Journal: IET Information Security

Volume 11, Issue 6

301 -- 311Che Wun Chiou, Chiou-Yng Lee, Jim-Min Lin, Yun-Chi Yeh, Jeng-Shyang Pan. Low-latency digit-serial dual basis multiplier for lightweight cryptosystems
312 -- 318Cuiping Shao, Huiyun Li, Jianbin Zhou. Fast and automatic security test on cryptographic ICs against fault injection attacks based on design for security test
319 -- 325Li Yang, Wei Huang, Xinxin Niu. Defending shilling attacks in recommender systems using soft co-clustering
326 -- 331Samaneh Mashhadi, Massoud Hadian Dehkordi, Niloofar Kiamari. Provably secure verifiable multi-stage secret sharing scheme based on monotone span program
332 -- 337Javier Herranz. Attribute-based encryption implies identity-based encryption
338 -- 344Po-Hung Yang, Sung-Ming Yen. Memory attestation of wireless sensor nodes through trusted remote agents
345 -- 355Hongchao Hu, Zhenpeng Wang, Guozhen Cheng, Jiangxing Wu. MNOS: a mimic network operating system for software defined networks
356 -- 362Nikita Veshchikov, Sylvain Guilley. Implementation flaws in the masking scheme of DPA Contest v4
363 -- 368Zhen Ma, Tian Tian, Wen-Feng Qi. Internal state recovery of Grain v1 employing guess-and-determine attack
369 -- 376Wei Yang, Yadong Wan, Qin Wang. Enhanced secure time synchronisation protocol for IEEE802.15.4e-based industrial Internet of Things
377 -- 385Dong Yang, Wen-Feng Qi, Hua-Jin Chen. Impossible differential attacks on the SKINNY family of block ciphers
386 -- 393Ricardo Julio Rodríguez, Juan Carlos García-Escartín. Security assessment of the Spanish contactless identity card

Volume 11, Issue 5

223 -- 229Xianfang Wang, Fang-Wei Fu. Multi-receiver authentication scheme with hierarchical structure
230 -- 234Dong Yang, Wen-Feng Qi, Tian Tian. All-subkeys-recovery attacks on a variation of Feistel-2 block ciphers
235 -- 242Yi Sun, Xingyuan Chen, Xuehui Du, Jian Xu. Dynamic authenticated data structures with access control for outsourcing data stream
243 -- 249Zheng Yang, Junyu Lai, Wanping Liu, Chao Liu, Song Luo. SignORKE: improving pairing-based one-round key exchange without random oracles
250 -- 255Yining Liu, Qi Zhong, Liang Chang, Zhe Xia, Debiao He, Chi Cheng. A secure data backup scheme using multi-factor authentication
256 -- 260Caixue Zhou, Zongmin Cui. Certificate-based signature scheme in the standard model
261 -- 266Fengrong Zhang, Shixiong Xia, Yupu Hu, Min Xie 0003. Constructions of involutions with optimal minimum degree
267 -- 272Santanu Sarkar. Results on significant anomalies of state values after key scheduling algorithm in RC4
273 -- 276Lei Cheng, Chao Li. Revisiting impossible differentials of MARS-like structures
277 -- 286Kai Fu, Ling Sun, Meiqin Wang. New integral attacks on SIMON
287 -- 293Ryo Kikuchi, Dai Ikarashi, Koji Chida, Koki Hamada, Wakaha Ogata. Computational SS and conversion protocols in both active and passive settings
294 -- 300Barsha Mitra, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri. Migrating from RBAC to temporal RBAC

