Journal: IET Information Security

Volume 3, Issue 2

45 -- 52Che Wun Chiou, Chiou-Yng Lee, Jim-Min Lin. k)
53 -- 59Baocang Wang, Yupu Hu. Signature scheme based on the root extraction problem over braid groups
60 -- 65Haining Fan, Masud Anwarul Hasan. n) multiplications
66 -- 73Hadi Ahmadi, Taraneh Eghlidos. Heuristic guess-and-determine attacks on stream ciphers