Your browser does not support JavaScript!
banner image
image of Volume 7, Issue 3
Online ISSN 1751-8717 Print ISSN 1751-8709

access icon free IET Information Security

Volume 7, Issue 3, September 2013

Volume 7, Issue 3

September 2013

On the generalisation of special moduli for faster interleaved montgomery modular multiplication
Aryabhata remainder theorem-based non-iterative electronic lottery mechanism with robustness
New multivariate hash function quadratic polynomials multiplying linear polynomials
Enhanced digital rights management authentication scheme based on smart card
BLAST: B-LAyered bad-character SHIFT tables for high-speed pattern matching
TEAP: trust-enhanced anonymous on-demand routing protocol for mobile ad hoc networks
Security and complexity of the McEliece cryptosystem based on quasi-cyclic low-density parity-check codes
Channel level crossing-based security for communications over fading channels
Superpoly algebraic normal form monomial test on Trivium
Publicly verifiable multi-secret sharing scheme from bilinear pairings
Robust elliptic curve cryptography-based three factor user authentication providing privacy of biometric data
Strong non-repudiation based on certificateless short signatures

Most viewed content


Most cited content for this Journal

This is a required field
Please enter a valid email address