×

International Journal of Applied Cryptography

Short Title: Int. J. Appl. Cryptogr.
Publisher: Inderscience Publishers, Genève
ISSN: 1753-0563; 1753-0571/e
Online: http://www.inderscienceonline.com/loi/ijact
http://www.inderscience.com/jhome.php?jcode=ijact
Comments: Indexed cover-to-cover
Documents Indexed: 71 Publications (since 2008)
all top 5

Authors

3 Emura, Keita
3 Huang, Qiong
3 Lenstra, Arjen K.
2 Bao, Feng
2 Bos, Joppe W.
2 Chang, Donghoon
2 Choudhary, Ashish
2 Damgård, Ivan Bjerre
2 Deng, Robert Huijie
2 Geisler, Martin
2 Krøigård, Mikkel
2 Kurosawa, Kaoru
2 Manulis, Mark
2 Menezes, Alfred J.
2 Miyaji, Atsuko
2 Okamoto, Eiji
2 Patra, Arpita
2 Rangan, Chandrasekharan Pandu
2 Sanadhya, Somitra Kumar
2 Srinathan, Kannan
2 Stinson, Douglas Robert
2 Susilo, Willy
2 Ustaoglu, Berkant
2 Veugen, Thijs
2 Wong, Duncan S.
1 Abe, Masayuki
1 Agrawal, Megha
1 Ali, Syed Taqi
1 Amberker, B. Bharat
1 Aranha, Diego De Freitas
1 Ateniese, Giuseppe
1 Baldwin, Rusty O.
1 Bansal, Tarun Kumar
1 Bontempi, Gianluca
1 Boyd, Colin A.
1 Boyen, Xavier
1 Bresson, Emmanuel
1 Buchmann, Johannes A.
1 Burmester, Mike V. D.
1 Cai, Shaoying
1 Camenisch, Jan L.
1 Chakraborty, Debrup
1 Chatterjee, Sanjit
1 Roy Chowdhury, Dipanwita
1 Ciss, Abdoul Aziz
1 Clear, Michael
1 Cliff, Yvonne
1 Cremers, Cas J. F.
1 Dachman-Soled, Dana
1 Dahmen, Erik
1 de Medeiros, Breno
1 de Weger, Benne
1 Dehnavi, Seyed Mojtaba
1 Ding, Xuhua
1 Elbaz-Vincent, Philippe
1 Ereth, Sarah
1 Farashahi, Reza Rezaeian
1 Feng, Dengguo
1 Feng, Yiteng
1 Fouotsa, Emmanuel
1 Franklin, Matthew K.
1 Gajek, Sebastian
1 Ghosh, Shamit
1 Goldberg, Ian
1 González Nieto, Juan Manuel
1 Hagalisletto, Anders Moen
1 Hakala, Risto M.
1 Hanaoka, Goichiro
1 Heng, Swee-Huay
1 Herzberg, Amir
1 Hinek, M. Jason
1 Hong, Jeongdae
1 Huang, Jianyong
1 Hülsing, Andreas
1 Ishida, Yuu
1 Jakobsson, Markus
1 Jarrous, Ayman
1 Jiang, Shaoquan
1 Jin, Hongxia
1 Joye, Marc
1 Kaihara, Marcelo E.
1 Khoo, Khoongming
1 Kim, Jihye
1 Kim, Jinil
1 Kleinjung, Thorsten
1 Kodate, Akihisa
1 Lerman, Liran
1 Leurent, Gaëtan
1 Li, Tieyan
1 Li, Yingjiu
1 Lipmaa, Helger
1 Liu, Dennis Y. W.
1 Liu, Joseph K. K.
1 Loebenberger, Daniel
1 Lotspiech, Jeffrey B.
1 Malkin, Tal G.
1 Manabe, Yoshifumi
1 Mancillas-López, Cuauhtemoc
1 Markowitch, Olivier
1 Mashatan, Atefeh
...and 69 more Authors

