Journal: IET Information Security

Volume 16, Issue 4

235 -- 252Uddipana Dowerah, Srinivasan Krishnaswamy. Towards an efficient LWE-based fully homomorphic encryption scheme
253 -- 261Akiko Inoue. Beyond full-bit secure authenticated encryption without input-length limitation
262 -- 281Chun Guo, Tetsu Iwata, Kazuhiko Minematsu. New indifferentiability security proof of MDPH hash function
282 -- 300Jinyu Lu, Yunwen Liu, Tomer Ashur, Bing Sun 0001, Chao Li 0002. Improved rotational-XOR cryptanalysis of Simon-like block ciphers
301 -- 313Dawen Xu 0001. Reversible data hiding in encrypted images with high payload
314 -- 319Yuze Wang, Peng Liu 0016, Yingtao Jiang. IMSC: Instruction set architecture monitor and secure cache for protecting processor systems from undocumented instructions