Journal: IET Information Security

Volume 9, Issue 3

149 -- 157Kwangsu Lee, Dong-Hoon Lee. Adaptively secure broadcast encryption under standard assumptions with better efficiency
158 -- 166Yinxia Sun, Futai Zhang, Limin Shen, Robert H. Deng. Efficient revocable certificateless encryption against decryption key exposure
167 -- 178Dongxia Bai, Hongbo Yu, Gaoli Wang, Xiaoyun Wang. Improved boomerang attacks on round-reduced SM3 and keyed permutation of BLAKE-256
179 -- 184Hadi Soleimany. Self-similarity cryptanalysis of the block cipher ITUbee
185 -- 193Zuhua Shao, Yipeng Gao. Practical verifiably encrypted signature based on Waters signatures
194 -- 201Liaojun Pang, Lu Gao, Huixian Li, YuMin Wang. Anonymous multi-receiver ID-based signcryption scheme