Journal: IET Information Security

Volume 10, Issue 6

287 -- 0Jonathan Katz. Guest Editorial
288 -- 303Michel Abdalla, Fabrice Benhamouda, David Pointcheval. Public-key encryption indistinguishable under plaintext-checkable attacks
304 -- 318Felix Heuer, Tibor Jager, Sven Schäge, Eike Kiltz. Selective opening security of practical public-key encryption schemes
319 -- 331David Bernhard, Marc Fischlin, Bogdan Warinschi. Adaptive proofs of knowledge in the random oracle model
332 -- 347Sébastien Canard, David Pointcheval, Olivier Sanders, Jacques Traoré. Divisible e-cash made practical
348 -- 357Emmanuela Orsini, Joop van de Pol, Nigel P. Smart. q
358 -- 371Gilles Barthe, Edvard Fagerholm, Dario Fiore, Andre Scedrov, Benedikt Schmidt, Mehdi Tibouchi. Strongly-optimal structure preserving signatures from Type II pairings: synthesis and lower bounds
372 -- 385Nico Döttling. Low Noise LPN: Key dependent message secure public key encryption an sample amplification
386 -- 402Qutaiba Ibrahim Ali. Securing solar energy-harvesting road-side unit using an embedded cooperative-hybrid intrusion detection system
403 -- 412Shifeng Sun, Shuai Han, Dawu Gu, Shengli Liu. Public key cryptosystems secure against memory leakage attacks
413 -- 417Degang Sun, Jun Shi, Dong Wei, Meng Zhang, Wei-qing Huang. Method for detecting text information leakage in electromagnetic radiation from a computer display
418 -- 424Liang Deng, Qingkai Zeng. Exception-oriented programming: retrofitting code-reuse attacks to construct kernel malware
425 -- 432Ya Liu, Anren Yang, Zhiqiang Liu, Wei Li, Qingju Wang, Liang Song, Dawu Gu. -1 functions
433 -- 441Yang Liu, Xiaojun Tong. Hyperchaotic system-based pseudorandom number generator
442 -- 450Yanqing Yao, Zhoujun Li. Security of weak secrets based cryptographic primitives via the Rényi entropy

Volume 10, Issue 5

223 -- 224Nele Mentens, Damien Sauveron, José M. Sierra, Shiuh-Jeng Wang, Isaac Woungang. Guest Editorial
225 -- 231Puliparambil Megha Mukundan, Sindhu Manayankath, Chungath Srinivasan, Madathil Sethumadhavan. Hash-One: a lightweight cryptographic hash function
232 -- 241Aydin Aysu, Ege Gulcan, Daisuke Moriyama, Patrick Schaumont. Compact and low-power ASIP design for lightweight PUF-based authentication protocols
245 -- 251Abhishek Chakraborty, Sarani Bhattacharya, Tanu Hari Dixit, Chester Rebeiro, Debdeep Mukhopadhyay. Template attack on SPA and FA resistant implementation of Montgomery ladder
252 -- 261Vinoth Chakkaravarthy Ganesan, Alli Periyakaruppan, Raja Lavanya. Cost-effective polynomial-based multicast-unicast key distribution framework for secure group communication in IPv6 multicast networks
262 -- 271Collins Mtita, Maryline Laurent, Jacques Delort. Efficient serverless radio-frequency identification mutual authentication and secure tag search protocols with untrusted readers
272 -- 282Goutham Reddy Alavalapati, Eun-Jun Yoon, Ashok Kumar Das, Kee-Young Yoo. Lightweight authentication with key-agreement protocol for mobile network environment using smart cards

