Journal: IET Information Security

Volume 12, Issue 6

463 -- 474Frédéric Lafitte. CryptoSAT: a tool for SAT-based cryptanalysis
475 -- 483Mingxing Hu, Qing Ye, Yongli Tang. Efficient batch identity-based fully homomorphic encryption scheme in the standard model
484 -- 497Lin Jiao, Yongqiang Li, Yonglin Hao. Guess-and-determine attacks on PANAMA-like stream ciphers
498 -- 501Jiayang Liu, Jingguo Bi. Equivalent key attack against a public-key cryptosystem based on subset sum problem
502 -- 512Khundrakpam Johnson Singh, Thongam Khelchandra, Tanmay De. Detection and differentiation of application layer DDoS attack from flash events using fuzzy-GA computation
513 -- 520Zhihui Chu, Huaifeng Chen, Xiaoyun Wang, Lu Li 0006, Xiaoyang Dong, Yaoling Ding, Yonglin Hao. Improved integral attacks without full codebook
521 -- 526Amor Gueddana, Vasudevan Lakshminarayanan. Physical feasibility of QKD based on probabilistic quantum circuits
527 -- 533Jian Zou, Le Dong, Wenling Wu. New algorithms for the unbalanced generalised birthday problem
534 -- 542Guangliang Xu, Wei Yang 0011, Liusheng Huang. Supervised learning framework for covert channel detection in LTE-A
543 -- 550Mohammad Taherifard, Ahmad Patooghy, Mahdi Fazeli. Vulnerability modelling of crypto-chips against scan-based attacks
551 -- 557Md. Mokammel Haque, Josef Pieprzyk. Preprocessing optimisation: revisiting recursive-BKZ lattice reduction algorithm
558 -- 565Mina Sadat Khazaei, Hossein Homaei, Hamid Reza Shahriari. OPEXA: analyser assistant for detecting over-privileged extensions