
International Journal of Applied Cryptography
2008 Vol.1 No.1
![]() |
Pages | Title and author(s) |
3-21 | A tapestry of identity-based encryption: practical frameworks comparedXavier Boyen DOI: 10.1504/IJACT.2008.017047 |
22-31 | Homomorphic encryption and secure comparisonIvan Damgard, Martin Geisler, Mikkel Kroigard DOI: 10.1504/IJACT.2008.017048 |
32-46 | Practical key-recovery attack against APOP, an MD5-based challenge-response authenticationGaetan Leurent DOI: 10.1504/IJACT.2008.017049 |
47-59 | Delayed password disclosureMarkus Jakobsson, Steven Myers DOI: 10.1504/IJACT.2008.017051 |
60-69 | The power of identification schemesKaoru Kurosawa, Swee-Huay Heng DOI: 10.1504/IJACT.2008.017050 |
70-77 | An optimistic fair exchange protocol and its security in the universal composability frameworkYusuke Okada, Yoshifumi Manabe, Tatsuaki Okamoto DOI: 10.1504/IJACT.2008.017052 |