- Samiran Bag, Muhammad Ajmal Azad, Feng Hao 0001. End-to-end verifiable cumulative voting without tallying authorities. IJACT, 4(2):85-103, 2022.
- Zhuo Qi Chen. A novel architecture to make anonymous blind signature-based e-coins more efficient and applicable. IJACT, 4(2):121-142, 2022.
- Shardha Porwal, Sangeeta Mittal. Authority revocation scheme for MA-CP-ABE-based secure communication in IoMT ecosystem. IJACT, 4(2):104-120, 2022.
- Jörg Schwenk, Douglas Stebila. A reduction-based proof for authentication and session key security in three-party Kerberos. IJACT, 4(2):61-84, 2022.
- Narcisse Bang Mbang, Diego de Freitas Aranha, Emmanuel Fouotsa. Computing the optimal ate pairing over elliptic curves with embedding degrees 54 and 48 at the 256-bit security level. IJACT, 4(1):45-59, 2020.
- Mohammad Reza Mirzaee Shamsabad, Seyed Mojtaba Dehnavi. Dynamic MDS diffusion layers with efficient software implementation. IJACT, 4(1):36-44, 2020.
- Thijs Veugen. Efficient coding for secure computing with additively-homomorphic encrypted data. IJACT, 4(1):1-15, 2020.
- Mridul Nandi, Tapas Pandit. Delegation-based conversion from CPA to CCA-secure predicate encryption. IJACT, 4(1):16-35, 2020.
- Helger Lipmaa. Prover-efficient commit-and-prove zero-knowledge SNARKs. IJACT, 3(4):344-362, 2017.
- Yiteng Feng, Guomin Yang, Joseph K. Liu. A new public remote integrity checking scheme with user and data privacy. IJACT, 3(3):196-209, 2017.