
International Journal of Applied Cryptography
2009 Vol.1 No.3
Pages | Title and author(s) |
161-168 | A multidimensional linear distinguishing attack on the Shannon cipherRisto M. Hakala, Kaisa Nyberg DOI: 10.1504/IJACT.2009.023463 |
169-180 | A critical analysis and improvement of advanced access content system drive-host authenticationJiayuan Sui, Douglas R. Stinson DOI: 10.1504/IJACT.2009.023464 |
181-199 | One-round key exchange in the standard modelColin Boyd, Yvonne Cliff, Juan M. Gonzalez Nieto, Kenneth G. Paterson DOI: 10.1504/IJACT.2009.023466 |
200-224 | Perfectly reliable and secure message transmission tolerating mobile adversaryArpita Patra, Ashish Choudhary, C. Pandu Rangan, Kannan Srinathan, Prasad Raghavendra DOI: 10.1504/IJACT.2009.023467 |
225-235 | Unconditionally secure disjointness tests for private datasetsQingsong Ye, Huaxiong Wang, Josef Pieprzyk, Xian-Mo Zhang DOI: 10.1504/IJACT.2009.023471 |
236-250 | Comparing the pre- and post-specified peer models for key agreementAlfred Menezes, Berkant Ustaoglu DOI: 10.1504/IJACT.2009.023472 |