/10.1504/IJACT.2013.053432}, doi = {10.1504/IJACT.2013.053432}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/YapKP13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/AbeO12, author = {Masayuki Abe and Miyako Ohkubo}, title = {A framework for universally composable non-committing blind signatures}, journal = {Int. J. Appl. Cryptogr.}, volume = {2}, number = {3}, pages = {229--249}, year = {2012}, url = {https://doi.org/10.1504/IJACT.2012.045581}, doi = {10.1504/IJACT.2012.045581}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/AbeO12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/BosKKLM12, author = {Joppe W. Bos and Marcelo E. Kaihara and Thorsten Kleinjung and Arjen K. Lenstra and Peter L. Montgomery}, title = {Solving a 112-bit prime elliptic curve discrete logarithm problem on game consoles using sloppy reduction}, journal = {Int. J. Appl. Cryptogr.}, volume = {2}, number = {3}, pages = {212--228}, year = {2012}, url = {https://doi.org/10.1504/IJACT.2012.045590}, doi = {10.1504/IJACT.2012.045590}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/BosKKLM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/ChakrabortyM12, author = {Debrup Chakraborty and Cuauhtemoc Mancillas{-}L{\'{o}}pez}, title = {Double ciphertext mode: a proposal for secure backup}, journal = {Int. J. Appl. Cryptogr.}, volume = {2}, number = {3}, pages = {271--287}, year = {2012}, url = {https://doi.org/10.1504/IJACT.2012.045588}, doi = {10.1504/IJACT.2012.045588}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/ChakrabortyM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/CissS12, author = {Abdoul Aziz Ciss and Djiby Sow}, title = {Randomness extraction in elliptic curves and secret key derivation at the end of Diffie-Hellman protocol}, journal = {Int. J. Appl. Cryptogr.}, volume = {2}, number = {4}, pages = {360--365}, year = {2012}, url = {https://doi.org/10.1504/IJACT.2012.048083}, doi = {10.1504/IJACT.2012.048083}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/CissS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/Dachman-SoledM0Y12, author = {Dana Dachman{-}Soled and Tal Malkin and Mariana Raykova and Moti Yung}, title = {Efficient robust private set intersection}, journal = {Int. J. Appl. Cryptogr.}, volume = {2}, number = {4}, pages = {289--303}, year = {2012}, url = {https://doi.org/10.1504/IJACT.2012.048080}, doi = {10.1504/IJACT.2012.048080}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/Dachman-SoledM0Y12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/EmuraMR12, author = {Keita Emura and Atsuko Miyaji and Mohammad Shahriar Rahman}, title = {Dynamic attribute-based signcryption without random oracles}, journal = {Int. J. Appl. Cryptogr.}, volume = {2}, number = {3}, pages = {199--211}, year = {2012}, url = {https://doi.org/10.1504/IJACT.2012.045589}, doi = {10.1504/IJACT.2012.045589}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/EmuraMR12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/HinekJSS12, author = {M. Jason Hinek and Shaoquan Jiang and Reihaneh Safavi{-}Naini and Siamak Fayyaz Shahandashti}, title = {Attribute-based encryption without key cloning}, journal = {Int. J. Appl. Cryptogr.}, volume = {2}, number = {3}, pages = {250--270}, year = {2012}, url = {https://doi.org/10.1504/IJACT.2012.045587}, doi = {10.1504/IJACT.2012.045587}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/HinekJSS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/StevensLW12, author = {Marc Stevens and Arjen K. Lenstra and Benne de Weger}, title = {Chosen-prefix collisions for {MD5} and applications}, journal = {Int. J. Appl. Cryptogr.}, volume = {2}, number = {4}, pages = {322--359}, year = {2012}, url = {https://doi.org/10.1504/IJACT.2012.048084}, doi = {10.1504/IJACT.2012.048084}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijact/StevensLW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/Tang12, author = {Qiang Tang}, title = {Public key encryption schemes supporting equality test with authorisation of different granularity}, journal = {Int. J. Appl. Cryptogr.