Journal: IET Information Security

Volume 1, Issue 2

47 -- 52Martin Hell, Thoinas Johansson. Cryptanalysis of Achterbahn-128/80
53 -- 57Liam Keliher, Jiayuan Sui. Exact maximum expected differential and linear probability for two-round Advanced Encryption Standard
59 -- 64David Naccache. Secure and practical identity-based encryption
65 -- 81Xinxin Fan, Thomas J. Wollinger, Guang Gong. Efficient explicit formulae for genus 3 hyperelliptic curve cryptosystems over binary fields
83 -- 90Marcel Fernandez, Miguel Soriano, Josep Cotrina. Tracing illegal redistribution using errors-anderasures and side information decoding algorithms
91 -- 95ShaoWei Weng, Youping Zhao, Jeng-Shyang Pan. Reversible watermarking resistant to cropping attack