Journal: IET Information Security

Volume 3, Issue 4

129 -- 138Nasour Bagheri, Matt Henricksen, Lars R. Knudsen, Majid Naderi, B. Sadeghyian. Cryptanalysis of an iterated halving-based hash function: CRUSH
139 -- 147Jung-San Lee, Chi-Shiang Chan, Chin-Chen Chang. Non-iterative privacy preservation for online lotteries
148 -- 151Sherman S. M. Chow, Wun-She Yap. Partial decryption attacks in security-mediated certificateless encryption
152 -- 176Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini. Generic constructions for universal designated-verifier signatures and identitybased signatures from standard signatures