researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: IET Information Security
Home
Index
Info
Volume
Volume
3
, Issue
4
129
--
138
Nasour Bagheri
,
Matt Henricksen
,
Lars R. Knudsen
,
Majid Naderi
,
B. Sadeghyian
.
Cryptanalysis of an iterated halving-based hash function: CRUSH
139
--
147
Jung-San Lee
,
Chi-Shiang Chan
,
Chin-Chen Chang
.
Non-iterative privacy preservation for online lotteries
148
--
151
Sherman S. M. Chow
,
Wun-She Yap
.
Partial decryption attacks in security-mediated certificateless encryption
152
--
176
Siamak Fayyaz Shahandashti
,
Reihaneh Safavi-Naini
.
Generic constructions for universal designated-verifier signatures and identitybased signatures from standard signatures
Volume
3
, Issue
3
75
--
113
Manachai Toahchoodee
,
Indrakshi Ray
.
Using alloy to analyse a spatio-temporal access control model supporting delegation
114
--
118
Ameneh Farhadian
,
Mohammad Reza Aref
.
Efficient method for simplifying and approximating the s-boxes based on power functions
119
--
127
Aggelos Kiayias
,
Hong-Sheng Zhou
.
Hidden identity-based signatures
Volume
3
, Issue
2
45
--
52
Che Wun Chiou
,
Chiou-Yng Lee
,
Jim-Min Lin
.
k)
53
--
59
Baocang Wang
,
Yupu Hu
.
Signature scheme based on the root extraction problem over braid groups
60
--
65
Haining Fan
,
Masud Anwarul Hasan
.
n) multiplications
66
--
73
Hadi Ahmadi
,
Taraneh Eghlidos
.
Heuristic guess-and-determine attacks on stream ciphers
Volume
3
, Issue
1
1
--
8
Saad M. Saad
.
Design of a robust and secure digital signature scheme for image authentication over wireless channels
9
--
33
Fredrik Seehusen
,
Ketil Stølen
.
Information flow security, abstraction and composition
34
--
44
Monjur Alam
,
Santosh Ghosh
,
M. J. Mohan
,
Debdeep Mukhopadhyay
,
Dipanwita Roy Chowdhury
,
Indranil Sengupta
.
Effect of glitches against masked AES S-box implementation and countermeasure