Publications by Year

Citations contained in zbMATH Open

42 Publications have been cited 117 times in 113 Documents Cited by Year
Public key encryption schemes supporting equality test with authorisation of different granularity. Zbl 1271.94025
Tang, Qiang
13
2012
Efficient robust private set intersection. Zbl 1271.94017
Dachman-Soled, Dana; Malkin, Tal; Raykova, Mariana; Yung, Moti
10
2012
Solving a 112-bit prime elliptic curve discrete logarithm problem on game consoles using sloppy reduction. Zbl 1276.94008
Bos, Joppe W.; Kaihara, Marcelo E.; Kleinjung, Thorsten; Lenstra, Arjen K.; Montgomery, Peter L.
8
2012
A tapestry of identity-based encryption: practical frameworks compared. Zbl 1178.94001
Boyen, Xavier
8
2008
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length. Zbl 1195.94054
Emura, Keita; Miyaji, Atsuko; Omote, Kazumasa; Nomura, Akito; Soshi, Masakazu
6
2010
Securing group key exchange against strong corruptions and key registration attacks. Zbl 1154.94380
Bresson, Emmanuel; Manulis, Mark
6
2008
Sieving for shortest vectors in ideal lattices: a practical perspective. Zbl 1428.94063
Bos, Joppe W.; Naehrig, Michael; van de Pol, Joop
5
2017
A framework for universally composable non-committing blind signatures. Zbl 1276.94022
Abe, Masayuki; Ohkubo, Miyako
4
2012
One-round key exchange in the standard model. Zbl 1159.94376
Boyd, Colin; Cliff, Yvonne; Nieto, Juan M. González; Paterson, Kenneth G.
4
2009
Homomorphic encryption and secure comparison. Zbl 1178.94185
Damgård, Ivan; Geisler, Martin; Krøigård, Mikkel
4
2008
CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance. Zbl 1428.94078
Ishida, Yuu; Shikata, Junji; Watanabe, Yohei
3
2017
Encrypted integer division and secure comparison. Zbl 1351.94069
Veugen, Thijs
3
2014
On reusing ephemeral keys in Diffie-Hellman key agreement protocols. Zbl 1208.94050
Menezes, Alfred; Ustaoglu, Berkant
3
2010
Power analysis attack: an approach based on machine learning. Zbl 1351.94055
Lerman, Liran; Bontempi, Gianluca; Markowitch, Olivier
2
2014
Randomness extraction in elliptic curves and secret key derivation at the end of Diffie-Hellman protocol. Zbl 1271.94016
Ciss, Abdoul Aziz; Sow, Djiby
2
2012
Attribute-based encryption without key cloning. Zbl 1276.94014
Hinek, M. Jason; Jiang, Shaoquan; Safavi-Naini, Reihaneh; Shahandashti, Siamak F.
2
2012
Theoretical and practical aspects of mutual information-based side channel analysis. Zbl 1208.94052
Prouff, E.; Rivain, M.
2
2010
Unconditionally reliable and secure message transmission in undirected synchronous networks: possibility, feasibility and optimality. Zbl 1208.94051
Patra, Arpita; Choudhury, Ashish; Rangan, C. Pandu; Srinathan, Kannan
2
2010
A correction to ‘efficient and secure comparison for on-line auctions’. Zbl 1171.94343
Damgård, Ivan; Geisler, Martin; Krøigård, Mikkel
2
2009
On the relation among various security models for certificateless cryptography. Zbl 1154.94399
Huang, Qiong; Wong, Duncan S.
2
2008
Comparing the pre- and post-specified peer models for key agreement. Zbl 1159.94367
Menezes, Alfred; Ustaoglu, Berkant
2
2009
Secure computation of functionalities based on Hamming distance and its application to computing document similarity. Zbl 1307.94086
Pinkas, Benny; Jarrous, Ayman
2
2013
On the security of the Winternitz one-time signature scheme. Zbl 1307.94090
Rückert, Markus; Buchmann, Johannes; Dahmen, Erik; Ereth, Sarah; Hülsing, Andreas
2
2013
Delegation-based conversion from CPA to CCA-secure predicate encryption. Zbl 1465.94083
Nandi, Mridul; Pandit, Tapas
2
2020
A new authenticated encryption technique for handling long ciphertexts in memory constrained devices. Zbl 1428.94101
Agrawal, Megha; Chang, Donghoon; Sanadhya, Somitra Kumar
1
2017
Trustworthy public randomness with sloth, unicorn, and trx. Zbl 1428.94083
Lenstra, Arjen K.; Wesolowski, Benjamin
1
2017
Notions for RSA integers. Zbl 1351.94061
Nüsken, Michael; Loebenberger, Daniel
1
2014
Hashing into Hessian curves. Zbl 1351.94043
