Journal: IET Information Security

Volume 14, Issue 3

253 -- 0. Guest Editorial: Selected Papers from 17th International Conference on Cryptology and Network Security (CANS)
254 -- 265Kimmo Järvinen 0001, Ágnes Kiss, Thomas Schneider 0003, Oleksandr Tkachenko, Zheng Yang 0001. Faster privacy-preserving location proximity schemes for circles and polygons
266 -- 285Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig. Fully invisible protean signatures schemes
286 -- 303Huy Quoc Le, Pradeep Kumar Mishra, Satoshi Nakamura, Koha Kinjo, Dung Hoang Duong, Masaya Yasuda. Impact of the modulus switching technique on some attacks against learning problems
304 -- 312Paolo Santini, Marco Baldi, Franco Chiaraluce. Complexity of statistical attacks on QC-LDPC code-based cryptosystems
313 -- 320Zhen Liu, Yanbin Pan, Tianyuan Xie. Breaking the hardness assumption and IND-CPA security of HQC submitted to NIST PQC project
321 -- 331Ji Li 0004, Jianghong Wei, Mao Ye 0004, Wenfen Liu, Xuexian Hu. Privacy-preserving constrained spectral clustering algorithm for large-scale data sets
332 -- 341Fariba Khazaei Koohpar, Afsaneh Fatemi, Fatemeh Raji. Data availability improvement in peer-to-peer online social networks
342 -- 351Xuyang Wang, Aiqun Hu, Hao Fang. Improved collusion-resistant unidirectional proxy re-encryption scheme from lattice
352 -- 364Mahmoud Ghorbanzadeh, Hamid Reza Shahriari. ANOVUL: Detection of logic vulnerabilities in annotated programs via data and control flow analysis
365 -- 366Michel Abdalla, Fabrice Benhamouda, David Pointcheval. Corrigendum: Public-key encryption indistinguishable under plaintext-checkable attacks