- A new public remote integrity checking scheme with user and data privacy
- IBE and function-private IBE under linear assumptions with shorter ciphertexts and private keys, and extensions
- Preventing fault attacks using fault randomisation with a case study on AES
- A new authenticated encryption technique for handling long ciphertexts in memory constrained devices
- Sponge-based CCA2 secure asymmetric encryption for arbitrary length message (extended version)
- CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance
5 September 2017
Special issue published: "Information Security and Privacy"
International Journal of Applied Cryptography 3(3) 2017
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment