International Journal of Applied Cryptography Short Title: Int. J. Appl. Cryptogr. Publisher: Inderscience Publishers, Genève ISSN: 1753-0563; 1753-0571/e Online: http://www.inderscienceonline.com/loi/ijacthttp://www.inderscience.com/jhome.php?jcode=ijact Comments: Indexed cover-to-cover Documents Indexed: 71 Publications (since 2008) all top 5 Latest Issues 4, No. 1 (2020) 3, No. 4 (2017) 3, No. 3 (2017) 3, No. 2 (2014) 3, No. 1 (2013) 2, No. 4 (2012) 2, No. 3 (2012) 2, No. 2 (2010) 2, No. 1 (2010) 1, No. 4 (2009) 1, No. 3 (2009) 1, No. 2 (2008) 1, No. 1 (2008) all top 5 Authors 3 Emura, Keita 3 Huang, Qiong 3 Lenstra, Arjen K. 2 Bao, Feng 2 Bos, Joppe W. 2 Chang, Donghoon 2 Choudhary, Ashish 2 Damgård, Ivan Bjerre 2 Deng, Robert Huijie 2 Geisler, Martin 2 Krøigård, Mikkel 2 Kurosawa, Kaoru 2 Manulis, Mark 2 Menezes, Alfred J. 2 Miyaji, Atsuko 2 Okamoto, Eiji 2 Patra, Arpita 2 Rangan, Chandrasekharan Pandu 2 Sanadhya, Somitra Kumar 2 Srinathan, Kannan 2 Stinson, Douglas Robert 2 Susilo, Willy 2 Ustaoglu, Berkant 2 Veugen, Thijs 2 Wong, Duncan S. 1 Abe, Masayuki 1 Agrawal, Megha 1 Ali, Syed Taqi 1 Amberker, B. Bharat 1 Aranha, Diego De Freitas 1 Ateniese, Giuseppe 1 Baldwin, Rusty O. 1 Bansal, Tarun Kumar 1 Bontempi, Gianluca 1 Boyd, Colin A. 1 Boyen, Xavier 1 Bresson, Emmanuel 1 Buchmann, Johannes A. 1 Burmester, Mike V. D. 1 Cai, Shaoying 1 Camenisch, Jan L. 1 Chakraborty, Debrup 1 Chatterjee, Sanjit 1 Roy Chowdhury, Dipanwita 1 Ciss, Abdoul Aziz 1 Clear, Michael 1 Cliff, Yvonne 1 Cremers, Cas J. F. 1 Dachman-Soled, Dana 1 Dahmen, Erik 1 de Medeiros, Breno 1 de Weger, Benne 1 Dehnavi, Seyed Mojtaba 1 Ding, Xuhua 1 Elbaz-Vincent, Philippe 1 Ereth, Sarah 1 Farashahi, Reza Rezaeian 1 Feng, Dengguo 1 Feng, Yiteng 1 Fouotsa, Emmanuel 1 Franklin, Matthew K. 1 Gajek, Sebastian 1 Ghosh, Shamit 1 Goldberg, Ian 1 González Nieto, Juan Manuel 1 Hagalisletto, Anders Moen 1 Hakala, Risto M. 1 Hanaoka, Goichiro 1 Heng, Swee-Huay 1 Herzberg, Amir 1 Hinek, M. Jason 1 Hong, Jeongdae 1 Huang, Jianyong 1 Hülsing, Andreas 1 Ishida, Yuu 1 Jakobsson, Markus 1 Jarrous, Ayman 1 Jiang, Shaoquan 1 Jin, Hongxia 1 Joye, Marc 1 Kaihara, Marcelo E. 1 Khoo, Khoongming 1 Kim, Jihye 1 Kim, Jinil 1 Kleinjung, Thorsten 1 Kodate, Akihisa 1 Lerman, Liran 1 Leurent, Gaëtan 1 Li, Tieyan 1 Li, Yingjiu 1 Lipmaa, Helger 1 Liu, Dennis Y. W. 1 Liu, Joseph K. K. 1 Loebenberger, Daniel 1 Lotspiech, Jeffrey B. 1 Malkin, Tal G. 1 Manabe, Yoshifumi 1 Mancillas-López, Cuauhtemoc 1 Markowitch, Olivier 1 Mashatan, Atefeh ...and 69 more Authors all top 5 Fields 71 Information and communication theory, circuits (94-XX) 14 Computer science (68-XX) 4 Number theory (11-XX) 2 Algebraic geometry (14-XX) 1 General and overarching topics; collections (00-XX) 1 Numerical analysis (65-XX) 1 Game theory, economics, finance, and other social and behavioral sciences (91-XX) Publications by Year all cited Publications top 5 cited Publications Citations contained in zbMATH Open 42 Publications have been cited 117 times in 113 Documents