Journal: IET Information Security

Volume 10, Issue 6

287 -- 0Jonathan Katz. Guest Editorial
288 -- 303Michel Abdalla, Fabrice Benhamouda, David Pointcheval. Public-key encryption indistinguishable under plaintext-checkable attacks
304 -- 318Felix Heuer, Tibor Jager, Sven Schäge, Eike Kiltz. Selective opening security of practical public-key encryption schemes
319 -- 331David Bernhard, Marc Fischlin, Bogdan Warinschi. Adaptive proofs of knowledge in the random oracle model
332 -- 347Sébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré. Divisible e-cash made practical
348 -- 357Emmanuela Orsini, Joop van de Pol, Nigel P. Smart. q
358 -- 371Gilles Barthe, Edvard Fagerholm, Dario Fiore, Andre Scedrov, Benedikt Schmidt, Mehdi Tibouchi. Strongly-optimal structure preserving signatures from Type II pairings: synthesis and lower bounds
372 -- 385Nico Döttling. Low Noise LPN: Key dependent message secure public key encryption an sample amplification
386 -- 402Qutaiba Ibrahim Ali. Securing solar energy-harvesting road-side unit using an embedded cooperative-hybrid intrusion detection system
403 -- 412Shifeng Sun, Shuai Han, Dawu Gu, Shengli Liu. Public key cryptosystems secure against memory leakage attacks
413 -- 417Degang Sun, Jun Shi, Dong Wei, Meng Zhang, Wei-qing Huang. Method for detecting text information leakage in electromagnetic radiation from a computer display
418 -- 424Liang Deng, Qingkai Zeng. Exception-oriented programming: retrofitting code-reuse attacks to construct kernel malware
425 -- 432Ya Liu, Anren Yang, Zhiqiang Liu, Wei Li, Qingju Wang, Liang Song, Dawu Gu. -1 functions
433 -- 441Yang Liu, Xiaojun Tong. Hyperchaotic system-based pseudorandom number generator
442 -- 450Yanqing Yao, Zhoujun Li. Security of weak secrets based cryptographic primitives via the Rényi entropy