}, volume = {2}, number = {4}, pages = {304--321}, year = {2012}, url = {https://doi.org/10.1504/IJACT.2012.048079}, doi = {10.1504/IJACT.2012.048079}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/Tang12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/CaiLLDY10, author = {Shaoying Cai and Yingjiu Li and Tieyan Li and Robert H. Deng and Haixia Yao}, title = {Achieving high security and efficiency in RFID-tagged supply chains}, journal = {Int. J. Appl. Cryptogr.}, volume = {2}, number = {1}, pages = {3--12}, year = {2010}, url = {https://doi.org/10.1504/IJACT.2010.033794}, doi = {10.1504/IJACT.2010.033794}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/CaiLLDY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/Cremers10, author = {Cas J. F. Cremers}, title = {Session-StateReveal is stronger than eCKs EphemeralKeyReveal: using automatic analysis to attack the {NAXOS} protocol}, journal = {Int. J. Appl. Cryptogr.}, volume = {2}, number = {2}, pages = {83--99}, year = {2010}, url = {https://doi.org/10.1504/IJACT.2010.038304}, doi = {10.1504/IJACT.2010.038304}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/Cremers10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/EmuraMONS10, author = {Keita Emura and Atsuko Miyaji and Kazumasa Omote and Akito Nomura and Masakazu Soshi}, title = {A ciphertext-policy attribute-based encryption scheme with constant ciphertext length}, journal = {Int. J. Appl. Cryptogr.}, volume = {2}, number = {1}, pages = {46--59}, year = {2010}, url = {https://doi.org/10.1504/IJACT.2010.033798}, doi = {10.1504/IJACT.2010.033798}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/EmuraMONS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/FleischmannFGL10, author = {Ewan Fleischmann and Christian Forler and Michael Gorski and Stefan Lucks}, title = {TWISTER\({}_{\mbox{pi}}\) - a framework for secure and fast hash functions}, journal = {Int. J. Appl. Cryptogr.}, volume = {2}, number = {1}, pages = {68--81}, year = {2010}, url = {https://doi.org/10.1504/IJACT.2010.033800}, doi = {10.1504/IJACT.2010.033800}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/FleischmannFGL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/GoldbergMS10, author = {Ian Goldberg and Atefeh Mashatan and Douglas R. Stinson}, title = {On message recognition protocols: recoverability and explicit confirmation}, journal = {Int. J. Appl. Cryptogr.}, volume = {2}, number = {2}, pages = {100--120}, year = {2010}, url = {https://doi.org/10.1504/IJACT.2010.038305}, doi = {10.1504/IJACT.2010.038305}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/GoldbergMS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/HagalislettoS10, author = {Anders Moen Hagalisletto and Lars Strand}, title = {Designing attacks on {SIP} call set-up}, journal = {Int. J. Appl. Cryptogr.}, volume = {2}, number = {1}, pages = {13--22}, year = {2010}, url = {https://doi.org/10.1504/IJACT.2010.033795}, doi = {10.1504/IJACT.2010.033795}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/HagalislettoS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/HongKKFP10, author = {Jeongdae Hong and Jinil Kim and Jihye Kim and Matthew K. Franklin and Kunsoo Park}, title = {Fair threshold decryption with semi-trusted third parties}, journal = {Int. J. Appl. Cryptogr.}, volume = {2}, number = {2}, pages = {139--153}, year = {2010}, url = {https://doi.org/10.1504/IJACT.2010.038307}, doi = {10.1504/IJACT.2010.038307}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/HongKKFP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/JinLP10, author = {Hongxia Jin and Jeffrey B. Lotspiech and Serdar Pehlivanoglu}, title = {Defending against the pirate evolution attack}, journal = {Int. J. Appl. Cryptogr.}, volume = {2}, number = {1}, pages = {23--34}, year = {2010}, url = {https://doi.org/10.1504/IJACT.2010.033796}, doi = {10.1504/IJACT.2010.033796}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/JinLP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/MenezesU10, author = {Alfred Menezes and Berkant Ustaoglu}, title = {On reusing ephemeral keys in Diffie-Hellman key agreement protocols}, journal = {Int. J. Appl. Cryptogr.