Cited by ▼ Year ▼ Public key encryption schemes supporting equality test with authorisation of different granularity. Zbl 1271.94025Tang, Qiang 13 2012 Efficient robust private set intersection. Zbl 1271.94017Dachman-Soled, Dana; Malkin, Tal; Raykova, Mariana; Yung, Moti 10 2012 Solving a 112-bit prime elliptic curve discrete logarithm problem on game consoles using sloppy reduction. Zbl 1276.94008Bos, Joppe W.; Kaihara, Marcelo E.; Kleinjung, Thorsten; Lenstra, Arjen K.; Montgomery, Peter L. 8 2012 A tapestry of identity-based encryption: practical frameworks compared. Zbl 1178.94001Boyen, Xavier 8 2008 A ciphertext-policy attribute-based encryption scheme with constant ciphertext length. Zbl 1195.94054Emura, Keita; Miyaji, Atsuko; Omote, Kazumasa; Nomura, Akito; Soshi, Masakazu 6 2010 Securing group key exchange against strong corruptions and key registration attacks. Zbl 1154.94380Bresson, Emmanuel; Manulis, Mark 6 2008 Sieving for shortest vectors in ideal lattices: a practical perspective. Zbl 1428.94063Bos, Joppe W.; Naehrig, Michael; van de Pol, Joop 5 2017 A framework for universally composable non-committing blind signatures. Zbl 1276.94022Abe, Masayuki; Ohkubo, Miyako 4 2012 One-round key exchange in the standard model. Zbl 1159.94376Boyd, Colin; Cliff, Yvonne; Nieto, Juan M. González; Paterson, Kenneth G. 4 2009 Homomorphic encryption and secure comparison. Zbl 1178.94185Damgård, Ivan; Geisler, Martin; Krøigård, Mikkel 4 2008 CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance. Zbl 1428.94078Ishida, Yuu; Shikata, Junji; Watanabe, Yohei 3 2017 Encrypted integer division and secure comparison. Zbl 1351.94069Veugen, Thijs 3 2014 On reusing ephemeral keys in Diffie-Hellman key agreement protocols. Zbl 1208.94050Menezes, Alfred; Ustaoglu, Berkant 3 2010 Power analysis attack: an approach based on machine learning. Zbl 1351.94055Lerman, Liran; Bontempi, Gianluca; Markowitch, Olivier 2 2014 Randomness extraction in elliptic curves and secret key derivation at the end of Diffie-Hellman protocol. Zbl 1271.94016Ciss, Abdoul Aziz; Sow, Djiby 2 2012 Attribute-based encryption without key cloning. Zbl 1276.94014Hinek, M. Jason; Jiang, Shaoquan; Safavi-Naini, Reihaneh; Shahandashti, Siamak F. 2 2012 Theoretical and practical aspects of mutual information-based side channel analysis. Zbl 1208.94052Prouff, E.; Rivain, M. 2 2010 Unconditionally reliable and secure message transmission in undirected synchronous networks: possibility, feasibility and optimality. Zbl 1208.94051Patra, Arpita; Choudhury, Ashish; Rangan, C. Pandu; Srinathan, Kannan 2 2010 A correction to ‘efficient and secure comparison for on-line auctions’. Zbl 1171.94343Damgård, Ivan; Geisler, Martin; Krøigård, Mikkel 2 2009 On the relation among various security models for certificateless cryptography. Zbl 1154.94399Huang, Qiong; Wong, Duncan S. 2 2008 Comparing the pre- and post-specified peer models for key agreement. Zbl 1159.94367Menezes, Alfred; Ustaoglu, Berkant 2 2009 Secure computation of