-
41
Extended supersingular isogeny Diffie–Hellman key exchange protocol: Revenge of the SIDH
Published 2021-09-01“…IET Information Security…”
Get full text
Article -
42
Bit-Sliced Implementation of SM4 and New Performance Records
Published 2023-01-01“…IET Information Security…”
Get full text
Article -
43
New Practical Attacks on GEA-1 Based on a New-Found Weakness
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
44
Beyond full‐bit secure authenticated encryption without input‐length limitation
Published 2022-07-01“…IET Information Security…”
Get full text
Article -
45
Quantum algorithms for attacking hardness assumptions in classical and post‐quantum cryptography
Published 2023-03-01“…IET Information Security…”
Get full text
Article -
46
Indifferentiable hash functions in the standard model
Published 2021-07-01“…IET Information Security…”
Get full text
Article -
47
Analyzing the 2021 Kaseya Ransomware Attack: Combined Spearphishing Through SonicWall SSLVPN Vulnerability
Published 2025-01-01“…IET Information Security…”
Get full text
Article -
48
Extension of simultaneous Diophantine approximation algorithm for partial approximate common divisor variants
Published 2021-11-01“…IET Information Security…”
Get full text
Article -
49
A Novel Differentially Private Online Learning Algorithm for Group Lasso in Big Data
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
50
Private feasible solution determination
Published 2021-01-01“…IET Information Security…”
Get full text
Article -
51
PATS: Let Parties Have a Say in Threshold Group Key Sharing
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
52
Cryptanalysis of FRS obfuscation based on the CLT13 multilinear map
Published 2022-05-01“…IET Information Security…”
Get full text
Article -
53
IMSC: Instruction set architecture monitor and secure cache for protecting processor systems from undocumented instructions
Published 2022-07-01“…IET Information Security…”
Get full text
Article -
54
On Accuracy of Testing Decryption Failure Rate for Encryption Schemes under the LWE Assumption
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
55
Blockchain-Based Piecewise Regressive Kupyna Cryptography for Secure Cloud Services
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
56
A New (Related-Key) Neural Distinguisher Using Two Differences for Differential Cryptanalysis
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
57
Revisit two memoryless state‐recovery cryptanalysis methods on A5/1
Published 2023-07-01“…IET Information Security…”
Get full text
Article -
58
Efficient constructions for large‐state block ciphers based on AES New Instructions
Published 2022-05-01“…IET Information Security…”
Get full text
Article -
59
Stacking ensemble learning with heterogeneous models and selected feature subset for prediction of service trust in internet of medical things
Published 2023-03-01“…IET Information Security…”
Get full text
Article -
60
A Survey of Secure Communications for Satellite Internet Based on Cryptography and Physical Layer Security
Published 2023-01-01“…IET Information Security…”
Get full text
Article