}, volume = {2}, number = {2}, pages = {154--158}, year = {2010}, url = {https://doi.org/10.1504/IJACT.2010.038308}, doi = {10.1504/IJACT.2010.038308}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/MenezesU10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/PatraCRS10, author = {Arpita Patra and Ashish Choudhury and C. Pandu Rangan and Kannan Srinathan}, title = {Unconditionally reliable and secure message transmission in undirected synchronous networks: possibility, feasibility and optimality}, journal = {Int. J. Appl. Cryptogr.}, volume = {2}, number = {2}, pages = {159--197}, year = {2010}, url = {https://doi.org/10.1504/IJACT.2010.038309}, doi = {10.1504/IJACT.2010.038309}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/PatraCRS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/ProuffR10, author = {Emmanuel Prouff and Matthieu Rivain}, title = {Theoretical and practical aspects of mutual information-based side channel analysis}, journal = {Int. J. Appl. Cryptogr.}, volume = {2}, number = {2}, pages = {121--138}, year = {2010}, url = {https://doi.org/10.1504/IJACT.2010.038306}, doi = {10.1504/IJACT.2010.038306}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/ProuffR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/SatoOO10, author = {Chifumi Sato and Takeshi Okamoto and Eiji Okamoto}, title = {Strongly unforgeable ID-based signatures without random oracles}, journal = {Int. J. Appl. Cryptogr.}, volume = {2}, number = {1}, pages = {35--45}, year = {2010}, url = {https://doi.org/10.1504/IJACT.2010.033797}, doi = {10.1504/IJACT.2010.033797}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/SatoOO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/ZhangSWF10, author = {Wentao Zhang and Bozhan Su and Wenling Wu and Dengguo Feng}, title = {Some results on cryptanalysis of {SMS4} block cipher}, journal = {Int. J. Appl. Cryptogr.}, volume = {2}, number = {1}, pages = {60--67}, year = {2010}, url = {https://doi.org/10.1504/IJACT.2010.033799}, doi = {10.1504/IJACT.2010.033799}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/ZhangSWF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/AtenieseCJT09, author = {Giuseppe Ateniese and Jan Camenisch and Marc Joye and Gene Tsudik}, title = {Remarks on ''Analysis of one popular group signature scheme'' in Asiacrypt 2006}, journal = {Int. J. Appl. Cryptogr.}, volume = {1}, number = {4}, pages = {320--322}, year = {2009}, url = {https://doi.org/10.1504/IJACT.2009.028030}, doi = {10.1504/IJACT.2009.028030}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/AtenieseCJT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/BoydCNP09, author = {Colin Boyd and Yvonne Cliff and Juan Manuel Gonz{\'{a}}lez Nieto and Kenneth G. Paterson}, title = {One-round key exchange in the standard model}, journal = {Int. J. Appl. Cryptogr.}, volume = {1}, number = {3}, pages = {181--199}, year = {2009}, url = {https://doi.org/10.1504/IJACT.2009.023466}, doi = {10.1504/IJACT.2009.023466}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/BoydCNP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/DamgardGK09, author = {Ivan Damg{\aa}rd and Martin Geisler and Mikkel Kr{\o}igaard}, title = {A correction to 'efficient and secure comparison for on-line auctions'}, journal = {Int. J. Appl. Cryptogr.}, volume = {1}, number = {4}, pages = {323--324}, year = {2009}, url = {https://doi.org/10.1504/IJACT.2009.028031}, doi = {10.1504/IJACT.2009.028031}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/DamgardGK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/GajekMS09, author = {Sebastian Gajek and Mark Manulis and J{\"{o}}rg Schwenk}, title = {User-aware provably secure protocols for browser-based mutual authentication}, journal = {Int. J. Appl. Cryptogr.}, volume = {1}, number = {4}, pages = {290--308}, year = {2009}, url = {https://doi.org/10.1504/IJACT.2009.028028}, doi = {10.1504/IJACT.2009.028028}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/GajekMS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/HakalaN09, author = {Risto M. Hakala and Kaisa Nyberg}, title = {A multidimensional linear distinguishing attack on the Shannon cipher}, journal = {Int. J. Appl. Cryptogr.}, volume = {1}, number = {3}, pages = {161--168}, year = {2009}, url = {https://doi.org/10.1504/IJACT.2009.023463}, doi = {10.1504/IJACT.2009.023463}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/HakalaN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/HuangSS09, author = {Jianyong Huang and Jennifer Seberry and Willy Susilo}, title = {A five-round algebraic property of {AES} and its application to the {ALPHA-MAC}}, journal = {Int. J. Appl. Cryptogr.