Journal: IET Information Security

Volume 9, Issue 5

257 -- 265Fuzhi Zhang, Shuangxia Sun, Huawei Yi. Robust collaborative recommendation algorithm based on kernel function and Welsch reweighted M-estimator
266 -- 276Qingju Wang, Zhiqiang Liu, Deniz Toz, Kerem Varici, Dawu Gu. Related-key rectangle cryptanalysis of Rijndael-160 and Rijndael-192
277 -- 283Le Dong, Yanling Wang, Wenling Wu, Jian Zou. Known-key distinguishers on 15-round 4-branch type-2 generalised Feistel networks with single substitution-permutation functions and near-collision attacks on its hashing modes
284 -- 287Myong-Son Sin, Ryul Kim. Some new results on equivalency of collusion-secure properties for Reed-Solomon codes
288 -- 293Zhuohua Liu, Chuankun Wu. Privacy of a randomised skip lists-based protocol
294 -- 301Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref. Biclique cryptanalysis of the full-round KLEIN block cipher