Farashahi, Reza Rezaeian
1
2014
Dynamic attribute-based group signature with verifier-local revocation and backward unlinkability in the standard model. Zbl 1351.94020
Ali, Syed Taqi; Amberker, B. B.
1
2014
Chosen-prefix collisions for MD5 and applications. Zbl 1271.94023
Stevens, Marc; Lenstra, Arjen K.; de Weger, Benne
1
2012
Dynamic attribute-based signcryption without random oracles. Zbl 1276.94024
Emura, Keita; Miyaji, Atsuko; Rahman, Mohammad Shahriar
1
2012
Some results on cryptanalysis of SMS4 block cipher. Zbl 1195.94073
Zhang, Wentao; Su, Bozhan; Wu, Wenling; Feng, Dengguo
1
2010
Multiuser private queries over encrypted databases. Zbl 1171.68460
Yang, Yanjiang; Bao, Feng; Ding, Xuhua; Deng, Robert H.
1
2009
Remarks on “Analysis of one popular group signature scheme” in Asiacrypt 2006. Zbl 1171.94337
Ateniese, Giuseppe; Camenisch, Jan; Joye, Marc; Tsudik, Gene
1
2009
Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries. Zbl 1154.94451
Burmester, M.; de Medeiros, B.; Motta, R.
1
2008
The layered games framework for specifications and analysis of security protocols. Zbl 1154.94397
Herzberg, Amir; Yoffe, Igal
1
2008
A multidimensional linear distinguishing attack on the Shannon cipher. Zbl 1159.94362
Hakala, Risto M.; Nyberg, Kaisa
1
2009
Unconditionally secure disjointness tests for private datasets. Zbl 1159.94374
Ye, Qingsong; Wang, Huaxiong; Pieprzyk, Josef; Zhang, Xian-Mo
1
2009
Practical key-recovery attack against APOP, an MD5-based challenge-response authentication. Zbl 1178.94196
Leurent, Gaëtan
1
2008
An optimistic fair exchange protocol and its security in the universal composability framework. Zbl 1158.94387
Okada, Yusuke; Manabe, Yoshifumi; Okamoto, Tatsuaki
1
2008
Practical hybrid (hierarchical) identity-based encryption schemes based on the decisional bilinear Diffie-Hellman assumption. Zbl 1307.94092
Sarkar, Palash; Chatterjee, Sanjit
1
2013
Dynamic MDS diffusion layers with efficient software implementation. Zbl 07336557
Mirzaee Shamsabad, Mohammad Reza; Dehnavi, Seyed Mojtaba
1
2020
Delegation-based conversion from CPA to CCA-secure predicate encryption. Zbl 1465.94083
Nandi, Mridul; Pandit, Tapas
2
2020
Dynamic MDS diffusion layers with efficient software implementation. Zbl 07336557
Mirzaee Shamsabad, Mohammad Reza; Dehnavi, Seyed Mojtaba
1
2020
Sieving for shortest vectors in ideal lattices: a practical perspective. Zbl 1428.94063
Bos, Joppe W.; Naehrig, Michael; van de Pol, Joop
5
2017
CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance. Zbl 1428.94078
Ishida, Yuu; Shikata, Junji; Watanabe, Yohei
3
2017
A new authenticated encryption technique for handling long ciphertexts in memory constrained devices. Zbl 1428.94101
Agrawal, Megha; Chang, Donghoon; Sanadhya, Somitra Kumar
1
2017
Trustworthy public randomness with sloth, unicorn, and trx. Zbl 1428.94083
Lenstra, Arjen K.; Wesolowski, Benjamin
1
2017
Encrypted integer division and secure comparison. Zbl 1351.94069
Veugen, Thijs
3
2014
Power analysis attack: an approach based on machine learning. Zbl 1351.94055
Lerman, Liran; Bontempi, Gianluca; Markowitch, Olivier
2
2014
Notions for RSA integers. Zbl 1351.94061
Nüsken, Michael; Loebenberger, Daniel
1
2014
Hashing into Hessian curves. Zbl 1351.94043
Farashahi, Reza Rezaeian
1
2014
Dynamic attribute-based group signature with verifier-local revocation and backward unlinkability in the standard model. Zbl 1351.94020
Ali, Syed Taqi; Amberker, B. B.
1
2014
Secure computation of functionalities based on Hamming distance and its application to computing document similarity. Zbl 1307.94086
Pinkas, Benny; Jarrous, Ayman
2
2013
On the security of the Winternitz one-time signature scheme. Zbl 1307.94090
Rückert, Markus; Buchmann, Johannes; Dahmen, Erik; Ereth, Sarah; Hülsing, Andreas
2
2013
Practical hybrid (hierarchical) identity-based encryption schemes based on the decisional bilinear Diffie-Hellman assumption. Zbl 1307.94092
Sarkar, Palash; Chatterjee, Sanjit
1
2013
