Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887
banner image
image of Volume 13, Issue 5
Online ISSN 1751-8717 Print ISSN 1751-8709

access icon free IET Information Security

Volume 13, Issue 5, September 2019


Volume 13, Issue 5

September 2019

Show / Hide details
    • Improved guess-and-determine attack on TRIVIUM
      ESR analysis over ST-MRC multi-input multi-output Nakagami fading channels
      Identity-based encryption resilient to continuous key leakage
      Causal analysis of attacks against honeypots based on properties of countries
      S-boxes representation and efficiency of algebraic attack
      Multi-designated verifiers signature schemes with threshold verifiability: generic pattern and a concrete scheme in the standard model
      New zero-sum distinguishers on full 24-round Keccak-f using the division property
      New method to describe the differential distribution table for large S-boxes in MILP and its application
      Inline high-bandwidth network analysis using a robust stream clustering algorithm
      Escrowed decryption protocols for lawful interception of encrypted data
      Sigma protocol for faster proof of simultaneous homomorphism relations

Most viewed content

Article
content/journals/iet-ifs
Journal
5
Loading

Most cited content for this Journal

This is a required field
Please enter a valid email address