


default search action
IET Information Security, Volume 2023
Volume 2023, 2023
- Duong Dinh Tran

, Kazuhiro Ogata
, Santiago Escobar
, Sedat Akleylek
, Ayoub Otmani
:
Kyber, Saber, and SK-MLWR Lattice-Based Key Encapsulation Mechanisms Model Checking with Maude. 1-17 - Kai Lin

, Kaiyu Wang
, Jin Shang
, Qindong Sun
:
A Secure Anonymous Identity-Based Virtual-Space Agreement Method for Crowds-Based Anonymous Communicate Scheme. 1-13 - Fu Yao

, Yongzhuang Wei
, Hua Chen
, Enes Pasalic:
Improving the Performance of CPA Attacks for Ciphers Using Parallel Implementation of S-Boxes. 1-17 - Wenjuan Jia

, Jiang Zhang
, Baocang Wang
:
Hardness of Module-LWE with Semiuniform Seeds from Module-NTRU. 1-16 - Jiali Shi

, Guoqiang Liu
, Chao Li
:
SAT-Based Security Evaluation for WARP against Linear Cryptanalysis. 1-14 - Wenjuan Jia

, Baocang Wang
:
Hardness of (Semiuniform) MLWE with Short Distributions Using the Rényi Divergence. 1-15 - Yu Zhang, Shuangrui Zhao, Ji He, Yuanyu Zhang, Yulong Shen, Xiaohong Jiang:

A Survey of Secure Communications for Satellite Internet Based on Cryptography and Physical Layer Security. 1-15 - Keita Emura

:
Generic Construction of Fully Anonymous Broadcast Authenticated Encryption with Keyword Search with Adaptive Corruptions. 1-12 - Xin Miao

, Lu Li
, Chun Guo
, Meiqin Wang
, Weijia Wang
:
Bit-Sliced Implementation of SM4 and New Performance Records. 1-10 - Qiaohan Chu

, Anmin Fu
, Haifeng Qian
, Jie Chen
:
Inner-Product Matchmaking Encryption: Bilateral Access Control and Beyond Equality. 1-17 - Nobuyuki Sugio

:
Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK. 1-12 - Zhaoxuan Bian

, Fuqun Wang
, Renjun Zhang
, Bin Lian, Lidong Han, Kefei Chen:
A Publicly Verifiable Leveled Fully Homomorphic Signcryption Scheme. 1-8 - Yafei Zheng

, Wenling Wu
:
Similarity Property and Slide Attack of Block Cipher FESH. 1-8 - Shenjian Qiu

, Jiaxuan Fei, Jian Wang:
Cross-Space Conduction Assessment Method of Network Attack Risk under the Strong Coupling Characteristics of Electric Power Cyber Physics. 1-13

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














