default search action
IET Information Security, Volume 16
Volume 16, Number 1, January 2022
- Quan Yuan, Mehdi Tibouchi, Masayuki Abe:
Security notions for stateful signature schemes. 1-17 - Rusi Wang, Hua Guo, Jiqiang Lu, Jianwei Liu:
Cryptanalysis of a white-box SM4 implementation based on collision attack. 18-27 - Xiaoli Dong, Yongzhuang Wei:
New attacks against reduced Rijndael-160. 28-40 - Huiwen Jia, Yupu Hu, Chunming Tang:
Lattice-based hash-and-sign signatures using approximate trapdoor, revisited. 41-50 - Shuai Liu, Jie Guan, Bin Hu:
Fault attacks on authenticated encryption modes for GIFT. 51-63 - José Antonio Gómez-Hernández, Raúl Sánchez-Fernández, Pedro García-Teodoro:
Inhibiting crypto-ransomware on windows platforms through a honeyfile-based approach with R-Locker. 64-74
Volume 16, Number 2, March 2022
- Rentaro Shiba, Kosei Sakamoto, Fukang Liu, Kazuhiko Minematsu, Takanori Isobe:
Integral and impossible-differential attacks on the reduced-round Lesamnta-LW-BC. 75-85 - Liang Liu, Yue Yin, Zhijun Wu, Qingbo Pan, Meng Yue:
LDoS attack detection method based on traffic classification prediction. 86-96 - Jiawei Nian, Ping Wang, Haichang Gao, Xiaoyan Guo:
A deep learning-based attack on text CAPTCHAs by using object detection techniques. 97-110 - Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen:
Quantum-resistant anonymous identity-based encryption with trable identities. 111-126
- Maria Chiara Molteni, Jürgen Pulkus, Vittorio Zaccaria:
On robust strong-non-interferent low-latency multiplications. 127-132
- Jiongyi Chen, Fenghao Xu, Shuaike Dong, Wei Sun, Kehuan Zhang:
Authorisation inconsistency in IoT third-party integration. 133-143
Volume 16, Number 3, May 2022
- Rentaro Shiba, Kosei Sakamoto, Takanori Isobe:
Efficient constructions for large-state block ciphers based on AES New Instructions. 145-160 - Mo Shaohui, Gulanbaier Tuerhong, Mairidan Wushouer, Tuergen Yibulayin:
PCA mix-based Hotelling's T2 multivariate control charts for intrusion detection system. 161-177 - Huanruo Li, Yunfei Guo, Penghao Sun, Yawen Wang, Shumin Huo:
An optimal defensive deception framework for the container-based cloud with deep reinforcement learning. 178-192 - Yibing Liu, Lijun Huo, Gang Zhou:
TR-AKA: A two-phased, registered authentication and key agreement protocol for 5G mobile networks. 193-207 - Jiseung Kim, Changmin Lee:
Cryptanalysis of FRS obfuscation based on the CLT13 multilinear map. 208-219 - Zhengbin Liu, Yongqiang Li, Lin Jiao, Mingsheng Wang:
On the upper bound of squared correlation of SIMON-like functions and its applications. 220-234
Volume 16, Number 4, July 2022
- Uddipana Dowerah, Srinivasan Krishnaswamy:
Towards an efficient LWE-based fully homomorphic encryption scheme. 235-252 - Akiko Inoue:
Beyond full-bit secure authenticated encryption without input-length limitation. 253-261 - Chun Guo, Tetsu Iwata, Kazuhiko Minematsu:
New indifferentiability security proof of MDPH hash function. 262-281 - Jinyu Lu, Yunwen Liu, Tomer Ashur, Bing Sun, Chao Li:
Improved rotational-XOR cryptanalysis of Simon-like block ciphers. 282-300 - Dawen Xu:
Reversible data hiding in encrypted images with high payload. 301-313
- Yuze Wang, Peng Liu, Yingtao Jiang:
IMSC: Instruction set architecture monitor and secure cache for protecting processor systems from undocumented instructions. 314-319
Volume 16, Number 5, September 2022
- Roberto Di Pietro, Ni Trieu, Vincenzo Iovino:
COVID-19 and cybersecurity. 321-323 - Ali F. Al-Qahtani, Stefano Cresci:
The COVID-19 scamdemic: A survey of phishing attacks and their countermeasures during COVID-19. 324-345 - Jiahui Gao, Chetan Surana, Ni Trieu:
Secure contact tracing platform from simplest private set intersection cardinality. 346-361 - Muhammad Arif, Shermin Shamsudheen, F. Ajesh, Guojun Wang, Jianer Chen:
AI bot to detect fake COVID-19 vaccine certificate. 362-372 - Lisha Shuai, Jiamin Zhang, Yu Cao, Min Zhang, Xiaolong Yang:
R-DP: A risk-adaptive privacy protection scheme for mobile crowdsensing in industrial internet of things. 373-389 - Xuan Shen, Guoqiang Liu, Xiaofeng Wang, Bing Sun, Jun He:
Security evaluation on type-1 and type-1-like 4-branch generalized Feistel structures and application to reduced-round Lesamnta-LW-BC. 390-400
Volume 16, Number 6, November 2022
- Ke Huang, Xiaosong Zhang, Yi Mu, Fatemeh Rezaeibagha, Xiaoming Huang, Yongcheng Gong:
Blockchain-based deduplication with arbitration and incentives. 401-416 - Linlin Xue, Yue Wang, Zhongpeng Wang:
Secure image block compressive sensing using complex Hadamard measurement matrix and bit-level XOR. 417-431 - Yongqiang Yu, Xuehu Yan, Longlong Li, Jiayu Wang:
Renewal of secret and shadows in secret image sharing. 432-441 - Zhangguo Tang, Junfeng Wang, Baoguo Yuan, Huanzhou Li, Jian Zhang, Han Wang:
Markov-GAN: Markov image enhancement method for malicious encrypted traffic classification. 442-458 - Makoto Habu, Kazuhiko Minematsu, Tetsu Iwata:
Matching attacks on Romulus-M. 459-469 - Adrián Ranea, Vincent Rijmen:
Characteristic automated search of cryptographic algorithms for distinguishing attacks (CASCADA). 470-481
- Erratum: Quantum-resistant anonymous identity-based encryption with traceable identities. 482
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.