}, volume = {1}, number = {4}, pages = {264--289}, year = {2009}, url = {https://doi.org/10.1504/IJACT.2009.028027}, doi = {10.1504/IJACT.2009.028027}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/HuangSS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/MenezesU09, author = {Alfred Menezes and Berkant Ustaoglu}, title = {Comparing the pre- and post-specified peer models for key agreement}, journal = {Int. J. Appl. Cryptogr.}, volume = {1}, number = {3}, pages = {236--250}, year = {2009}, url = {https://doi.org/10.1504/IJACT.2009.023472}, doi = {10.1504/IJACT.2009.023472}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/MenezesU09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/PatraCRSR09, author = {Arpita Patra and Ashish Choudhary and C. Pandu Rangan and Kannan Srinathan and Prasad Raghavendra}, title = {Perfectly reliable and secure message transmission tolerating mobile adversary}, journal = {Int. J. Appl. Cryptogr.}, volume = {1}, number = {3}, pages = {200--224}, year = {2009}, url = {https://doi.org/10.1504/IJACT.2009.023467}, doi = {10.1504/IJACT.2009.023467}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/PatraCRSR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/SuiS09, author = {Jiayuan Sui and Douglas R. Stinson}, title = {A critical analysis and improvement of advanced access content system drive-host authentication}, journal = {Int. J. Appl. Cryptogr.}, volume = {1}, number = {3}, pages = {169--180}, year = {2009}, url = {https://doi.org/10.1504/IJACT.2009.023464}, doi = {10.1504/IJACT.2009.023464}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/SuiS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/WolfOS09, author = {Marko Wolf and Andr{\'{e}} Osterhues and Christian St{\"{u}}ble}, title = {Secure offline superdistribution for mobile platforms}, journal = {Int. J. Appl. Cryptogr.}, volume = {1}, number = {4}, pages = {251--263}, year = {2009}, url = {https://doi.org/10.1504/IJACT.2009.028026}, doi = {10.1504/IJACT.2009.028026}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/WolfOS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/YangBDD09, author = {Yanjiang Yang and Feng Bao and Xuhua Ding and Robert H. Deng}, title = {Multiuser private queries over encrypted databases}, journal = {Int. J. Appl. Cryptogr.}, volume = {1}, number = {4}, pages = {309--319}, year = {2009}, url = {https://doi.org/10.1504/IJACT.2009.028029}, doi = {10.1504/IJACT.2009.028029}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/YangBDD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/YeWPZ09, author = {Qingsong Ye and Huaxiong Wang and Josef Pieprzyk and Xian{-}Mo Zhang}, title = {Unconditionally secure disjointness tests for private datasets}, journal = {Int. J. Appl. Cryptogr.}, volume = {1}, number = {3}, pages = {225--235}, year = {2009}, url = {https://doi.org/10.1504/IJACT.2009.023471}, doi = {10.1504/IJACT.2009.023471}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/YeWPZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/Boyen08, author = {Xavier Boyen}, title = {A tapestry of identity-based encryption: practical frameworks compared}, journal = {Int. J. Appl. Cryptogr.}, volume = {1}, number = {1}, pages = {3--21}, year = {2008}, url = {https://doi.org/10.1504/IJACT.2008.017047}, doi = {10.1504/IJACT.2008.017047}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/Boyen08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/BressonM08, author = {Emmanuel Bresson and Mark Manulis}, title = {Securing group key exchange against strong corruptions and key registration attacks}, journal = {Int. J. Appl. Cryptogr.}, volume = {1}, number = {2}, pages = {91--107}, year = {2008}, url = {https://doi.org/10.1504/IJACT.2008.021083}, doi = {10.1504/IJACT.2008.021083}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/BressonM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/BurmesterMM08, author = {Mike Burmester and Breno de Medeiros and Rossana Motta}, title = {Anonymous {RFID} authentication supporting constant-cost key-lookup against active adversaries}, journal = {Int. J. Appl. Cryptogr.