July 2016 | Volume 12 | Number 2 | ISSN 1820 - 4511
Guest Editor Mihaljevic, M.
Special issue - "Advances in Cryptology and Information Security"
Key Recovery from State Information of Sprout: Application to Fault Attack
Maitra, S., Sarkar, S., Baksi, A., and Dey, P.
Fourier Entropy-Influence Conjecture for Cryptographic Boolean Functions
Gangopadhyay, S. and Stanica, P.
Generic Construction of Ciphertext-Policy Attribute-Based Signcryption Secure in the Adaptive Predicate Model
Ishizaka, M., Ohata, S., and Matsuura, K
On Symmetric Incoherent Eavesdropping on BB84 and its Variants
Maitra, A. and Paul, G.
An Algebraic Security Evaluation Approach of Certain Encryption Techniques
Mihaljevic, M. J.