Login Help Sitemap
Inderscience Publishers - linking academia, business and industry through research
  • Home
  • For Authors
  • For Librarians
  • Orders
  • Inderscience Online
  • News
  1. International Journal of Applied Cryptography
  2. Published issues
  3. 2014 Vol.3 No.2
International Journal of Applied Cryptography (IJACT)

International Journal of Applied Cryptography

2014 Vol.3 No.2


Pages Title and author(s)
97-115Power analysis attack: an approach based on machine learning
Liran Lerman; Gianluca Bontempi; Olivier Markowitch
DOI: 10.1504/IJACT.2014.062722
116-138Notions for RSA integers
Daniel Loebenberger; Michael Nüsken
DOI: 10.1504/IJACT.2014.062723
139-147Hashing into Hessian curves
Reza Rezaeian Farashahi
DOI: 10.1504/IJACT.2014.062737
148-165Dynamic attribute-based group signature with verifier-local revocation and backward unlinkability in the standard model
Syed Taqi Ali; B.B. Amberker
DOI: 10.1504/IJACT.2014.062736
166-180Encrypted integer division and secure comparison
Thijs Veugen
DOI: 10.1504/IJACT.2014.062738
181-194Random Forest profiling attack on advanced encryption standard
Hiren Patel; Rusty O. Baldwin
DOI: 10.1504/IJACT.2014.062740

 

  • Sign up for new issue alerts
  • Subscribe/buy articles/issues
  • View sample articles
  • Latest issue contents as RSS feed
  • Forthcoming articles
  • Journal information in easy print format (PDF)
  • Publishing with Inderscience: ethical statement
  • Recommend to a librarian (PDF)
  • Feedback to Editor
  • Get permission to reproduce content
  • Find related journals
Keep up-to-date
  • BlogOur Blog
  • TwitterFollow us on Twitter
  • FacebookVisit us on Facebook
  • Our Newsletter (subscribe for free)
  • RSS Feeds
  • New issue alerts
Return to top
  • Contact us
  • About Inderscience
  • OAI Repository
  • Privacy and Cookies Statement
  • Terms and Conditions
  • Help
  • Sitemap
  • © Inderscience Enterprises Ltd.