Go home now Header Background Image
Search
Submission Procedure
share: |
 
Follow us
 
 
 
 
Articles by Topics
Topic E. - Data
Topic E.3 - DATA ENCRYPTION

O. Ahmadi, D. Hankerson, F. Rodríguez-Henríquez:
Parallel Formulations of Scalar Multiplication on Koblitz Curves
/jucs_14_3/parallel_formulations_of_scalar
page 481 - 504
Vol.14 / Issue 3
M. Akinwande:
Advances in Homomorphic Cryptosystems
/jucs_15_3/advances_in_homomorphic_cryptosystems
page 506 - 522
Vol.15 / Issue 3
B. Alomair, R. Poovendran:
Information Theoretically Secure Encryption with Almost Free Authentication
/jucs_15_15/information_theoretically_secure_encryption
page 2937 - 2956
Vol.15 / Issue 15
C. Blundo, B. Masucci:
Randomness in Multi-Secret Sharing Schemes
/jucs_5_7/randomness_in_multi_secret
page 367 - 389
Vol.5 / Issue 7
J. Blõmer:
Randomness and Secrecy - A Brief Introduction
/jucs_12_6/randomness_and_secrecy_a
page 654 - 671
Vol.12 / Issue 6
N. Buckley, A.K. Nagar, S. Arumugam:
On Real-valued Visual Cryptographic Basis Matrices
/jucs_21_12/on_real_valued_visual
page 1536 - 1562
Vol.21 / Issue 12
P. Caballero-Gil, A. Fúster-Sabater, C. Hernández-Goya:
Graph-Based Approach to the Edit Distance Cryptanalysis of Irregularly Clocked Linear Feedback Shift Registers
/jucs_15_15/graph_based_approach_to
page 2981 - 2998
Vol.15 / Issue 15
S. Chatterjee, P. Sarkar:
Constant Size Ciphertext HIBE in the Augmented Selective-ID Model and its Extensions
/jucs_13_10/constant_size_ciphertext_hibe
page 1367 - 1395
Vol.13 / Issue 10
L. Chen, Q. Tang:
Bilateral Unknown Key-Share Attacks in Key Agreement Protocols
/jucs_14_3/bilateral_unknown_key_share
page 416 - 440
Vol.14 / Issue 3
C.-K. Chu, W.-G. Tzeng:
Efficient k-out-of-n Oblivious Transfer Schemes
/jucs_14_3/efficient_k_out_of
page 397 - 415
Vol.14 / Issue 3
T. Cui, C. Jin, G. Zhang:
Observations of Skipjack-like Structure with SP/SPS Round Function
/jucs_19_16/observations_of_skipjack_like
page 2453 - 2471
Vol.19 / Issue 16
C. Ding, T. Laihonen, A. Renvall:
Linear Multisecret-Sharing Schemes and Error-Correcting Codes
/jucs_3_9/linear_multisecret_sharing
page 1023 - 1036
Vol.3 / Issue 9
L. Ding, J. Guan, W.-l. Sun:
New Results of Related-key Attacks on All Py-Family of Stream Ciphers
/jucs_18_12/new_results_of_related
page 1741 - 756
Vol.18 / Issue 12
J. Gonda:
The Number of the Modulo n Roots of the Polynomial xvxv and the RSA
/jucs_12_9/the_number_of_the
page 1215 - 1228
Vol.12 / Issue 9
J.M. Granado-Criado, M.A. Vega-Rodríguez, J.M. Sánchez-Pérez, J.A. Gómez-Pulido:
A Dynamically and Partially Reconfigurable Implementation of the IDEA Algorithm Using FPGAs and Handel-C
/jucs_13_3/a_dynamically_and_partially
page 407 - 418
Vol.13 / Issue 3
R. Halder, S. Pal, A. Cortesi:
Watermarking Techniques for Relational Databases: Survey, Classification and Comparison
/jucs_16_21/watermarking_techniques_for_relational
page 3164 - 3190
Vol.16 / Issue 21
L. Hanzlik, M. Kutyłowski:
Restricted Identification Secure in the Extended Canetti-Krawczyk Model
/jucs_21_3/restricted_identification_secure_in
page 419 - 439
Vol.21 / Issue 3
J. Herranz:
Ideal Homogeneous Access Structures Constructed from Graphs
/jucs_15_14/ideal_homogeneous_access_structures
page 2881 - 2893
Vol.15 / Issue 14
Y.H. Hwang, J.K. Liu, S.S. Chow:
Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model
/jucs_14_3/certificateless_public_key_encryption
page 463 - 480
Vol.14 / Issue 3
I.R. Jeong, D.H. Lee:
Parallel Key Exchange
/jucs_14_3/parallel_key_exchange
page 377 - 396
Vol.14 / Issue 3
A. Kawachi, T. Koshiba:
Progress in Quantum Computational Cryptography
/jucs_12_6/progress_in_quantum_computational
page 691 - 709
Vol.12 / Issue 6
K. Kurosawa, T. Satoh, K. Yamamoto:
Highly Nonlinear t-Resilient Functions
/jucs_3_6/highly_nonlinear_t_resilient
page 721 - 729
Vol.3 / Issue 6
J.O. Kwon, I.R. Jeong, D.H. Lee:
Light-Weight Key Exchange with Different Passwords in the Standard Model
