researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: IET Information Security
Home
Index
Info
Issue
Volume
3
, Issue
4
129
--
138
Nasour Bagheri
,
Matt Henricksen
,
Lars R. Knudsen
,
Majid Naderi
,
B. Sadeghyian
.
Cryptanalysis of an iterated halving-based hash function: CRUSH
139
--
147
Jung-San Lee
,
Chi-Shiang Chan
,
Chin-Chen Chang
.
Non-iterative privacy preservation for online lotteries
148
--
151
Sherman S. M. Chow
,
Wun-She Yap
.
Partial decryption attacks in security-mediated certificateless encryption
152
--
176
Siamak Fayyaz Shahandashti
,
Reihaneh Safavi-Naini
.
Generic constructions for universal designated-verifier signatures and identitybased signatures from standard signatures