International Journal of Applied Cryptography
2012 Vol.2 No.4
Pages | Title and author(s) |
289-303 | Efficient robust private set intersectionDana Dachman-Soled; Tal Malkin; Mariana Raykova; Moti Yung DOI: 10.1504/IJACT.2012.048080 |
304-321 | Public key encryption schemes supporting equality test with authorisation of different granularityQiang Tang DOI: 10.1504/IJACT.2012.048079 |
322-359 | Chosen-prefix collisions for MD5 and applicationsMarc Stevens; Arjen K. Lenstra; Benne De Weger DOI: 10.1504/IJACT.2012.048084 |
360-365 | Randomness extraction in elliptic curves and secret key derivation at the end of Diffie-Hellman protocolAbdoul Aziz Ciss; Djiby Sow DOI: 10.1504/IJACT.2012.048083 |