Public key encryption schemes supporting equality test with authorisation of different granularity. Zbl 1271.94025
Tang, Qiang
13
2012
Efficient robust private set intersection. Zbl 1271.94017
Dachman-Soled, Dana; Malkin, Tal; Raykova, Mariana; Yung, Moti
10
2012
Solving a 112-bit prime elliptic curve discrete logarithm problem on game consoles using sloppy reduction. Zbl 1276.94008
Bos, Joppe W.; Kaihara, Marcelo E.; Kleinjung, Thorsten; Lenstra, Arjen K.; Montgomery, Peter L.
8
2012
A framework for universally composable non-committing blind signatures. Zbl 1276.94022
Abe, Masayuki; Ohkubo, Miyako
4
2012
Randomness extraction in elliptic curves and secret key derivation at the end of Diffie-Hellman protocol. Zbl 1271.94016
Ciss, Abdoul Aziz; Sow, Djiby
2
2012
Attribute-based encryption without key cloning. Zbl 1276.94014
Hinek, M. Jason; Jiang, Shaoquan; Safavi-Naini, Reihaneh; Shahandashti, Siamak F.
2
2012
Chosen-prefix collisions for MD5 and applications. Zbl 1271.94023
Stevens, Marc; Lenstra, Arjen K.; de Weger, Benne
1
2012
Dynamic attribute-based signcryption without random oracles. Zbl 1276.94024
Emura, Keita; Miyaji, Atsuko; Rahman, Mohammad Shahriar
1
2012
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length. Zbl 1195.94054
Emura, Keita; Miyaji, Atsuko; Omote, Kazumasa; Nomura, Akito; Soshi, Masakazu
6
2010
On reusing ephemeral keys in Diffie-Hellman key agreement protocols. Zbl 1208.94050
Menezes, Alfred; Ustaoglu, Berkant
3
2010
Theoretical and practical aspects of mutual information-based side channel analysis. Zbl 1208.94052
Prouff, E.; Rivain, M.
2
2010
Unconditionally reliable and secure message transmission in undirected synchronous networks: possibility, feasibility and optimality. Zbl 1208.94051
Patra, Arpita; Choudhury, Ashish; Rangan, C. Pandu; Srinathan, Kannan
2
2010
Some results on cryptanalysis of SMS4 block cipher. Zbl 1195.94073
Zhang, Wentao; Su, Bozhan; Wu, Wenling; Feng, Dengguo
1
2010
One-round key exchange in the standard model. Zbl 1159.94376
Boyd, Colin; Cliff, Yvonne; Nieto, Juan M. González; Paterson, Kenneth G.
4
2009
A correction to ‘efficient and secure comparison for on-line auctions’. Zbl 1171.94343
Damgård, Ivan; Geisler, Martin; Krøigård, Mikkel
2
2009
Comparing the pre- and post-specified peer models for key agreement. Zbl 1159.94367
Menezes, Alfred; Ustaoglu, Berkant
2
2009
Multiuser private queries over encrypted databases. Zbl 1171.68460
Yang, Yanjiang; Bao, Feng; Ding, Xuhua; Deng, Robert H.
1
2009
Remarks on “Analysis of one popular group signature scheme” in Asiacrypt 2006. Zbl 1171.94337
Ateniese, Giuseppe; Camenisch, Jan; Joye, Marc; Tsudik, Gene
1
2009
A multidimensional linear distinguishing attack on the Shannon cipher. Zbl 1159.94362
Hakala, Risto M.; Nyberg, Kaisa
1
2009
Unconditionally secure disjointness tests for private datasets. Zbl 1159.94374
Ye, Qingsong; Wang, Huaxiong; Pieprzyk, Josef; Zhang, Xian-Mo
1
2009
A tapestry of identity-based encryption: practical frameworks compared. Zbl 1178.94001
Boyen, Xavier
8
2008
Securing group key exchange against strong corruptions and key registration attacks. Zbl 1154.94380
Bresson, Emmanuel; Manulis, Mark
6
2008
Homomorphic encryption and secure comparison. Zbl 1178.94185
Damgård, Ivan; Geisler, Martin; Krøigård, Mikkel
4
2008
On the relation among various security models for certificateless cryptography. Zbl 1154.94399
Huang, Qiong; Wong, Duncan S.
2
2008
Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries. Zbl 1154.94451
Burmester, M.; de Medeiros, B.; Motta, R.
1
2008
The layered games framework for specifications and analysis of security protocols. Zbl 1154.94397
Herzberg, Amir; Yoffe, Igal
1
2008
Practical key-recovery attack against APOP, an MD5-based challenge-response authentication. Zbl 1178.94196
Leurent, Gaëtan
1
2008
An optimistic fair exchange protocol and its security in the universal composability framework. Zbl 1158.94387
Okada, Yusuke; Manabe, Yoshifumi; Okamoto, Tatsuaki
1
2008
all top 5