/jucs_15_5/light_weight_key_exchange
page 1042 - 1064
Vol.15 / Issue 5
C. Lee, J. Kim, S. Hong, Y.-S. Lee:
Security Analysis of the Full-Round CHESS-64 Cipher Suitable for Pervasive Computing Environments
/jucs_15_5/security_analysis_of_the
page 1007 - 1022
Vol.15 / Issue 5
L. Marin, A.J. Jara, A.F. Skarmeta:
Multiplication and Squaring with Shifting Primes on OpenRISC Processors with Hardware Multiplier
/jucs_19_16/multiplication_and_squaring_with
page 2368 - 2384
Vol.19 / Issue 16
W. Mayerwieser, K. C. Posch, R. Posch, V. Schindler:
Testing a High-Speed Data Path The Design of the RSAb Crypto Chip
/jucs_1_11/testing_a_high_speed
page 728 - 743
Vol.1 / Issue 11
A. Nait-Sidi-Moh, M. Bakhouya, W. Ait-Cheik-Bihi, J. Gaber:
Modeling and Performance Evaluation of a Contract-based Electronic Signature Process
/jucs_18_5/modeling_and_performance_evaluation
page 676 - 703
Vol.18 / Issue 5
J.Á. Muñoz Naranjo, P. Orduña, A. Gómez-Goiri, D. López-de-Ipiña, L. González Casado:
Enabling User Access Control in Energy-constrained Wireless Smart Environments
/jucs_19_17/enabling_user_access_control
page 2490 - 2505
Vol.19 / Issue 17
N. Nedjah, L. de Macedo Mourelle:
Pareto-Optimal Hardware for Substitution Boxes
/jucs_12_4/pareto_optimal_hardware_for
page 395 - 407
Vol.12 / Issue 4
L. Nguyen, R. Safavi-Naini, K. Kurosawa:
A Provably Secure and Efficient Verifiable Shuffle based on a Variant of the Paillier Cryptosystem
/jucs_11_6/a_provably_secure_and
page 986 - 1010
Vol.11 / Issue 6
W. Ogata, K. Kurosawa:
Some Basic Properties of General Nonperfect Secret Sharing Schemes
/jucs_4_8/some_basic_properties_of
page 690 - 704
Vol.4 / Issue 8
C.-M. Ou, C.-R. Ou:
Non-repudiation Mechanism of Agent-based Mobile Payment Systems: Perspectives on Wireless PKI
/jucs_14_14/non_repudiation_mechanism_of
page 2309 - 2328
Vol.14 / Issue 14
O. Pérez, Y. Berviller, C. Tanougast, S. Weber:
The Use of Runtime Reconfiguration on FPGA Circuits to Increase the Performance of the AES Algorithm Implementation
/jucs_13_3/the_use_of_runtime
page 349 - 362
Vol.13 / Issue 3
C. Rechberger, V. Rijmen:
New Results on NMAC/HMAC when Instantiated with Popular Hash Functions
/jucs_14_3/new_results_on_nmac
page 347 - 376
Vol.14 / Issue 3
P. Sarkar:
Domain Extenders for UOWHF: A Finite Binary Tree Algorithm
/jucs_11_6/domain_extenders_for_uowhf
page 1040 - 1053
Vol.11 / Issue 6
J. Seberry, X.-M. Zhang, Y. Zheng:
The Relationship Between Propagation Characteristics and Nonlinearity of Cryptographic Functions
/jucs_1_2/the_relationship_between_propagation
page 136 - 150
Vol.1 / Issue 2
J. Shearer, P. Gutmann:
Government, Cryptography, and the Right to Privacy
/jucs_2_3/government_cryptography_and_the
page 113 - 146
Vol.2 / Issue 3
K.-A. Shim:
Security Analysis of Three Password Authentication Schemes
/jucs_17_11/security_analysis_of_three
page 1623 - 1633
Vol.17 / Issue 11
R. Athi Vasudevan, A. Abraham, S. Sanyal:
A Novel Scheme for Secured Data Transfer Over Computer Networks
/jucs_11_1/a_novel_scheme_for
page 104 - 121
Vol.11 / Issue 1
X. Xie, H. Ma, J. Li, X. Chen:
An Efficient Ciphertext-Policy Attribute-Based Access Control towards Revocation in Cloud Computing
/jucs_19_16/an_efficient_ciphertext_policy
page 2349 - 2367
Vol.19 / Issue 16
G. Zhang, J. Qin, S. Qazi:
Multi-Authority Attribute-Based Encryption Scheme from Lattices
/jucs_21_3/multi_authority_attribute_based
page 483 - 5001
Vol.21 / Issue 3
X.-M. Zhang, Y. Zheng:
On the Difficulty of Constructing Cryptographically Strong Substitution Boxes
/jucs_2_3/on_the_difficulty_of
page 147 - 162
Vol.2 / Issue 3
X.-M. Zhang, Y. Zheng:
GAC - the Criterion for Global Avalanche Characteristics of Cryptographic Functions
/jucs_1_5/gac_the_criterion_for
page 320 - 337
Vol.1 / Issue 5
Y. Zheng, X.-M. Zhang:
The kth-Order Nonhomomorphicity of S-Boxes
/jucs_6_8/the_kth_order_nonhomomorphicity
page 830 - 848
Vol.6 / Issue 8