Journal: IET Information Security

Volume 13, Issue 5

411 -- 419Lin Jiao, Yonglin Hao, Yongqiang Li. Improved guess-and-determine attack on TRIVIUM
420 -- 425Jin-Yuan Wang, Sheng-Hong Lin, Wei Cai, Jianxin Dai. ESR analysis over ST-MRC multi-input multi-output Nakagami fading channels
426 -- 434Yanwei Zhou, Bo Yang 0003, Yi Mu 0001, Tao Wang 0039, Xin Wang 0058. Identity-based encryption resilient to continuous key leakage
435 -- 447Matej Zuzcak, Petr Bujok. Causal analysis of attacks against honeypots based on properties of countries
448 -- 458Hossein Arabnezhad Khanooki, Babak Sadeghiyan, Josef Pieprzyk. S-boxes representation and efficiency of algebraic attack
459 -- 468Parvin Rastegari, Mohammad Dakhilalian, Mehdi Berenjkoub, Willy Susilo. Multi-designated verifiers signature schemes with threshold verifiability: generic pattern and a concrete scheme in the standard model
469 -- 478Hailun Yan, Xuejia Lai, Lei Wang 0031, Yu Yu 0001, Yiran Xing. New zero-sum distinguishers on full 24-round Keccak-f using the division property
479 -- 485Lingchen Li, Wenling Wu, Lei Zhang 0012, Yafei Zheng. New method to describe the differential distribution table for large S-boxes in MILP and its application
486 -- 495Morteza Noferesti, Rasool Jalili. Inline high-bandwidth network analysis using a robust stream clustering algorithm
498 -- 507David Nuñez 0001, Isaac Agudo, Javier López 0001. Escrowed decryption protocols for lawful interception of encrypted data
508 -- 514Bagher Bagherpour, Ali Zaghian, Mahdi Sajadieh. Sigma protocol for faster proof of simultaneous homomorphism relations
515 -- 518Tianfeng Sun, Bin Hu, Yang Yang. Research on highly non-linear plateaued functions