Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 1 of 706 results
Sort by: relevance publication year

Algebraic method to recover superpolies in cube attacks

JOURNAL ARTICLE published July 2020 in IET Information Security

Research funded by National Natural Science Foundation of China (61672533) | National Natural Science Foundation of China (61521003)

Authors: Chen‐Dong Ye | Tian Tian

JOURNAL ISSUE published July 2015 in IET Information Security

Low-complexity design of bit-parallel dual-basis multiplier over GF(2m)

JOURNAL ARTICLE published 1 December 2012 in IET Information Security

Authors: J.-H. Wang | W.-Y. Liang | H.W. Chang | C.W. Chiou

Differential fault analysis on LED using Super‐Sbox

JOURNAL ARTICLE published July 2015 in IET Information Security

Research funded by National Natural Science Foundation of China (61402515)

Authors: Guangyao Zhao | Ruilin Li | Lei Cheng | Chao Li | Bing Sun

Biometric key distribution solution with energy distribution information of physiological signals for body sensor network security

JOURNAL ARTICLE published June 2013 in IET Information Security

Research funded by National Natural Science Foundation of China (61102087)

Authors: Fen Miao | Shu‐Di Bao | Ye Li

Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption + schemes

JOURNAL ARTICLE published January 2021 in IET Information Security

Authors: Kunwar Singh | C. Pandu Rangan | Samir Sheshank | Richa Agrawal

Kyber, Saber, and SK-MLWR Lattice-Based Key Encapsulation Mechanisms Model Checking with Maude

JOURNAL ARTICLE published 30 October 2023 in IET Information Security

Authors: Duong Dinh Tran | Kazuhiro Ogata | Santiago Escobar | Sedat Akleylek | Ayoub Otmani

Editors: Thomas Haines

An optimal defensive deception framework for the container‐based cloud with deep reinforcement learning

JOURNAL ARTICLE published May 2022 in IET Information Security

Research funded by National Natural Science Foundation of China (62002383,62072467)

Authors: Huanruo Li | Yunfei Guo | Penghao Sun | Yawen Wang | Shumin Huo

Simultaneously generating multiple keys in a four-terminal network

JOURNAL ARTICLE published 1 September 2012 in IET Information Security

Authors: P. Babaheidarian | M.R. Aref | S. Salimi

Impossible differential cryptanalysis of MARS‐like structures

JOURNAL ARTICLE published July 2015 in IET Information Security

Research funded by China Postdoctoral Science Foundation (2013M531174) | National Natural Science Foundation of China (61073149)

Authors: Weijia Xue | Xuejia Lai

COVID‐19 and cybersecurity

JOURNAL ARTICLE published September 2022 in IET Information Security

Authors: Roberto Di Pietro | Ni Trieu | Vincenzo Iovino

JOURNAL ISSUE published January 2016 in IET Information Security

Power of public‐key function‐private functional encryption

JOURNAL ARTICLE published July 2018 in IET Information Security

Authors: Vincenzo Iovino | Qiang Tang | Karol Żebrowski

Link quality‐based cache replacement technique in mobile ad hoc network

JOURNAL ARTICLE published December 2013 in IET Information Security

Authors: Jagadeesan Dhanapal | Srinivasa Krishna Srivatsa

Group key exchange protocols withstanding ephemeral‐key reveals

JOURNAL ARTICLE published January 2018 in IET Information Security

Research funded by Ministerio de Economía y Competitividad (MTM2013‐41426‐R)

Authors: Maria Isabel González Vasco | Angel Luis Pérez del Pozo | Adriana Suárez Corona

New second‐order threshold implementation of AES

JOURNAL ARTICLE published March 2019 in IET Information Security

Research funded by National Natural Science Foundation of China (61572148,61872103,61572146,U1501252,U1711)

Authors: Yongzhuang Wei | Fu Yao | Enes Pasalic | An Wang

Economic feasibility study for stealthy socialbot network establishment

JOURNAL ARTICLE published November 2020 in IET Information Security

Authors: Samaneh Hosseini Moghaddam | Maghsoud Abbaspour

Polynomial differential‐based strong ( n , t , n )‐verifiable secret sharing

JOURNAL ARTICLE published December 2013 in IET Information Security

Authors: Qassim Al Mahmoud

JOURNAL ISSUE published September 2013 in IET Information Security

Oblivious decision program evaluation

JOURNAL ARTICLE published June 2013 in IET Information Security

Research funded by Iran Telecommunication Research Center (500/1042)

Authors: Salman Niksefat | Babak Sadeghiyan | Payman Mohassel