Journal: IET Information Security

Volume 11, Issue 4

177 -- 187Sedat Akleylek, Vincent Rijmen, Muharrem Tolga Sakalli, Emir Öztürk. Efficient methods to generate cryptographically significant binary diffusion layers
188 -- 194Liran Lerman, Zdenek Martinasek, Olivier Markowitch. Robust profiled attacks: should the adversary trust the dataset?
195 -- 198Binglong Chen, Chuangqiang Hu, Chang-An Zhao. Note on scalar multiplication using division polynomials
199 -- 203Weiguo Zhang, Luyang Li, Enes Pasalic. Construction of resilient S-boxes with higher-dimensional vectorial outputs and strictly almost optimal non-linearity
204 -- 210Liqun Chen, Qin Li, Keith M. Martin, Siaw-Lynn Ng. Private reputation retrieval in public - a privacy-aware announcement scheme for VANETs
211 -- 219YaWei Ren, Feng Liu, Teng Guo, Rongquan Feng, Dongdai Lin. Cheating prevention visual cryptography scheme using Latin square
220 -- 221Goutham Reddy Alavalapati, Eun-Jun Yoon, Kee-Young Yoo. Comment on 'Efficient and secure dynamic ID-based remote user authentication scheme for distributed systems using smart cards'