International Journal on Cryptography and Information Security (IJCIS)

Volume 3

December 2013, Volume 3, Number 4

A Pairing-Free Identity Based Tripartite Signcryption Scheme  
Hassan M. Elkamchouchi1, Eman F. Abou Elkheir2 and Yasmine Abouelseoud1, 1Alexandria University, Egypt
and 2Kafr El-Sheikh University, Egypt
A New Attack on RSA With a Composed Decryption Exponent  
Abderrahmane Nitaj1 and Mohamed Ould Douh1,2, 1Universite de Caen, France and 2Universite des Sciences,
Mauritania

September 2013, Volume 3, Number 3

Performance Analysis of Sha-2 and Sha-3 Finalists  
Ram Krishna Dahal1, Jagdish Bhatta1 and Tanka Nath Dhamala2, 1Tribhuvan University, Nepal and 2University of Kaiserslautern, Germany
A Secure Block Permutation Image Steganography Algorithm  
Hussein Al-Bahadili, University of Petra, Jordan
Blind and Robust Images Watermarking Based on Wavelet and Edge Insertion  
Henri Bruno Razafindradina1 and Attoumani Mohamed Karim2, 1Higher Institute of Technology, Diego Suarez -
Madagascar and 2Comoros ICT Regulation Authority, Comoros
Elliptic Curve Cryptography in Securing Networks by Mobile Authentication  
Manoj Prabhakar, Anna University, India

June 2013, Volume 3, Number 2

An Improvement to the Set Protocol Based on Signcryption   
Hassan M. Elkamchouchi 1, Eman F. Abu Elkhair2 and Yasmine Abouelseoud1,1Alexandria University,Egypt,
2 Kafr El-Sheikh University, Egypt.
An Encryption Algorithm to Evaluate Performance of V2V Communication in Vanet  
Manpreet Kaur1, Rajni1 and Parminder Singh2,1 S.B.S.S.T.C, Ferozepur, 2Chandigarh Group of Colleges, Landran.
A New Method for Preserving Privacy in Data Publishing Against Attribute and Identity Disclosure Risk  
R.Mahesh and T.Meyyappan, Alagappa University, India

March 2013, Volume 3, Number 1

Secure Image Transfer in The Domain Transform DFT  
Rakotondraina Tahina Ezechiel and Rakotomalala Mamy Alain, University of Antananarivo, Madagascar
Hardware Implementation of Algorithm for Cryptanalysis  
Harshali Zodpe1, Prakash Wani2, Rakesh Mehta3, 1Maharashtra Institute of Technology,ndia, 2College of Engineering, Pune, India and 3Mechatronics Test Equipments (I) Pvt. Ltd.,India
A Secure Color Image Steganography in Transform Domain  
Hemalatha S, U Dinesh Acharya, Renuka A, Priya R. Kamath, Manipal University, India
Design of Mobile Public Key Infrastructure (M-PKI) Using Elliptic Curve Cryptography  
Sangram Ray and G. P. Biswas, Indian School of Mines, India