Journal: IET Information Security

Volume 3, Issue 4

129 -- 138Nasour Bagheri, Matt Henricksen, Lars R. Knudsen, Majid Naderi, B. Sadeghyian. Cryptanalysis of an iterated halving-based hash function: CRUSH
139 -- 147Jung-San Lee, Chi-Shiang Chan, Chin-Chen Chang. Non-iterative privacy preservation for online lotteries
148 -- 151Sherman S. M. Chow, Wun-She Yap. Partial decryption attacks in security-mediated certificateless encryption
152 -- 176Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini. Generic constructions for universal designated-verifier signatures and identitybased signatures from standard signatures

Volume 3, Issue 3

75 -- 113Manachai Toahchoodee, Indrakshi Ray. Using alloy to analyse a spatio-temporal access control model supporting delegation
114 -- 118Ameneh Farhadian, Mohammad Reza Aref. Efficient method for simplifying and approximating the s-boxes based on power functions
119 -- 127Aggelos Kiayias, Hong-Sheng Zhou. Hidden identity-based signatures

Volume 3, Issue 2

45 -- 52Che Wun Chiou, Chiou-Yng Lee, Jim-Min Lin. k)
53 -- 59Baocang Wang, Yupu Hu. Signature scheme based on the root extraction problem over braid groups
60 -- 65Haining Fan, Masud Anwarul Hasan. n) multiplications
66 -- 73Hadi Ahmadi, Taraneh Eghlidos. Heuristic guess-and-determine attacks on stream ciphers

Volume 3, Issue 1

1 -- 8Saad M. Saad. Design of a robust and secure digital signature scheme for image authentication over wireless channels
9 -- 33Fredrik Seehusen, Ketil Stølen. Information flow security, abstraction and composition
34 -- 44Monjur Alam, Santosh Ghosh, M. J. Mohan, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury, Indranil Sengupta. Effect of glitches against masked AES S-box implementation and countermeasure