Journal: IET Information Security

Volume 7, Issue 3

165 -- 171Sedat Akleylek, Murat Cenk, Ferruh Ă–zbudak. On the generalisation of special moduli for faster interleaved montgomery modular multiplication
172 -- 180Jung-San Lee, Wei-Chiang Kao, Bo Li. Aryabhata remainder theorem-based non-iterative electronic lottery mechanism with robustness
181 -- 188Youjiao Zou, Wenping Ma, Zhanjun Ran, Shangping Wang. Newmultivariate hash function quadratic polynomials multiplying linear polynomials
189 -- 194Hung-Wen Yang, Chou Chen Yang, Woei Lin. Enhanced digital rights management authentication scheme based on smart card
195 -- 202Yoon Ho Choi, Seung-Woo Seo. BLAST: B-LAyered bad-character SHIFT tables for high-speed pattern matching
203 -- 211Muthumanickam Gunasekaran, Kandhasamy Premalatha. TEAP: trust-enhanced anonymous on-demand routing protocol for mobile ad hoc networks
212 -- 220Marco Baldi, Marco Bianchi 0002, Franco Chiaraluce. Security and complexity of the McEliece cryptosystem based on quasi-cyclic low-density parity-check codes
221 -- 229Dimitrios S. Karas, George K. Karagiannidis, Robert Schober. Channel level crossing-based security for communications over fading channels
230 -- 238Ali Vardasbi, Mahmoud Salmasizadeh, Javad Mohajeri. Superpoly algebraic normal form monomial test on Trivium
239 -- 246Tsu-Yang Wu, Yuh-Min Tseng. Publicly verifiable multi-secret sharing scheme from bilinear pairings
247 -- 252Hsiu-Lien Yeh, Tien-Ho Chen, Kuei-Jung Hu, Wei Kuan Shih. Robust elliptic curve cryptography-based three factor user authentication providing privacy of biometric data
253 -- 263Yu-Chi Chen, Gwoboa Horng, Chao-Liang Liu. Strong non-repudiation based on certificateless short signatures