Volume 11, Issue 4

177 -- 187Sedat Akleylek, Vincent Rijmen, Muharrem Tolga Sakalli, Emir Öztürk. Efficient methods to generate cryptographically significant binary diffusion layers
188 -- 194Liran Lerman, Zdenek Martinasek, Olivier Markowitch. Robust profiled attacks: should the adversary trust the dataset?
195 -- 198Binglong Chen, Chuangqiang Hu, Chang-An Zhao. Note on scalar multiplication using division polynomials
199 -- 203Weiguo Zhang, Luyang Li, Enes Pasalic. Construction of resilient S-boxes with higher-dimensional vectorial outputs and strictly almost optimal non-linearity
204 -- 210Liqun Chen, Qin Li, Keith M. Martin, Siaw-Lynn Ng. Private reputation retrieval in public - a privacy-aware announcement scheme for VANETs
211 -- 219YaWei Ren, Feng Liu, Teng Guo, Rongquan Feng, Dongdai Lin. Cheating prevention visual cryptography scheme using Latin square
220 -- 221Goutham Reddy Alavalapati, Eun-Jun Yoon, Kee-Young Yoo. Comment on 'Efficient and secure dynamic ID-based remote user authentication scheme for distributed systems using smart cards'

Volume 11, Issue 3

121 -- 128Lei Zhang 0012, Wenling Wu. Analysis of permutation choices for enhanced generalised Feistel structure with SP-type round function
131 -- 138Huaqun Wang, Debiao He, Shibing Zhang. Balanced anonymity and traceability for outsourcing small-scale data linear aggregation in the smart grid
139 -- 145Zhen Ma, Tian Tian, Wen-Feng Qi. Conditional differential attacks on Grain-128a stream cipher
146 -- 151Pawel Morawiecki. Practical attacks on the round-reduced PRINCE
152 -- 158Zhenzhen Zhang, Jianjun Hou, Yu Zhang, Jingyu Ye, Yunqing Shi. Detecting multiple H.264/AVC compressions with the same quantisation parameters
159 -- 167Harish Kumar Sahu, Indivar Gupta, N. Rajesh Pillai, Rajendra Kumar Sharma. BDD-based cryptanalysis of stream cipher: a practical approach
168 -- 176Liaojun Pang, Yufei Hu, Xia Zhou, YuMin Wang, Huixian Li. Directed proxy signature with fast revocation proven secure in the standard model

Volume 11, Issue 2

55 -- 65Xiangling Ding, Yingzhuo Deng, Gaobo Yang, Yun Song, Dajiang He, Xingming Sun. Design of new scan orders for perceptual encryption of H.264/AVC videos
66 -- 77Bahram Rashidi, Reza Rezaeian Farashahi, Sayed Masoud Sayedi. m )
78 -- 81Thomas W. Cusick. Highly nonlinear plateaued functions
82 -- 88Xiaomin Zhao, Jiabin Zhu, Xueli Liang, Shuangshuang Jiang, Qingzhang Chen. Lightweight and integrity-protecting oriented data aggregation scheme for wireless sensor networks
89 -- 96Ting Cui, Chenhui Jin, Bin Zhang, Zhuo Chen, Guoshuang Zhang. Searching all truncated impossible differentials in SPN
97 -- 103Rongjia Li, Chenhui Jin. Improved meet-in-the-middle attacks on Crypton and mCrypton
104 -- 113Zouheir Trabelsi, Safaa Zeidan, Mohammad M. Masud. Hybrid mechanism towards network packet early acceptance and rejection for unified threat management
114 -- 120Md. Mokammel Haque, Josef Pieprzyk. Analysing recursive preprocessing of BKZ lattice reduction algorithm

Volume 11, Issue 1

1 -- 7Hasan Taha, Emad Alsusa. Secret key establishment technique using channel state information driven phase randomisation in multiple-input multiple-output orthogonal frequency division multiplexing
8 -- 15Xi Xiao, Zhenlong Wang, Qing Li, Shu-Tao Xia, Yong Jiang. Back-propagation neural network on Markov chains from system call sequences: a new approach for detecting Android malware with system call sequences
16 -- 22Muhammad Nasir Mumtaz Bhutta, Haitham S. Cruickshank, Zhili Sun. Public-key infrastructure validation and revocation mechanism suitable for delay/disruption tolerant networks
23 -- 33Y. Sreenivasa Rao. Signature-policy attribute-based key-insulated signature
34 -- 37Moon Sung Lee. Sparse subset sum problem from Gentry-Halevi's fully homomorphic encryption
38 -- 45Wenjun Fan, David Fernández, Zhihui Du. Versatile virtual honeynet management framework
46 -- 53Zhen Ma, Tian Tian, Wen-Feng Qi. Improved conditional differential attacks on Grain v1