
International Journal of Applied Cryptography
2014 Vol.3 No.2
Pages | Title and author(s) |
97-115 | Power analysis attack: an approach based on machine learningLiran Lerman; Gianluca Bontempi; Olivier Markowitch DOI: 10.1504/IJACT.2014.062722 |
116-138 | Notions for RSA integersDaniel Loebenberger; Michael Nüsken DOI: 10.1504/IJACT.2014.062723 |
139-147 | Hashing into Hessian curvesReza Rezaeian Farashahi DOI: 10.1504/IJACT.2014.062737 |
148-165 | Dynamic attribute-based group signature with verifier-local revocation and backward unlinkability in the standard modelSyed Taqi Ali; B.B. Amberker DOI: 10.1504/IJACT.2014.062736 |
166-180 | Encrypted integer division and secure comparisonThijs Veugen DOI: 10.1504/IJACT.2014.062738 |
181-194 | Random Forest profiling attack on advanced encryption standardHiren Patel; Rusty O. Baldwin DOI: 10.1504/IJACT.2014.062740 |