researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: IET Information Security
Home
Index
Info
Issue
Volume
10
, Issue
4
165
--
172
Majid Rahimi
,
Mostafa Barmshory
,
Mohammad Hadi Mansouri
,
Mohammad Reza Aref
.
Dynamic cube attack on Grain-v1
173
--
179
Bin Wang
.
Leakage-resilient message authentication code scheme based on hidden identity weak hash proof system
180
--
187
Sungwook Kim
.
Effective certificate revocation scheme based on weighted voting game approach
188
--
193
Serge Vaudenay
.
Privacy failure in the public-key distance-bounding protocols
194
--
202
Masoumeh Koochak Shooshtari
,
Mahmoud Ahmadian-Attari
,
Thomas Johansson
,
Mohammad Reza Aref
.
Cryptanalysis of McEliece cryptosystem variants based on quasi-cyclic low-density parity check codes
203
--
214
Mehmet Tahir Sandikkaya
,
Tolga Ovatman
,
Ali Emre Harmanci
.
Design and formal verification of a cloud compliant secure logging mechanism
215
--
221
Wentan Yi
,
Shaozhen Chen
.
Multidimensional zero-correlation linear cryptanalysis of the block cipher KASUMI