Login
Help
Sitemap
Home
For Authors
For Librarians
Orders
Inderscience
Online
News
International Journal of Applied Cryptography
Published issues
2010 Vol.2 No.2
International Journal of Applied Cryptography
2010 Vol.2 No.2
Pages
Title and author(s)
83-99
Session-StateReveal is stronger than eCKs EphemeralKeyReveal: using automatic analysis to attack the NAXOS protocol
Cas J.F. Cremers
DOI
:
10.1504/IJACT.2010.038304
100-120
On message recognition protocols: recoverability and explicit confirmation
Ian Goldberg, Atefeh Mashatan, Douglas R. Stinson
DOI
:
10.1504/IJACT.2010.038305
121-138
Theoretical and practical aspects of mutual information-based side channel analysis
E. Prouff, M. Rivain
DOI
:
10.1504/IJACT.2010.038306
139-153
Fair threshold decryption with semi-trusted third parties
Jeongdae Hong, Jinil Kim, Jihye Kim, Matthew K. Franklin, Kunsoo Park
DOI
:
10.1504/IJACT.2010.038307
154-158
On reusing ephemeral keys in Diffie-Hellman key agreement protocols
Alfred Menezes, Berkant Ustaoglu
DOI
:
10.1504/IJACT.2010.038308
159-197
Unconditionally reliable and secure message transmission in undirected synchronous networks: possibility, feasibility and optimality
Arpita Patra, Ashish Choudhury, C. Pandu Rangan, Kannan Srinathan
DOI
:
10.1504/IJACT.2010.038309
Sign up for new issue alerts
Subscribe/buy articles/issues
View sample articles
Latest issue contents as RSS feed
Forthcoming articles
Journal information in easy print format (PDF)
Publishing with Inderscience: ethical statement
Recommend to a librarian (PDF)
Feedback to Editor
Get permission to reproduce content
Find related journals
Keep up-to-date
Our Blog
Follow us on Twitter
Visit us on Facebook
Our Newsletter
(
subscribe for free
)
RSS Feeds
New issue alerts
Return to top