-
41
Preimage attacks on reduced‐round Keccak hash functions by solving algebraic systems
Published 2023-05-01“…IET Information Security…”
Get full text
Article -
42
Exploiting statistical effective fault attack in a blind setting
Published 2023-07-01“…IET Information Security…”
Get full text
Article -
43
Extended supersingular isogeny Diffie–Hellman key exchange protocol: Revenge of the SIDH
Published 2021-09-01“…IET Information Security…”
Get full text
Article -
44
Bit-Sliced Implementation of SM4 and New Performance Records
Published 2023-01-01“…IET Information Security…”
Get full text
Article -
45
New Practical Attacks on GEA-1 Based on a New-Found Weakness
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
46
Beyond full‐bit secure authenticated encryption without input‐length limitation
Published 2022-07-01“…IET Information Security…”
Get full text
Article -
47
Quantum algorithms for attacking hardness assumptions in classical and post‐quantum cryptography
Published 2023-03-01“…IET Information Security…”
Get full text
Article -
48
Indifferentiable hash functions in the standard model
Published 2021-07-01“…IET Information Security…”
Get full text
Article -
49
Analyzing the 2021 Kaseya Ransomware Attack: Combined Spearphishing Through SonicWall SSLVPN Vulnerability
Published 2025-01-01“…IET Information Security…”
Get full text
Article -
50
Extension of simultaneous Diophantine approximation algorithm for partial approximate common divisor variants
Published 2021-11-01“…IET Information Security…”
Get full text
Article -
51
A Novel Differentially Private Online Learning Algorithm for Group Lasso in Big Data
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
52
Private feasible solution determination
Published 2021-01-01“…IET Information Security…”
Get full text
Article -
53
PATS: Let Parties Have a Say in Threshold Group Key Sharing
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
54
Cryptanalysis of FRS obfuscation based on the CLT13 multilinear map
Published 2022-05-01“…IET Information Security…”
Get full text
Article -
55
IMSC: Instruction set architecture monitor and secure cache for protecting processor systems from undocumented instructions
Published 2022-07-01“…IET Information Security…”
Get full text
Article -
56
On Accuracy of Testing Decryption Failure Rate for Encryption Schemes under the LWE Assumption
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
57
Blockchain-Based Piecewise Regressive Kupyna Cryptography for Secure Cloud Services
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
58
A New (Related-Key) Neural Distinguisher Using Two Differences for Differential Cryptanalysis
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
59
Revisit two memoryless state‐recovery cryptanalysis methods on A5/1
Published 2023-07-01“…IET Information Security…”
Get full text
Article -
60
Efficient constructions for large‐state block ciphers based on AES New Instructions
Published 2022-05-01“…IET Information Security…”
Get full text
Article