Journal: IET Information Security

Volume 15, Issue 4

267 -- 281Ye Yuan 0005, Kazuhide Fukushima, Junting Xiao, Shinsaku Kiyomoto, Tsuyoshi Takagi. Memory-constrained implementation of lattice-based encryption scheme on standard Java Card platform
282 -- 296Ferucio Laurentiu Tiplea, Constantin Catalin Dragan. Asymptotically ideal Chinese remainder theorem -based secret sharing schemes for multilevel and compartmented access structures
297 -- 308Amin Sarihi, Ahmad Patooghy, Mahdi Amininasab, Mohammad Shokrolah-Shirazi, Abdel-Hameed A. Badawy. Joint security and performance improvement in multilevel shared caches
309 -- 316Juha Partala. Indifferentiable hash functions in the standard model
317 -- 332Meenakshi Kansal, Ratna Dutta, Sourav Mukhopadhyay. Lattice-based nominative signature using pseudorandom function