Journal: IET Information Security

Volume 16, Issue 6

401 -- 416Ke Huang 0002, Xiaosong Zhang 0001, Yi Mu 0001, Fatemeh Rezaeibagha, Xiaoming Huang, Yongcheng Gong. Blockchain-based deduplication with arbitration and incentives
417 -- 431Linlin Xue, Yue Wang, Zhongpeng Wang. Secure image block compressive sensing using complex Hadamard measurement matrix and bit-level XOR
432 -- 441Yongqiang Yu, Xuehu Yan, Longlong Li, Jiayu Wang. Renewal of secret and shadows in secret image sharing
442 -- 458Zhangguo Tang, Junfeng Wang, Baoguo Yuan, Huanzhou Li, Jian Zhang, Han Wang. Markov-GAN: Markov image enhancement method for malicious encrypted traffic classification
459 -- 469Makoto Habu, Kazuhiko Minematsu, Tetsu Iwata. Matching attacks on Romulus-M
470 -- 481Adrián Ranea, Vincent Rijmen. Characteristic automated search of cryptographic algorithms for distinguishing attacks (CASCADA)
482 -- 0. Erratum: Quantum-resistant anonymous identity-based encryption with traceable identities

Volume 16, Issue 5

321 -- 323Roberto Di Pietro, Ni Trieu, Vincenzo Iovino. COVID-19 and cybersecurity
324 -- 345Ali F. Al-Qahtani, Stefano Cresci. The COVID-19 scamdemic: A survey of phishing attacks and their countermeasures during COVID-19
346 -- 361Jiahui Gao, Chetan Surana, Ni Trieu. Secure contact tracing platform from simplest private set intersection cardinality
362 -- 372Muhammad Arif 0009, Shermin Shamsudheen, F. Ajesh, Guojun Wang 0001, Jianer Chen. AI bot to detect fake COVID-19 vaccine certificate
373 -- 389Lisha Shuai, Jiamin Zhang, Yu Cao, Min Zhang 0037, Xiaolong Yang. R-DP: A risk-adaptive privacy protection scheme for mobile crowdsensing in industrial internet of things
390 -- 400Xuan Shen, Guoqiang Liu, Xiaofeng Wang, Bing Sun 0001, Jun He. Security evaluation on type-1 and type-1-like 4-branch generalized Feistel structures and application to reduced-round Lesamnta-LW-BC

Volume 16, Issue 4

235 -- 252Uddipana Dowerah, Srinivasan Krishnaswamy. Towards an efficient LWE-based fully homomorphic encryption scheme
253 -- 261Akiko Inoue. Beyond full-bit secure authenticated encryption without input-length limitation
262 -- 281Chun Guo, Tetsu Iwata, Kazuhiko Minematsu. New indifferentiability security proof of MDPH hash function
282 -- 300Jinyu Lu, Yunwen Liu, Tomer Ashur, Bing Sun 0001, Chao Li 0002. Improved rotational-XOR cryptanalysis of Simon-like block ciphers
301 -- 313Dawen Xu 0001. Reversible data hiding in encrypted images with high payload
314 -- 319Yuze Wang, Peng Liu 0016, Yingtao Jiang. IMSC: Instruction set architecture monitor and secure cache for protecting processor systems from undocumented instructions

Volume 16, Issue 3

145 -- 160Rentaro Shiba, Kosei Sakamoto, Takanori Isobe 0001. Efficient constructions for large-state block ciphers based on AES New Instructions
161 -- 177Mo Shaohui, Gulanbaier Tuerhong, Mairidan Wushouer, Tuergen Yibulayin. PCA mix-based Hotelling's T2 multivariate control charts for intrusion detection system
178 -- 192Huanruo Li, Yunfei Guo, Penghao Sun, Yawen Wang, Shumin Huo. An optimal defensive deception framework for the container-based cloud with deep reinforcement learning
193 -- 207Yibing Liu, Lijun Huo, Gang Zhou. TR-AKA: A two-phased, registered authentication and key agreement protocol for 5G mobile networks
208 -- 219Jiseung Kim 0001, Changmin Lee 0001. Cryptanalysis of FRS obfuscation based on the CLT13 multilinear map
220 -- 234Zhengbin Liu, Yongqiang Li 0001, Lin Jiao, Mingsheng Wang. On the upper bound of squared correlation of SIMON-like functions and its applications

Volume 16, Issue 2

75 -- 85Rentaro Shiba, Kosei Sakamoto, Fukang Liu, Kazuhiko Minematsu, Takanori Isobe 0001. Integral and impossible-differential attacks on the reduced-round Lesamnta-LW-BC
86 -- 96Liang Liu 0012, Yue Yin, Zhijun Wu 0001, Qingbo Pan, Meng Yue. LDoS attack detection method based on traffic classification prediction
97 -- 110Jiawei Nian, Ping Wang, Haichang Gao, Xiaoyan Guo. A deep learning-based attack on text CAPTCHAs by using object detection techniques
111 -- 126Zi-Yuan Liu, Yi-Fan Tseng, Raylin Tso, Masahiro Mambo, Yu-Chi Chen. Quantum-resistant anonymous identity-based encryption with trable identities
127 -- 132Maria Chiara Molteni, Jürgen Pulkus, Vittorio Zaccaria. On robust strong-non-interferent low-latency multiplications
133 -- 143Jiongyi Chen, Fenghao Xu, Shuaike Dong, Wei Sun, Kehuan Zhang. Authorisation inconsistency in IoT third-party integration

Volume 16, Issue 1

1 -- 17Quan Yuan, Mehdi Tibouchi, Masayuki Abe. Security notions for stateful signature schemes
18 -- 27Rusi Wang, Hua Guo, Jiqiang Lu, Jianwei Liu. Cryptanalysis of a white-box SM4 implementation based on collision attack
28 -- 40Xiaoli Dong, Yongzhuang Wei. New attacks against reduced Rijndael-160
41 -- 50Huiwen Jia, Yupu Hu, Chunming Tang 0003. Lattice-based hash-and-sign signatures using approximate trapdoor, revisited
51 -- 63Shuai Liu, Jie Guan, Bin Hu 0011. Fault attacks on authenticated encryption modes for GIFT
64 -- 74José Antonio Gómez-Hernández, Raúl Sánchez-Fernández, Pedro García Teodoro. Inhibiting crypto-ransomware on windows platforms through a honeyfile-based approach with R-Locker