Sample articles
You can read all of these full-text articles free of charge - click

International Journal of Applied Cryptography
Title | Author(s) | Vol. and Issue nos. | Page nos. | Full-text article |
Yoyo cryptanalysis on Future | Sandip Kumar Mondal; Mostafizar Rahman; Santanu Sarkar; Avishek Adhikari | Vol.4 No.3/4 | 238-249 | ![]() |
A novel keyless cryptosystem based on Latin square and cognitive artificial intelligence for blockchain and covert communications | Abdelrahman Desoky; Hany Ammar; Gamal Fahmy; Shaker El-Sappagh; Abdeltawab Hendawi; Sameh Hassanien Basha | Vol.4 No.3/4 | 219-237 | ![]() |
Efficient revocable identity-based encryption with equality test | Jiaojiao Du; Sha Ma; Tian Yang; Qiong Huang | Vol.4 No.3/4 | 205-218 | ![]() |
Image and object encryption using multiplicative cipher and K-means clustering algorithm | Maroti Deshmukh; Arjun Singh Rawat | Vol.4 No.3/4 | 195-204 | ![]() |
PPADMA-ABE: a novel privacy-preserving and auditable attribute-based encryption under dynamic multi-authority setting | Zhifa Deng; Jiageng Chen; Shixiong Yao; Pei Li | Vol.4 No.3/4 | 176-194 | ![]() |
Finding differential trails on ChaCha by means of state functions | Emanuele Bellini; Juan Grados; Rusydi H. Makarim; Carlo Sanna | Vol.4 No.3/4 | 156-175 | ![]() |
WeightedSim: privacy-preserving weighted similarity query over encrypted healthcare data | Guojun Tang; Rongxing Lu; Mohammad Mamun | Vol.4 No.3/4 | 143-155 | ![]() |