International Journal of Applied Cryptography
2017 Vol.3 No.4
Pages | Title and author(s) |
313-329 | Sieving for shortest vectors in ideal lattices: a practical perspectiveJoppe W. Bos; Michael Naehrig; Joop Van De Pol DOI: 10.1504/IJACT.2017.089353 |
330-343 | Trustworthy public randomness with sloth, unicorn, and trxArjen K. Lenstra; Benjamin Wesolowski DOI: 10.1504/IJACT.2017.089354 |
344-362 | Prover-efficient commit-and-prove zero-knowledge SNARKsHelger Lipmaa DOI: 10.1504/IJACT.2017.089355 |
363-376 | Attribute-based fully homomorphic encryption with a bounded number of inputsMichael Clear; Ciarán Mc Goldrick DOI: 10.1504/IJACT.2017.089356 |
377-393 | On the separation between the FHMQV and HMQV protocolsAugustin P. Sarr; Philippe Elbaz-Vincent DOI: 10.1504/IJACT.2017.089357 |
394-406 | A privacy-enhanced access log management mechanism in SSO systems from nominative signaturesSanami Nakagawa; Takashi Nishide; Eiji Okamoto; Keita Emura; Goichiro Hanaoka; Yusuke Sakai; Akihisa Kodate DOI: 10.1504/IJACT.2017.089373 |