Volume 10, Issue 4

165 -- 172Majid Rahimi, Mostafa Barmshory, Mohammad Hadi Mansouri, Mohammad Reza Aref. Dynamic cube attack on Grain-v1
173 -- 179Bin Wang. Leakage-resilient message authentication code scheme based on hidden identity weak hash proof system
180 -- 187Sungwook Kim. Effective certificate revocation scheme based on weighted voting game approach
188 -- 193Serge Vaudenay. Privacy failure in the public-key distance-bounding protocols
194 -- 202Masoumeh Koochak Shooshtari, Mahmoud Ahmadian-Attari, Thomas Johansson, Mohammad Reza Aref. Cryptanalysis of McEliece cryptosystem variants based on quasi-cyclic low-density parity check codes
203 -- 214Mehmet Tahir Sandikkaya, Tolga Ovatman, Ali Emre Harmanci. Design and formal verification of a cloud compliant secure logging mechanism
215 -- 221Wentan Yi, Shaozhen Chen. Multidimensional zero-correlation linear cryptanalysis of the block cipher KASUMI

Volume 10, Issue 3

113 -- 118Gareth Owen, Nick Savage. Empirical analysis of Tor Hidden Services
119 -- 124Xiaoming Wang, Yanchun Lin, Yu Fang. Authenticating multi-dimensional query results in outsourced database
125 -- 133Stavros Papadopoulos 0002, Konstantinos Moustakas, Anastasios Drosou, Dimitrios Tzovaras. Border gateway protocol graph: detecting and visualising internet routing anomalies
134 -- 141Quanqiang Zhou. Supervised approach for detecting average over popular items attack in collaborative recommender systems
142 -- 151Yonglin Hao. Predicting the number of different dimensional cubes: theoretically evaluate the secure bound of cryptographic primitives against the balance testers
152 -- 155Houzhen Wang, Huanguo Zhang, Shaohua Tang. Key recovery on several matrix public-key encryption schemes
156 -- 164Reza Kazemi, Roohollah Rezaei, Mohammad Ali Akhaee, Fereidoon Behnia. Covert communications through mobile voice channels

Volume 10, Issue 2

53 -- 59Yang Tan, Shaohua Tang, Jie Chen, Yong Yu, Xiangxue Li. Building a new secure variant of Rainbow signature scheme
60 -- 68Esther Palomar, Lorena González-Manzano, Almudena Alcaide, Álvaro Galán. Implementing a privacy-enhanced attribute-based credential system for online social networks with co-ownership management
69 -- 79Xiaoming Hu, WenAn Tan, Huajie Xu, Jian Wang. Short and provably secure designated verifier proxy signature scheme
80 -- 86Yang Lu, Jiguo Li. Improved certificate-based signature scheme without random oracles
87 -- 94Lingfeng Liu, Suoxia Miao, Hanping Hu, Ya Shuang Deng. Pseudorandom bit generator based on non-stationary logistic maps
95 -- 103Zhiqiang Liu, Bing Sun, Qingju Wang, Kerem Varici, Dawu Gu. Improved zero-correlation linear cryptanalysis of reduced-round Camellia under weak keys
104 -- 111Dandan Li, Zuling Chang, Qiaoyan Wen, Jie Zhang. n+1

Volume 10, Issue 1

1 -- 7Clémentine Gritti, Willy Susilo, Thomas Plantard. Logarithmic size ring signatures without random oracles
8 -- 17Weiqiang Wen, Libin Wang, Jiaxin Pan. Unified security model of authenticated key exchange with specific adversarial capabilities
18 -- 27Xin Xie, Bin Lu, Daofu Gong, Xiangyang Luo, Fenlin Liu. Random table and hash coding-based binary code obfuscation against stack trace analysis
28 -- 32Yimin Guo, Shundong Li, Jiawei Dou, Sufang Zhou. Deterministic cloned tag detection protocol for anonymous radio-frequency identification systems
33 -- 36José Luis Salazar, José Luis Tornos, Joan Josep Piles. Efficient ways of prime number generation for ring signatures
37 -- 44Hao Wu, Xianglei Dang, Lidong Wang, Longtao He. Information fusion-based method for distributed domain name system cache poisoning attack detection and identification
45 -- 52Haichang Gao, Xuqin Wang, Fang Cao, Zhengya Zhang, Lei Lei, Jiao Qi, Xiyang Liu. Robustness of text-based completely automated public turing test to tell computers and humans apart