-
161
Bit-Sliced Implementation of SM4 and New Performance Records
Published 2023-01-01“…IET Information Security…”
Get full text
Article -
162
New Practical Attacks on GEA-1 Based on a New-Found Weakness
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
163
Beyond full‐bit secure authenticated encryption without input‐length limitation
Published 2022-07-01“…IET Information Security…”
Get full text
Article -
164
Quantum algorithms for attacking hardness assumptions in classical and post‐quantum cryptography
Published 2023-03-01“…IET Information Security…”
Get full text
Article -
165
Indifferentiable hash functions in the standard model
Published 2021-07-01“…IET Information Security…”
Get full text
Article -
166
Analyzing the 2021 Kaseya Ransomware Attack: Combined Spearphishing Through SonicWall SSLVPN Vulnerability
Published 2025-01-01“…IET Information Security…”
Get full text
Article -
167
Extension of simultaneous Diophantine approximation algorithm for partial approximate common divisor variants
Published 2021-11-01“…IET Information Security…”
Get full text
Article -
168
A Novel Differentially Private Online Learning Algorithm for Group Lasso in Big Data
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
169
Private feasible solution determination
Published 2021-01-01“…IET Information Security…”
Get full text
Article -
170
PATS: Let Parties Have a Say in Threshold Group Key Sharing
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
171
Cryptanalysis of FRS obfuscation based on the CLT13 multilinear map
Published 2022-05-01“…IET Information Security…”
Get full text
Article -
172
Mitigating errors in analog quantum simulation by Hamiltonian reshaping or Hamiltonian rescaling
Published 2025-01-01“…npj Quantum Information…”
Get full text
Article -
173
IMSC: Instruction set architecture monitor and secure cache for protecting processor systems from undocumented instructions
Published 2022-07-01“…IET Information Security…”
Get full text
Article -
174
On Accuracy of Testing Decryption Failure Rate for Encryption Schemes under the LWE Assumption
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
175
Blockchain-Based Piecewise Regressive Kupyna Cryptography for Secure Cloud Services
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
176
A New (Related-Key) Neural Distinguisher Using Two Differences for Differential Cryptanalysis
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
177
Revisit two memoryless state‐recovery cryptanalysis methods on A5/1
Published 2023-07-01“…IET Information Security…”
Get full text
Article -
178
Smart City Evolution: Integrating Technology and Governance for Sustainability in Benguerir
Published 2025-01-01“…Journal of Information Sciences…”
Get full text
Article -
179
Efficient constructions for large‐state block ciphers based on AES New Instructions
Published 2022-05-01“…IET Information Security…”
Get full text
Article -
180
Stacking ensemble learning with heterogeneous models and selected feature subset for prediction of service trust in internet of medical things
Published 2023-03-01“…IET Information Security…”
Get full text
Article