Journal: IET Information Security

Volume 10, Issue 4

165 -- 172Majid Rahimi, Mostafa Barmshory, Mohammad Hadi Mansouri, Mohammad Reza Aref. Dynamic cube attack on Grain-v1
173 -- 179Bin Wang. Leakage-resilient message authentication code scheme based on hidden identity weak hash proof system
180 -- 187Sungwook Kim. Effective certificate revocation scheme based on weighted voting game approach
188 -- 193Serge Vaudenay. Privacy failure in the public-key distance-bounding protocols
194 -- 202Masoumeh Koochak Shooshtari, Mahmoud Ahmadian-Attari, Thomas Johansson, Mohammad Reza Aref. Cryptanalysis of McEliece cryptosystem variants based on quasi-cyclic low-density parity check codes
203 -- 214Mehmet Tahir Sandikkaya, Tolga Ovatman, Ali Emre Harmanci. Design and formal verification of a cloud compliant secure logging mechanism
215 -- 221Wentan Yi, Shaozhen Chen. Multidimensional zero-correlation linear cryptanalysis of the block cipher KASUMI