Cited by 313 Authors

4 Takayasu, Atsushi
3 Abe, Masayuki
3 Chen, Jie
3 Hazay, Carmit
3 Lee, Hyung Tae
3 Li, Jin
3 Lin, XiJun
3 Ohkubo, Miyako
3 Qu, Haipeng
3 Stebila, Douglas
3 Sun, Lin
3 Susilo, Willy
3 Wang, Huaxiong
2 Attrapadung, Nuttapong
2 Chatterjee, Sanjit
2 Chen, Yuchi
2 Choi, Seung Geol
2 Cremers, Cas J. F.
2 Dachman-Soled, Dana
2 Emura, Keita
2 Groth, Jens
2 Heuser, Annelie
2 Huang, Qiong
2 Katsumata, Shuichi
2 Kohlweiss, Markulf
2 Li, Jiguo
2 Libert, Benoît
2 Ling, San
2 Lv, Xixiang
2 Ma, Sha
2 Malkin, Tal G.
2 Menezes, Alfred J.
2 Mu, Yi
2 Nandi, Mridul
2 Nishimaki, Ryo
2 Pandit, Tapas
2 Park, Jonghwan
2 Pointcheval, David
2 Qian, Haifeng
2 Seo, Jae Hong
2 Shen, Jian
2 Standaert, Francois-Xavier
2 Tang, Chunming
2 Tso, Raylin
2 Wang, Baocang
2 Watanabe, Yodai
2 Wee, Hoeteck
2 Zhang, Kai
1 Abdalla, Michel
1 Agrawal, Megha
1 Ahmadi, Omran
1 Alawatugoda, Janaka
1 Amandeep
1 Andreeva, Elena Anatol’evna
1 Armknecht, Frederik
1 Asgari Chenaghlu, Meysam
1 Ashwinkumar, B. V.
1 Au, Man Ho
1 Baek, Joonsang
1 Bera, Padmalochan
1 Bhagvati, Chakravarthy
1 Biswas, G. P.
1 Bordes, Nicolas
1 Bos, Joppe W.
1 Boudjou, Hortense
1 Bouillaguet, Charles
1 Boyd, Colin A.
1 Bradley, Tatiana
1 Buchmann, Johannes A.
1 Bunn, Paul H.
1 Cai, Haibin
1 Camenisch, Jan L.
1 Canard, Sébastien
1 Cao, Weiqiong
1 Cao, Zhenfu
1 Cassiers, Gaëtan
1 Catalano, Dario
1 Chang, Donghoon
1 Chang, Shih-Ying
1 Chang, Shuang
1 Chang, Shuo
1 Chase, Melissa
1 Chen, Hua
1 Chen, Rongmao
1 Chen, Yonghong
1 Cheng, Chen-Mou
1 Cheng, Qiong
1 Cheng, Xiaogang
1 Cheon, Jung Hee
1 Chevalier, Céline
1 Choo, Kim-Kwang Raymond
1 Choudhary, Ashish
1 Christensen, René Bødker
1 Chu, Cheng-Kang
1 Ciss, Abdoul Aziz
1 Cohn-Gordon, Katriel
1 Costello, Craig
1 Daemen, Joan
1 Dahmen, Erik
1 D’Arco, Paolo
...and 213 more Authors

Citations by Year