Facet browsing currently unavailable
Page 1 of 706 results
Sort by: relevance publication year
Algebraic method to recover superpolies in cube attacks JOURNAL ARTICLE published July 2020 in IET Information Security Research funded by National Natural Science Foundation of China (61672533) | National Natural Science Foundation of China (61521003) |
JOURNAL ISSUE published July 2015 in IET Information Security |
Low-complexity design of bit-parallel dual-basis multiplier over GF(2m) JOURNAL ARTICLE published 1 December 2012 in IET Information Security |
Differential fault analysis on LED using Super‐Sbox JOURNAL ARTICLE published July 2015 in IET Information Security Research funded by National Natural Science Foundation of China (61402515) |
Biometric key distribution solution with energy distribution information of physiological signals for body sensor network security JOURNAL ARTICLE published June 2013 in IET Information Security Research funded by National Natural Science Foundation of China (61102087) |
Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption + schemes JOURNAL ARTICLE published January 2021 in IET Information Security |
Kyber, Saber, and SK-MLWR Lattice-Based Key Encapsulation Mechanisms Model Checking with Maude JOURNAL ARTICLE published 30 October 2023 in IET Information Security |
An optimal defensive deception framework for the container‐based cloud with deep reinforcement learning JOURNAL ARTICLE published May 2022 in IET Information Security Research funded by National Natural Science Foundation of China (62002383,62072467) |
Simultaneously generating multiple keys in a four-terminal network JOURNAL ARTICLE published 1 September 2012 in IET Information Security |
Impossible differential cryptanalysis of MARS‐like structures JOURNAL ARTICLE published July 2015 in IET Information Security Research funded by China Postdoctoral Science Foundation (2013M531174) | National Natural Science Foundation of China (61073149) |
COVID‐19 and cybersecurity JOURNAL ARTICLE published September 2022 in IET Information Security |
JOURNAL ISSUE published January 2016 in IET Information Security |
Power of public‐key function‐private functional encryption JOURNAL ARTICLE published July 2018 in IET Information Security |
Link quality‐based cache replacement technique in mobile ad hoc network JOURNAL ARTICLE published December 2013 in IET Information Security |
Group key exchange protocols withstanding ephemeral‐key reveals JOURNAL ARTICLE published January 2018 in IET Information Security Research funded by Ministerio de Economía y Competitividad (MTM2013‐41426‐R) |
New second‐order threshold implementation of AES JOURNAL ARTICLE published March 2019 in IET Information Security Research funded by National Natural Science Foundation of China (61572148,61872103,61572146,U1501252,U1711) |
Economic feasibility study for stealthy socialbot network establishment JOURNAL ARTICLE published November 2020 in IET Information Security |
Polynomial differential‐based strong ( n , t , n )‐verifiable secret sharing JOURNAL ARTICLE published December 2013 in IET Information Security |
JOURNAL ISSUE published September 2013 in IET Information Security |
Oblivious decision program evaluation JOURNAL ARTICLE published June 2013 in IET Information Security Research funded by Iran Telecommunication Research Center (500/1042) |