Showing 221 - 240 results of 529 for search '"information security"', query time: 0.10s Refine Results
  1. 221
  2. 222

    A Second Preimage Attack on the XOR Hash Combiner by Shiwei Chen, Ting Cui, Chenhui Jin, Congjun Wang

    Published 2024-01-01
    “…IET Information Security…”
    Get full text
    Article
  3. 223
  4. 224
  5. 225

    Pairing Optimizations for Isogeny-Based Cryptosystems by Shiping Cai, Kaizhan Lin, Chang-An Zhao

    Published 2024-01-01
    “…IET Information Security…”
    Get full text
    Article
  6. 226
  7. 227
  8. 228
  9. 229
  10. 230
  11. 231
  12. 232
  13. 233
  14. 234
  15. 235
  16. 236

    Indifferentiable hash functions in the standard model by Juha Partala

    Published 2021-07-01
    “…IET Information Security…”
    Get full text
    Article
  17. 237
  18. 238
  19. 239
  20. 240

    Private feasible solution determination by Xue Ge, Jiawei Dou, Wenli Wang, Yingnan Wang

    Published 2021-01-01
    “…IET Information Security…”
    Get full text
    Article