}, volume = {1}, number = {2}, pages = {79--90}, year = {2008}, url = {https://doi.org/10.1504/IJACT.2008.021082}, doi = {10.1504/IJACT.2008.021082}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/BurmesterMM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/DamgardGK08, author = {Ivan Damg{\aa}rd and Martin Geisler and Mikkel Kr{\o}igaard}, title = {Homomorphic encryption and secure comparison}, journal = {Int. J. Appl. Cryptogr.}, volume = {1}, number = {1}, pages = {22--31}, year = {2008}, url = {https://doi.org/10.1504/IJACT.2008.017048}, doi = {10.1504/IJACT.2008.017048}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/DamgardGK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/HerzbergY08, author = {Amir Herzberg and Igal Yoffe}, title = {The layered games framework for specifications and analysis of security protocols}, journal = {Int. J. Appl. Cryptogr.}, volume = {1}, number = {2}, pages = {144--159}, year = {2008}, url = {https://doi.org/10.1504/IJACT.2008.021087}, doi = {10.1504/IJACT.2008.021087}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/HerzbergY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/HuangLW08, author = {Qiong Huang and Dennis Y. W. Liu and Duncan S. Wong}, title = {An efficient one-move Nominative Signature scheme}, journal = {Int. J. Appl. Cryptogr.}, volume = {1}, number = {2}, pages = {133--143}, year = {2008}, url = {https://doi.org/10.1504/IJACT.2008.021086}, doi = {10.1504/IJACT.2008.021086}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijact/HuangLW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/HuangW08, author = {Qiong Huang and Duncan S. Wong}, title = {On the relation among various security models for certificateless cryptography}, journal = {Int. J. Appl. Cryptogr.}, volume = {1}, number = {2}, pages = {108--119}, year = {2008}, url = {https://doi.org/10.1504/IJACT.2008.021084}, doi = {10.1504/IJACT.2008.021084}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijact/HuangW08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/JakobssonM08, author = {Markus Jakobsson and Steven A. Myers}, title = {Delayed password disclosure}, journal = {Int. J. Appl. Cryptogr.}, volume = {1}, number = {1}, pages = {47--59}, year = {2008}, url = {https://doi.org/10.1504/IJACT.2008.017051}, doi = {10.1504/IJACT.2008.017051}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/JakobssonM08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/KurosawaH08, author = {Kaoru Kurosawa and Swee{-}Huay Heng}, title = {The power of identification schemes}, journal = {Int. J. Appl. Cryptogr.}, volume = {1}, number = {1}, pages = {60--69}, year = {2008}, url = {https://doi.org/10.1504/IJACT.2008.017050}, doi = {10.1504/IJACT.2008.017050}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/KurosawaH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/Leurent08, author = {Ga{\"{e}}tan Leurent}, title = {Practical key-recovery attack against APOP, an MD5-based challenge-response authentication}, journal = {Int. J. Appl. Cryptogr.}, volume = {1}, number = {1}, pages = {32--46}, year = {2008}, url = {https://doi.org/10.1504/IJACT.2008.017049}, doi = {10.1504/IJACT.2008.017049}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/Leurent08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/OkadaMO08, author = {Yusuke Okada and Yoshifumi Manabe and Tatsuaki Okamoto}, title = {An optimistic fair exchange protocol and its security in the universal composability framework}, journal = {Int. J. Appl. Cryptogr.}, volume = {1}, number = {1}, pages = {70--77}, year = {2008}, url = {http://www.inderscience.com/filter.php?aid=17052}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/OkadaMO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/PlantardSWH08, author = {Thomas Plantard and Willy Susilo and Khin Than Win and Qiong Huang}, title = {Efficient lattice-based signature scheme}, journal = {Int. J. Appl. Cryptogr.}, volume = {1}, number = {2}, pages = {120--132}, year = {2008}, url = {https://doi.org/10.1504/IJACT.2008.021085}, doi = {10.1504/IJACT.2008.021085}, timestamp = {Wed, 20 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/PlantardSWH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.