functionalities based on Hamming distance and its application to computing document similarity. Zbl 1307.94086Pinkas, Benny; Jarrous, Ayman 2 2013 On the security of the Winternitz one-time signature scheme. Zbl 1307.94090Rückert, Markus; Buchmann, Johannes; Dahmen, Erik; Ereth, Sarah; Hülsing, Andreas 2 2013 Delegation-based conversion from CPA to CCA-secure predicate encryption. Zbl 1465.94083Nandi, Mridul; Pandit, Tapas 2 2020 A new authenticated encryption technique for handling long ciphertexts in memory constrained devices. Zbl 1428.94101Agrawal, Megha; Chang, Donghoon; Sanadhya, Somitra Kumar 1 2017 Trustworthy public randomness with sloth, unicorn, and trx. Zbl 1428.94083Lenstra, Arjen K.; Wesolowski, Benjamin 1 2017 Notions for RSA integers. Zbl 1351.94061Nüsken, Michael; Loebenberger, Daniel 1 2014 Hashing into Hessian curves. Zbl 1351.94043Farashahi, Reza Rezaeian 1 2014 Dynamic attribute-based group signature with verifier-local revocation and backward unlinkability in the standard model. Zbl 1351.94020Ali, Syed Taqi; Amberker, B. B. 1 2014 Chosen-prefix collisions for MD5 and applications. Zbl 1271.94023Stevens, Marc; Lenstra, Arjen K.; de Weger, Benne 1 2012 Dynamic attribute-based signcryption without random oracles. Zbl 1276.94024Emura, Keita; Miyaji, Atsuko; Rahman, Mohammad Shahriar 1 2012 Some results on cryptanalysis of SMS4 block cipher. Zbl 1195.94073Zhang, Wentao; Su, Bozhan; Wu, Wenling; Feng, Dengguo 1 2010 Multiuser private queries over encrypted databases. Zbl 1171.68460Yang, Yanjiang; Bao, Feng; Ding, Xuhua; Deng, Robert H. 1 2009 Remarks on “Analysis of one popular group signature scheme” in Asiacrypt 2006. Zbl 1171.94337Ateniese, Giuseppe; Camenisch, Jan; Joye, Marc; Tsudik, Gene 1 2009 Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries. Zbl 1154.94451Burmester, M.; de Medeiros, B.; Motta, R. 1 2008 The layered games framework for specifications and analysis of security protocols. Zbl 1154.94397Herzberg, Amir; Yoffe, Igal 1 2008 A multidimensional linear distinguishing attack on the Shannon cipher. Zbl 1159.94362Hakala, Risto M.; Nyberg, Kaisa 1 2009 Unconditionally secure disjointness tests for private datasets. Zbl 1159.94374Ye, Qingsong; Wang, Huaxiong; Pieprzyk, Josef; Zhang, Xian-Mo 1 2009 Practical key-recovery attack against APOP, an MD5-based challenge-response authentication. Zbl 1178.94196Leurent, Gaëtan 1 2008 An optimistic fair exchange protocol and its security in the universal composability framework. Zbl 1158.94387Okada, Yusuke; Manabe, Yoshifumi; Okamoto, Tatsuaki 1 2008 Practical hybrid (hierarchical) identity-based encryption schemes based on the decisional bilinear Diffie-Hellman assumption. Zbl 1307.94092Sarkar, Palash; Chatterjee, Sanjit 1 2013 Dynamic MDS diffusion layers with efficient software implementation. Zbl 07336557Mirzaee Shamsabad, Mohammad Reza; Dehnavi, Seyed Mojtaba 1 2020 Delegation-based conversion from CPA to CCA-secure predicate encryption. Zbl 1465.94083Nandi, Mridul; Pandit, Tapas 2 2020 Dynamic MDS