


default search action
IET Information Security, Volume 2023
Volume 2023, 2023
- Duong Dinh Tran
, Kazuhiro Ogata
, Santiago Escobar
, Sedat Akleylek
, Ayoub Otmani
:
Kyber, Saber, and SK-MLWR Lattice-Based Key Encapsulation Mechanisms Model Checking with Maude. 1-17 - Kai Lin
, Kaiyu Wang
, Jin Shang
, Qindong Sun
:
A Secure Anonymous Identity-Based Virtual-Space Agreement Method for Crowds-Based Anonymous Communicate Scheme. 1-13 - Fu Yao
, Yongzhuang Wei
, Hua Chen
, Enes Pasalic:
Improving the Performance of CPA Attacks for Ciphers Using Parallel Implementation of S-Boxes. 1-17 - Wenjuan Jia
, Jiang Zhang
, Baocang Wang
:
Hardness of Module-LWE with Semiuniform Seeds from Module-NTRU. 1-16 - Jiali Shi
, Guoqiang Liu
, Chao Li
:
SAT-Based Security Evaluation for WARP against Linear Cryptanalysis. 1-14 - Wenjuan Jia
, Baocang Wang
:
Hardness of (Semiuniform) MLWE with Short Distributions Using the Rényi Divergence. 1-15 - Yu Zhang, Shuangrui Zhao, Ji He, Yuanyu Zhang, Yulong Shen, Xiaohong Jiang:
A Survey of Secure Communications for Satellite Internet Based on Cryptography and Physical Layer Security. 1-15 - Keita Emura
:
Generic Construction of Fully Anonymous Broadcast Authenticated Encryption with Keyword Search with Adaptive Corruptions. 1-12 - Xin Miao
, Lu Li
, Chun Guo
, Meiqin Wang
, Weijia Wang
:
Bit-Sliced Implementation of SM4 and New Performance Records. 1-10 - Qiaohan Chu
, Anmin Fu
, Haifeng Qian
, Jie Chen
:
Inner-Product Matchmaking Encryption: Bilateral Access Control and Beyond Equality. 1-17 - Nobuyuki Sugio
:
Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK. 1-12 - Zhaoxuan Bian
, Fuqun Wang
, Renjun Zhang
, Bin Lian, Lidong Han, Kefei Chen:
A Publicly Verifiable Leveled Fully Homomorphic Signcryption Scheme. 1-8 - Yafei Zheng
, Wenling Wu
:
Similarity Property and Slide Attack of Block Cipher FESH. 1-8 - Shenjian Qiu
, Jiaxuan Fei, Jian Wang:
Cross-Space Conduction Assessment Method of Network Attack Risk under the Strong Coupling Characteristics of Electric Power Cyber Physics. 1-13

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.