- Thijs Veugen, Robert S. Wezeman, Alessandro Amadori, Sven Bootsma, Bart Kamphorst. Secure addition of floating points. IJACT, 5(5):1-11, 2025.
- Manmohan Pundir, Abhimanyu Kumar. A pairing-free ID-based group key agreement protocol using elliptic curve cryptography for secure group communication. IJACT, 5(2):89-105, 2025.
- Aida Abouelseoud Nasr, Khalid Mohamed Sharaf, Fatma M. Talaat. Securing continuum computing networks: towards robust encryption protocols for saving digital transformation procedures. IJACT, 5(2):119-130, 2025.
- Shrabani Sutradhar, Rajesh Bose, Sudipta Majumder, Haraprasad Mondal. Fortifying cloud-based healthcare: a link load balancer infused with NTRU, honey, and proxy algorithms for robust identity and access management. IJACT, 5(2):71-88, 2025.
- Souvik Sur. Necessity of large primes and delay commitment in efficient verifiable delay function. IJACT, 5(2):106-118, 2025.
- Chengzu Dong, Zhiyu Xu, Shantanu Pal, Frank Jiang 0001, Shiping Chen 0001, Chong Zhang, Xiao Liu 0004. BlockFedL: a blockchain-based federated learning framework for securing smart UAV delivery systems at the edge. IJACT, 5(1):13-29, 2024.
- Sandip Kumar Mondal, Mostafizar Rahman, Santanu Sarkar 0001, Avishek Adhikari. Yoyo cryptanalysis on Future. IJACT, 4(3/4):238-249, 2024.
- Subinoy Sikdar, Joydeep Biswas, Malay Kule. Cryptanalysis of Markle-Hellman knapsack cipher using nature inspired algorithms. IJACT, 5(1):41-56, 2024.
- Maroti Deshmukh, Arjun Singh Rawat. Image and object encryption using multiplicative cipher and K-means clustering algorithm. IJACT, 4(3/4):195-204, 2024.
- Emanuele Bellini 0002, Juan Grados 0002, Rusydi H. Makarim, Carlo Sanna. Finding differential trails on ChaCha by means of state functions. IJACT, 4(3/4):156-175, 2024.