
International Journal of Applied Cryptography
2012 Vol.2 No.4
| Pages | Title and author(s) |
| 289-303 | Efficient robust private set intersectionDana Dachman-Soled; Tal Malkin; Mariana Raykova; Moti Yung DOI: 10.1504/IJACT.2012.048080 |
| 304-321 | Public key encryption schemes supporting equality test with authorisation of different granularityQiang Tang DOI: 10.1504/IJACT.2012.048079 |
| 322-359 | Chosen-prefix collisions for MD5 and applicationsMarc Stevens; Arjen K. Lenstra; Benne De Weger DOI: 10.1504/IJACT.2012.048084 |
| 360-365 | Randomness extraction in elliptic curves and secret key derivation at the end of Diffie-Hellman protocolAbdoul Aziz Ciss; Djiby Sow DOI: 10.1504/IJACT.2012.048083 |