Journal: Comput. J.

Volume 66, Issue 6

1311 -- 0Tomer Ashur, Chris J. Mitchell. Special Issue on Failed Approaches and Insightful Losses in Cryptology - Foreword
1312 -- 1319Tomer Ashur, Mohammad Mahzoun, Dilara Toprakhisar. How Not To Design An Efficient FHE-Friendly Block Cipher: Seljuk
1320 -- 1334Nina Bindel, Sarah McCarthy. The Need for Being Explicit: Failed Attempts to Construct Implicit Certificates from Lattices
1335 -- 1341Chitchanok Chuengsatiansup, Eyal Ronen, Gregory G. Rose, Yuval Yarom. Row, Row, Row Your Boat: How to Not Find Weak Keys in Pilsung
1342 -- 1349Daniel Shumow. Incorrectly Generated RSA Keys: How I Learned To Stop Worrying And Recover Lost Plaintexts
1350 -- 1365Satish Muppidi, Om Prakash P. G, B. Kishore. Dragonfly Political Optimizer Algorithm-Based Rider Deep Long Short-Term Memory for Soil Moisture and Heat Level Prediction in IoT
1366 -- 1375Hieu Minh Truong, Hieu Trung Huynh. A Novel Approach For CT-Based COVID-19 Classification and Lesion Segmentation Based On Deep Learning
1376 -- 1399Shichang Wang, Meicheng Liu, Dongdai Lin, Li Ma. On Grain-Like Small State Stream Ciphers Against Fast Correlation Attacks: Cryptanalysis of Plantlet, Fruit-v2 and Fruit-80
1400 -- 1418Shusen Wu, Xiaoshe Dong, Heng Chen 0002, Longxiang Wang, Qiang Wang, Zhengdong Zhu. Simplified High Level Parallelism Expression on Heterogeneous Systems through Data Partition Pattern Description
1419 -- 1433Yi Chen, Yantian Shen, Hongbo Yu, Sitong Yuan. A New Neural Distinguisher Considering Features Derived From Multiple Ciphertext Pairs
1434 -- 1451Hailong Zhang 0001, Wei Yang. Template Attack Assisted Linear Cryptanalysis on Outer Rounds Protected DES Implementations
1452 -- 1476Hisaki Kobayashi, Yuichi Sudo, Hirotsugu Kakugawa, Toshimitsu Masuzawa. A Self-Stabilizing Distributed Algorithm for the Generalized Dominating Set Problem With Safe Convergence
1477 -- 1506Damian Arellanes, Kung-Kiu Lau, Rizos Sakellariou. Decentralized Data Flows for the Functional Scalability of Service-Oriented IoT Systems
1507 -- 1524Ti Wang, Yongbin Zhou, Hui Ma 0002, Rui Zhang. Flexible and Controllable Access Policy Update for Encrypted Data Sharing in the Cloud
1525 -- 1540Sinam Ajitkumar Singh, Ningthoujam Dinita Devi, Swanirbhar Majumder. An Improved Unsegmented Phonocardiogram Classification Using Nonlinear Time Scattering Features
1541 -- 1548Ahmet Gökçen, Alkim Gokcen, Savas Sahin. Prediction of Li-Ion Battery Discharge Patterns in IoT Devices Under Random Use Via Machine Learning Algorithms
1549 -- 1562Pravin Narayan Kathavate. Role of Machine Learning on Key Extraction for Data Privacy Preservation of Health Care Sectors in IoT Environment
1563 -- 0. Corrigendum to: IoT Data Quality Issues and Potential Solutions: A Literature Review
1564 -- 0. Corrigendum to: A Multi-Objective Randomly Updated Beetle Swarm and Multi-Verse Optimization for Brain Tumor Segmentation and Classification