diffusion layers with efficient software implementation. Zbl 07336557Mirzaee Shamsabad, Mohammad Reza; Dehnavi, Seyed Mojtaba 1 2020 Sieving for shortest vectors in ideal lattices: a practical perspective. Zbl 1428.94063Bos, Joppe W.; Naehrig, Michael; van de Pol, Joop 5 2017 CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance. Zbl 1428.94078Ishida, Yuu; Shikata, Junji; Watanabe, Yohei 3 2017 A new authenticated encryption technique for handling long ciphertexts in memory constrained devices. Zbl 1428.94101Agrawal, Megha; Chang, Donghoon; Sanadhya, Somitra Kumar 1 2017 Trustworthy public randomness with sloth, unicorn, and trx. Zbl 1428.94083Lenstra, Arjen K.; Wesolowski, Benjamin 1 2017 Encrypted integer division and secure comparison. Zbl 1351.94069Veugen, Thijs 3 2014 Power analysis attack: an approach based on machine learning. Zbl 1351.94055Lerman, Liran; Bontempi, Gianluca; Markowitch, Olivier 2 2014 Notions for RSA integers. Zbl 1351.94061Nüsken, Michael; Loebenberger, Daniel 1 2014 Hashing into Hessian curves. Zbl 1351.94043Farashahi, Reza Rezaeian 1 2014 Dynamic attribute-based group signature with verifier-local revocation and backward unlinkability in the standard model. Zbl 1351.94020Ali, Syed Taqi; Amberker, B. B. 1 2014 Secure computation of functionalities based on Hamming distance and its application to computing document similarity. Zbl 1307.94086Pinkas, Benny; Jarrous, Ayman 2 2013 On the security of the Winternitz one-time signature scheme. Zbl 1307.94090Rückert, Markus; Buchmann, Johannes; Dahmen, Erik; Ereth, Sarah; Hülsing, Andreas 2 2013 Practical hybrid (hierarchical) identity-based encryption schemes based on the decisional bilinear Diffie-Hellman assumption. Zbl 1307.94092Sarkar, Palash; Chatterjee, Sanjit 1 2013 Public key encryption schemes supporting equality test with authorisation of different granularity. Zbl 1271.94025Tang, Qiang 13 2012 Efficient robust private set intersection. Zbl 1271.94017Dachman-Soled, Dana; Malkin, Tal; Raykova, Mariana; Yung, Moti 10 2012 Solving a 112-bit prime elliptic curve discrete logarithm problem on game consoles using sloppy reduction. Zbl 1276.94008Bos, Joppe W.; Kaihara, Marcelo E.; Kleinjung, Thorsten; Lenstra, Arjen K.; Montgomery, Peter L. 8 2012 A framework for universally composable non-committing blind signatures. Zbl 1276.94022Abe, Masayuki; Ohkubo, Miyako 4 2012 Randomness extraction in elliptic curves and secret key derivation at the end of Diffie-Hellman protocol. Zbl 1271.94016Ciss, Abdoul Aziz; Sow, Djiby 2 2012 Attribute-based encryption without key cloning. Zbl 1276.94014Hinek, M. Jason; Jiang, Shaoquan; Safavi-Naini, Reihaneh; Shahandashti, Siamak F. 2 2012 Chosen-prefix collisions for MD5 and applications. Zbl 1271.94023Stevens, Marc; Lenstra, Arjen K.; de Weger, Benne 1 2012 Dynamic attribute-based signcryption without random oracles. Zbl 1276.94024Emura, Keita; Miyaji, Atsuko; Rahman, Mohammad Shahriar 1 2012 A ciphertext-policy attribute-based encryption scheme with constant