-
221
An optimisation for a two‐round good‐case latency protocol
Published 2023-07-01“…IET Information Security…”
Get full text
Article -
222
A Second Preimage Attack on the XOR Hash Combiner
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
223
Guest Editorial: Guest Editorial on Cryptanalysis of (NIST PQC) post‐quantum proposals
Published 2023-03-01“…IET Information Security…”
Get full text
Article -
224
MFEMDroid: A Novel Malware Detection Framework Using Combined Multitype Features and Ensemble Modeling
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
225
Pairing Optimizations for Isogeny-Based Cryptosystems
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
226
Lattice‐based unidirectional Proxy Re‐Encryption and Proxy Re‐Encryption+ schemes
Published 2021-01-01“…IET Information Security…”
Get full text
Article -
227
Efficient Intrusion Detection System Data Preprocessing Using Deep Sparse Autoencoder with Differential Evolution
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
228
Cyber–Physical–Social Security of High-DER-Penetrated Smart Grids: Threats, Countermeasures, and Challenges
Published 2025-01-01“…IET Information Security…”
Get full text
Article -
229
Preimage attacks on reduced‐round Keccak hash functions by solving algebraic systems
Published 2023-05-01“…IET Information Security…”
Get full text
Article -
230
Exploiting statistical effective fault attack in a blind setting
Published 2023-07-01“…IET Information Security…”
Get full text
Article -
231
Extended supersingular isogeny Diffie–Hellman key exchange protocol: Revenge of the SIDH
Published 2021-09-01“…IET Information Security…”
Get full text
Article -
232
Bit-Sliced Implementation of SM4 and New Performance Records
Published 2023-01-01“…IET Information Security…”
Get full text
Article -
233
New Practical Attacks on GEA-1 Based on a New-Found Weakness
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
234
Beyond full‐bit secure authenticated encryption without input‐length limitation
Published 2022-07-01“…IET Information Security…”
Get full text
Article -
235
Quantum algorithms for attacking hardness assumptions in classical and post‐quantum cryptography
Published 2023-03-01“…IET Information Security…”
Get full text
Article -
236
Indifferentiable hash functions in the standard model
Published 2021-07-01“…IET Information Security…”
Get full text
Article -
237
Analyzing the 2021 Kaseya Ransomware Attack: Combined Spearphishing Through SonicWall SSLVPN Vulnerability
Published 2025-01-01“…IET Information Security…”
Get full text
Article -
238
Extension of simultaneous Diophantine approximation algorithm for partial approximate common divisor variants
Published 2021-11-01“…IET Information Security…”
Get full text
Article -
239
A Novel Differentially Private Online Learning Algorithm for Group Lasso in Big Data
Published 2024-01-01“…IET Information Security…”
Get full text
Article -
240
Private feasible solution determination
Published 2021-01-01“…IET Information Security…”
Get full text
Article