Publications
Search

Publications :: Search

Show venue

On this page you see the details of the selected venue.

    Journal
    Name: IJACT
    Year: 2010
    Volume: 2
    Number: 1
    DBLP: db/journals/ijact/ijact2.html
    Bookmark:

    Below you find the publications assigned to this venue.

    Show item 1 to 10 of 22  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Joppe W. Bos, Marcelo E. Kaihara, Thorsten Kleinjung, Arjen K. Lenstra, Peter L. Montgomery.
    Solving a 112-bit prime elliptic curve discrete logarithm problem on game consoles using sloppy reduction.
    IJACT 2010, Volume 2 (0) 2012
    Conference paper
    M. Jason Hinek, Shaoquan Jiang, Reihaneh Safavi-Naini, Siamak F. Shahandashti.
    Attribute-based encryption without key cloning.
    IJACT 2010, Volume 2 (0) 2012
    Conference paper
    Masayuki Abe, Miyako Ohkubo.
    A framework for universally composable non-committing blind signatures.
    IJACT 2010, Volume 2 (0) 2012
    Conference paper
    Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman.
    Dynamic attribute-based signcryption without random oracles.
    IJACT 2010, Volume 2 (0) 2012
    Conference paper
    Debrup Chakraborty, Cuauhtemoc Mancillas-López.
    Double ciphertext mode: a proposal for secure backup.
    IJACT 2010, Volume 2 (0) 2012
    Conference paper
    Marc Stevens, Arjen K. Lenstra, Benne de Weger.
    Chosen-prefix collisions for MD5 and applications.
    IJACT 2010, Volume 2 (0) 2012
    Conference paper
    Dana Dachman-Soled, Tal Malkin, Mariana Raykova 0001, Moti Yung.
    Efficient robust private set intersection.
    IJACT 2010, Volume 2 (0) 2012
    Conference paper
    Qiang Tang.
    Public key encryption schemes supporting equality test with authorisation of different granularity.
    IJACT 2010, Volume 2 (0) 2012
    Conference paper
    Abdoul Aziz Ciss, Djiby Sow.
    Randomness extraction in elliptic curves and secret key derivation at the end of Diffie-Hellman protocol.
    IJACT 2010, Volume 2 (0) 2012
    Journal article
    Hongxia Jin, Jeffrey B. Lotspiech, Serdar Pehlivanoglu.
    Defending against the pirate evolution attack.
    IJACT 2010, Volume 2 (0) 2010
    Show item 1 to 10 of 22  

    Your query returned 22 matches in the database.