ciphertext length. Zbl 1195.94054Emura, Keita; Miyaji, Atsuko; Omote, Kazumasa; Nomura, Akito; Soshi, Masakazu 6 2010 On reusing ephemeral keys in Diffie-Hellman key agreement protocols. Zbl 1208.94050Menezes, Alfred; Ustaoglu, Berkant 3 2010 Theoretical and practical aspects of mutual information-based side channel analysis. Zbl 1208.94052Prouff, E.; Rivain, M. 2 2010 Unconditionally reliable and secure message transmission in undirected synchronous networks: possibility, feasibility and optimality. Zbl 1208.94051Patra, Arpita; Choudhury, Ashish; Rangan, C. Pandu; Srinathan, Kannan 2 2010 Some results on cryptanalysis of SMS4 block cipher. Zbl 1195.94073Zhang, Wentao; Su, Bozhan; Wu, Wenling; Feng, Dengguo 1 2010 One-round key exchange in the standard model. Zbl 1159.94376Boyd, Colin; Cliff, Yvonne; Nieto, Juan M. González; Paterson, Kenneth G. 4 2009 A correction to ‘efficient and secure comparison for on-line auctions’. Zbl 1171.94343Damgård, Ivan; Geisler, Martin; Krøigård, Mikkel 2 2009 Comparing the pre- and post-specified peer models for key agreement. Zbl 1159.94367Menezes, Alfred; Ustaoglu, Berkant 2 2009 Multiuser private queries over encrypted databases. Zbl 1171.68460Yang, Yanjiang; Bao, Feng; Ding, Xuhua; Deng, Robert H. 1 2009 Remarks on “Analysis of one popular group signature scheme” in Asiacrypt 2006. Zbl 1171.94337Ateniese, Giuseppe; Camenisch, Jan; Joye, Marc; Tsudik, Gene 1 2009 A multidimensional linear distinguishing attack on the Shannon cipher. Zbl 1159.94362Hakala, Risto M.; Nyberg, Kaisa 1 2009 Unconditionally secure disjointness tests for private datasets. Zbl 1159.94374Ye, Qingsong; Wang, Huaxiong; Pieprzyk, Josef; Zhang, Xian-Mo 1 2009 A tapestry of identity-based encryption: practical frameworks compared. Zbl 1178.94001Boyen, Xavier 8 2008 Securing group key exchange against strong corruptions and key registration attacks. Zbl 1154.94380Bresson, Emmanuel; Manulis, Mark 6 2008 Homomorphic encryption and secure comparison. Zbl 1178.94185Damgård, Ivan; Geisler, Martin; Krøigård, Mikkel 4 2008 On the relation among various security models for certificateless cryptography. Zbl 1154.94399Huang, Qiong; Wong, Duncan S. 2 2008 Anonymous RFID authentication supporting constant-cost key-lookup against active adversaries. Zbl 1154.94451Burmester, M.; de Medeiros, B.; Motta, R. 1 2008 The layered games framework for specifications and analysis of security protocols. Zbl 1154.94397Herzberg, Amir; Yoffe, Igal 1 2008 Practical key-recovery attack against APOP, an MD5-based challenge-response authentication. Zbl 1178.94196Leurent, Gaëtan 1 2008 An optimistic fair exchange protocol and its security in the universal composability framework. Zbl 1158.94387Okada, Yusuke; Manabe, Yoshifumi; Okamoto, Tatsuaki 1 2008 all cited Publications top 5 cited Publications all top 5 Cited by 313 Authors 4 Takayasu, Atsushi 3 Abe, Masayuki 3 Chen, Jie 3 Hazay, Carmit 3 Lee, Hyung Tae 3 Li, Jin 3 Lin, XiJun 3 Ohkubo, Miyako 3 Qu, Haipeng 3 Stebila, Douglas 3 Sun, Lin 3 Susilo, Willy 