Journal: IET Information Security

Volume 2, Issue 2

19 -- 27Nigel P. Smart, Elisabeth Oswald, Daniel Page. Randomised representations
28 -- 32Behnam Bahrak, Mohammad Reza Aref. Impossible differential attack on seven-round AES-128
35 -- 46Chin-Chen Chang, Chia-Chen Lin, Yi-Hui Chen. Reversible data-embedding scheme using differences between original and predicted pixel values
47 -- 63Mihir Bellare, Sarah Shoup. Two-tier signatures from the Fiat-Shamir transform, with applications to strongly unforgeable and one-time signatures