International Journal of Applied Cryptography
2013 Vol.3 No.1
Pages | Title and author(s) |
1-20 | Parallelisable variants of Camellia and SMS4 block cipher: p-Camellia and p-SMS4Huihui Yap; Khoongming Khoo; Axel Poschmann DOI: 10.1504/IJACT.2013.053432 |
21-46 | Secure computation of functionalities based on Hamming distance and its application to computing document similarityAyman Jarrous; Benny Pinkas DOI: 10.1504/IJACT.2013.053433 |
47-83 | Practical hybrid (hierarchical) identity-based encryption schemes based on the decisional bilinear Diffie-Hellman assumptionSanjit Chatterjee; Palash Sarkar DOI: 10.1504/IJACT.2013.053434 |
84-96 | On the security of the Winternitz one-time signature schemeJohannes Buchmann; Erik Dahmen; Sarah Ereth; Andreas Hülsing; Markus Rückert DOI: 10.1504/IJACT.2013.053435 |