default search action
IET Information Security, Volume 3
Volume 3, Number 1, 2009
- Saad M. Saad:
Design of a robust and secure digital signature scheme for image authentication over wireless channels. 1-8 - Fredrik Seehusen, Ketil Stølen:
Information flow security, abstraction and composition. 9-33 - Monjur Alam, Santosh Ghosh, M. J. Mohan, Debdeep Mukhopadhyay, Dipanwita Roy Chowdhury, Indranil Sengupta:
Effect of glitches against masked AES S-box implementation and countermeasure. 34-44
Volume 3, Number 2, 2009
- Che Wun Chiou, Chiou-Yng Lee, Jim-Min Lin:
Unified dual-field multiplier in GF(P) and GF(2k). 45-52 - Baocang Wang, Yupu Hu:
Signature scheme based on the root extraction problem over braid groups. 53-59 - Haining Fan, Masud Anwarul Hasan:
Alternative to the karatsuba algorithm for software implementations of GF(2n) multiplications. 60-65 - Hadi Ahmadi, Taraneh Eghlidos:
Heuristic guess-and-determine attacks on stream ciphers. 66-73
Volume 3, Number 3, 2009
- Manachai Toahchoodee, Indrakshi Ray:
Using alloy to analyse a spatio-temporal access control model supporting delegation. 75-113 - Ameneh Farhadian, Mohammad Reza Aref:
Efficient method for simplifying and approximating the s-boxes based on power functions. 114-118 - Aggelos Kiayias, Hong-Sheng Zhou:
Hidden identity-based signatures. 119-127
Volume 3, Number 4, 2009
- Nasour Bagheri, Matt Henricksen, Lars R. Knudsen, Majid Naderi, B. Sadeghyian:
Cryptanalysis of an iterated halving-based hash function: CRUSH. 129-138 - Jung-San Lee, Chi-Shiang Chan, Chin-Chen Chang:
Non-iterative privacy preservation for online lotteries. 139-147 - Sherman S. M. Chow, Wun-She Yap:
Partial decryption attacks in security-mediated certificateless encryption. 148-151 - Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini:
Generic constructions for universal designated-verifier signatures and identitybased signatures from standard signatures. 152-176
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.