Journal: IET Information Security

Volume 2, Issue 4

99 -- 107Christophe Tartary, Sujing Zhou, Dongdai Lin, Huaxiong Wang, Josef Pieprzyk. Analysis of bilinear pairing-based accumulator for identity escrowing
108 -- 118Shivaramakrishnan Narayan, Udaya Parampalli. Efficient identity-based signatures in the standard model
119 -- 128M. Jayalakshmi, Shabbir N. Merchant, Uday B. Desai. Optimum retrieval of watermark from wavelet significant coefficients
129 -- 150Hafiz Malik, Rashid Ansari, Ashfaq A. Khokhar. Robust audio watermarking using frequency-selective spread spectrum
151 -- 165Feng Liu, Chuan-Kun Wu, Xi Jun Lin. Colour visual cryptography schemes

Volume 2, Issue 3

67 -- 78Michel Abdalla, Eike Kiltz, Gregory Neven. Generalised key delegation for hierarchical identity-based encryption
79 -- 84Lukasz Krzywiecki, Miroslaw Kutylowski, Maciej Nikodem. General anonymous key broadcasting via Lagrangian interpolation
85 -- 93Emmanuel Bresson, Mark Manulis. Contributory group key exchange in the presence of malicious participants
94 -- 98Julie Ferrigno, Martin Hlavác. When AES blinks: introducing optical side channel

Volume 2, Issue 2

19 -- 27Nigel P. Smart, Elisabeth Oswald, Daniel Page. Randomised representations
28 -- 32Behnam Bahrak, Mohammad Reza Aref. Impossible differential attack on seven-round AES-128
35 -- 46Chin-Chen Chang, Chia-Chen Lin, Yi-Hui Chen. Reversible data-embedding scheme using differences between original and predicted pixel values
47 -- 63Mihir Bellare, Sarah Shoup. Two-tier signatures from the Fiat-Shamir transform, with applications to strongly unforgeable and one-time signatures

Volume 2, Issue 1

1 -- 11Gilles Piret, François-Xavier Standaert. Security analysis of higher-order Boolean masking schemes for block ciphers (with conditions of perfect masking)
12 -- 18Gautam Biswas. Diffie-Hellman technique: extended to multiple two-party keys and one multi-party key