researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: IET Information Security
Home
Index
Info
Issue
Volume
16
, Issue
4
235
--
252
Uddipana Dowerah
,
Srinivasan Krishnaswamy
.
Towards an efficient LWE-based fully homomorphic encryption scheme
253
--
261
Akiko Inoue
.
Beyond full-bit secure authenticated encryption without input-length limitation
262
--
281
Chun Guo
,
Tetsu Iwata
,
Kazuhiko Minematsu
.
New indifferentiability security proof of MDPH hash function
282
--
300
Jinyu Lu
,
Yunwen Liu
,
Tomer Ashur
,
Bing Sun 0001
,
Chao Li 0002
.
Improved rotational-XOR cryptanalysis of Simon-like block ciphers
301
--
313
Dawen Xu 0001
.
Reversible data hiding in encrypted images with high payload
314
--
319
Yuze Wang
,
Peng Liu 0016
,
Yingtao Jiang
.
IMSC: Instruction set architecture monitor and secure cache for protecting processor systems from undocumented instructions