3 Wang, Huaxiong 2 Attrapadung, Nuttapong 2 Chatterjee, Sanjit 2 Chen, Yuchi 2 Choi, Seung Geol 2 Cremers, Cas J. F. 2 Dachman-Soled, Dana 2 Emura, Keita 2 Groth, Jens 2 Heuser, Annelie 2 Huang, Qiong 2 Katsumata, Shuichi 2 Kohlweiss, Markulf 2 Li, Jiguo 2 Libert, Benoît 2 Ling, San 2 Lv, Xixiang 2 Ma, Sha 2 Malkin, Tal G. 2 Menezes, Alfred J. 2 Mu, Yi 2 Nandi, Mridul 2 Nishimaki, Ryo 2 Pandit, Tapas 2 Park, Jonghwan 2 Pointcheval, David 2 Qian, Haifeng 2 Seo, Jae Hong 2 Shen, Jian 2 Standaert, Francois-Xavier 2 Tang, Chunming 2 Tso, Raylin 2 Wang, Baocang 2 Watanabe, Yodai 2 Wee, Hoeteck 2 Zhang, Kai 1 Abdalla, Michel 1 Agrawal, Megha 1 Ahmadi, Omran 1 Alawatugoda, Janaka 1 Amandeep 1 Andreeva, Elena Anatol’evna 1 Armknecht, Frederik 1 Asgari Chenaghlu, Meysam 1 Ashwinkumar, B. V. 1 Au, Man Ho 1 Baek, Joonsang 1 Bera, Padmalochan 1 Bhagvati, Chakravarthy 1 Biswas, G. P. 1 Bordes, Nicolas 1 Bos, Joppe W. 1 Boudjou, Hortense 1 Bouillaguet, Charles 1 Boyd, Colin A. 1 Bradley, Tatiana 1 Buchmann, Johannes A. 1 Bunn, Paul H. 1 Cai, Haibin 1 Camenisch, Jan L. 1 Canard, Sébastien 1 Cao, Weiqiong 1 Cao, Zhenfu 1 Cassiers, Gaëtan 1 Catalano, Dario 1 Chang, Donghoon 1 Chang, Shih-Ying 1 Chang, Shuang 1 Chang, Shuo 1 Chase, Melissa 1 Chen, Hua 1 Chen, Rongmao 1 Chen, Yonghong 1 Cheng, Chen-Mou 1 Cheng, Qiong 1 Cheng, Xiaogang 1 Cheon, Jung Hee 1 Chevalier, Céline 1 Choo, Kim-Kwang Raymond 1 Choudhary, Ashish 1 Christensen, René Bødker 1 Chu, Cheng-Kang 1 Ciss, Abdoul Aziz 1 Cohn-Gordon, Katriel 1 Costello, Craig 1 Daemen, Joan 1 Dahmen, Erik 1 D’Arco, Paolo ...and 213 more Authors all top 5 Cited in 25 Journals 15 Information Sciences 13 Journal of Cryptology 12 Designs, Codes and Cryptography 8 Theoretical Computer Science 5 Advances in Mathematics of Communications 3 Soft Computing 3 Quantum Information Processing 2 Journal of Computer and System Sciences 2 Journal of Parallel and Distributed Computing 2 Mathematical Problems in Engineering 2 Journal of Discrete Mathematical Sciences & Cryptography 2 Journal of Mathematical Cryptology 1 IEEE Transactions on Information Theory 1 Information Processing Letters 1 Chaos, Solitons and Fractals 1 Computing 1 Journal of Computational and Applied Mathematics 1 Journal of Number Theory 1 Ricerche di Matematica 1 International Journal of Computer Mathematics 1 International Journal of Number Theory 1 Cryptography and Communications 1 Science China. Information Sciences 1 Arabian Journal for Science and Engineering 1 SIAM Journal on Applied Algebra and Geometry all top 5 Cited in 12 Fields 99 Information and communication theory, circuits (94-XX) 38 Computer science (68-XX) 9 Number theory (11-XX) 6 Algebraic geometry (14-XX) 4 Quantum theory (81-XX) 3 Statistics (62-XX) 2 Commutative algebra (13-XX) 2 Dynamical systems and ergodic theory (37-XX) 2 Game theory, economics, finance, and other social and behavioral sciences (91-XX) 1 Combinatorics (05-XX) 1 Field theory and polynomials (12-XX) 1 Numerical analysis (65-XX) Citations by Year