- Narcisse Bang Mbang, Diego de Freitas Aranha, Emmanuel Fouotsa. Computing the optimal ate pairing over elliptic curves with embedding degrees 54 and 48 at the 256-bit security level. IJACT, 4(1):45-59, 2020.
- Mohammad Reza Mirzaee Shamsabad, Seyed Mojtaba Dehnavi. Dynamic MDS diffusion layers with efficient software implementation. IJACT, 4(1):36-44, 2020.
- Thijs Veugen. Efficient coding for secure computing with additively-homomorphic encrypted data. IJACT, 4(1):1-15, 2020.
- Mridul Nandi, Tapas Pandit. Delegation-based conversion from CPA to CCA-secure predicate encryption. IJACT, 4(1):16-35, 2020.
- Helger Lipmaa. Prover-efficient commit-and-prove zero-knowledge SNARKs. IJACT, 3(4):344-362, 2017.
- Yiteng Feng, Guomin Yang, Joseph K. Liu. A new public remote integrity checking scheme with user and data privacy. IJACT, 3(3):196-209, 2017.
- Joppe W. Bos, Michael Naehrig, Joop van de Pol. Sieving for shortest vectors in ideal lattices: a practical perspective. IJACT, 3(4):313-329, 2017.
- Kaoru Kurosawa, Le Trieu Phong. IBE and function-private IBE under linear assumptions with shorter ciphertexts and private keys, and extensions. IJACT, 3(3):210-224, 2017.
- Yuu Ishida, Junji Shikata, Yohei Watanabe 0001. CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance. IJACT, 3(3):288-311, 2017.
- Megha Agrawal, Donghoon Chang, Somitra Kumar Sanadhya. A new authenticated encryption technique for handling long ciphertexts in memory constrained devices. IJACT, 3(3):236-261, 2017.