Journal: IET Information Security

Volume 11, Issue 2

55 -- 65Xiangling Ding, Yingzhuo Deng, Gaobo Yang, Yun Song, Dajiang He, Xingming Sun. Design of new scan orders for perceptual encryption of H.264/AVC videos
66 -- 77Bahram Rashidi, Reza Rezaeian Farashahi, Sayed Masoud Sayedi. m )
78 -- 81Thomas W. Cusick. Highly nonlinear plateaued functions
82 -- 88Xiaomin Zhao, Jiabin Zhu, Xueli Liang, Shuangshuang Jiang, Qingzhang Chen. Lightweight and integrity-protecting oriented data aggregation scheme for wireless sensor networks
89 -- 96Ting Cui, Chenhui Jin, Bin Zhang, Zhuo Chen, Guoshuang Zhang. Searching all truncated impossible differentials in SPN
97 -- 103Rongjia Li, Chenhui Jin. Improved meet-in-the-middle attacks on Crypton and mCrypton
104 -- 113Zouheir Trabelsi, Safaa Zeidan, Mohammad M. Masud. Hybrid mechanism towards network packet early acceptance and rejection for unified threat management
114 -- 120Md. Mokammel Haque, Josef Pieprzyk. Analysing recursive preprocessing of BKZ lattice reduction algorithm