Journal: IET Information Security

Volume 13, Issue 2

87 -- 95Wenying Zhang, Vincent Rijmen. Division cryptanalysis of block ciphers with a binary diffusion layer
96 -- 103Sadhana Jha, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya. Security analysis of ABAC under an administrative model
104 -- 108Huawang Qin, Raylin Tso, Yuewei Dai. Quantum secret sharing by using Fourier transform on orbital angular momentum
109 -- 116Weijie Han, Jingfeng Xue, Hui Yan. Detecting anomalous traffic in the controlled network based on cross entropy and support vector machine
117 -- 124Yongzhuang Wei, Fu Yao, Enes Pasalic, an Wang. New second-order threshold implementation of AES
125 -- 132Yafei Zheng, Wenling Wu. On the extension and security of key schedule of GOST
133 -- 140Aniket Bhadane, Sunil B. Mane. Detecting lateral spear phishing attacks in organisations
141 -- 148Jun-Zhi Li, Jie Guan. Advanced conditional differential attack on Grain-like stream cipher and application on Grain v1
149 -- 156Rongrong Xi, Xiaochun Yun, Zhiyu Hao. Framework for risk assessment in cyber situational awareness
157 -- 166Qiang Zhang, Jianzhong Qiao, Qingyang Meng. Build a trusted storage system on a mobile phone