Sample articles
You can read all of these full-text articles free of charge - click
International Journal of Applied Cryptography
Title | Author(s) | Vol. and Issue nos. | Page nos. | Full-text article |
On the security of the Winternitz one-time signature scheme | Johannes Buchmann; Erik Dahmen; Sarah Ereth; Andreas Hülsing; Markus Rückert | Vol.3 No.1 | 84-96 | |
Practical hybrid (hierarchical) identity-based encryption schemes based on the decisional bilinear Diffie-Hellman assumption | Sanjit Chatterjee; Palash Sarkar | Vol.3 No.1 | 47-83 | |
Secure computation of functionalities based on Hamming distance and its application to computing document similarity | Ayman Jarrous; Benny Pinkas | Vol.3 No.1 | 21-46 | |
Parallelisable variants of Camellia and SMS4 block cipher: p-Camellia and p-SMS4 | Huihui Yap; Khoongming Khoo; Axel Poschmann | Vol.3 No.1 | 1-20 |