default search action
IET Information Security, Volume 17
Volume 17, Number 1, January 2023
- Jong Hwan Park:
Guest Editorial: Selected papers from the 24th International Conference on Information Security and Cryptology (ICISC 2021). 1-2 - Peixin Ren, Xiaozhuo Gu, Ziliang Wang:
Efficient module learning with errors-based post-quantum password-authenticated key exchange. 3-17 - Valeh Farzaliyev, Jan Willemson, Jaan Kristjan Kaasik:
Improved lattice-based mix-nets for electronic voting. 18-34 - Kazuki Yamamura, Yuntao Wang, Eiichiro Fujisaki:
Improved lattice enumeration algorithms by primal and dual reordering methods. 35-45 - Jongheon Lee, Sokjoon Lee, You-Seok Lee, Dooho Choi:
T-depth reduction method for efficient SHA-256 quantum circuit construction. 46-65 - Yongseong Lee, Jinkeon Kang, Donghoon Chang, Seokhie Hong:
A preimage attack on reduced GIMLI-HASH with unbalanced squeezing phase. 66-79 - Seonghyuck Lim, Dong-Guk Han:
Experimental evaluation of differential fault attack on lightweight block cipher PIPO. 80-88 - Yi Fei Chen, Rahul Punchhi, Mahesh Tripunitara:
The poor usability of OpenLDAP Access Control Lists. 89-101 - Zhengbin Zhu, Qinrang Liu, Dongpei Liu, Chenyang Ge, Chong Wang:
MHSDN: A Hierarchical Software Defined Network Reliability Framework design. 102-117 - Yafei Wu, Jian Shi, Peicheng Wang, Dongrui Zeng, Cong Sun:
DeepCatra: Learning flow- and graph-based behaviours for Android malware detection. 118-130 - Rentaro Shiba, Ravi Anand, Kazuhiko Minematsu, Takanori Isobe:
Cubicle: A family of space-hard ciphers for IoT. 131-146 - Jun Liu, Dachao Wang, Yupu Hu, Jie Chen, Baocang Wang:
Improved integral cryptanalysis of SPNbox in digital rights management systems. 147-158
Volume 17, Number 2, March 2023
- Ayoub Otmani, Christophe Petit, Mehdi Tibouchi:
Guest Editorial: Guest Editorial on Cryptanalysis of (NIST PQC) post-quantum proposals. 159-160 - Péter Kutas, Christophe Petit:
Torsion point attacks on 'SIDH-like' cryptosystems. 161-170 - Jean-François Biasse, Xavier Bonnetain, Elena Kirshanova, André Schrottenloher, Fang Song:
Quantum algorithms for attacking hardness assumptions in classical and post-quantum cryptography. 171-209 - Yasuhiko Ikematsu, Shuhei Nakamura, Tsuyoshi Takagi:
Recent progress in the security evaluation of multivariate public-key cryptography. 210-226 - Anyu Wang, Dianyan Xiao, Yang Yu:
Lattice-based cryptosystems in standardisation processes: A survey. 227-243 - Yifeng Wang, Yuanbo Guo, Chen Fang:
A semantic-based method for analysing unknown malicious behaviours via hyper-spherical variational auto-encoders. 244-254 - Mingjun Dai, Haiyan Deng, Xiaofeng Li, Gongchao Su, Zhonghao Zhang:
Robust private information retrieval for low encoding/decoding complexity distributed storage. 255-268 - Junyu Ren, Haibin Wan, Chaoyang Zhu, Tuanfa Qin:
Stacking ensemble learning with heterogeneous models and selected feature subset for prediction of service trust in internet of medical things. 269-288 - Zhixiong Chen, Vladimir Edemskiy, Zhihua Niu, Yuqi Sang:
Arithmetic correlation of binary half- ℓ -sequences. 289-293 - Faiz Ul Islam, Guangjie Liu, Weiwei Liu, Qazi Mazhar ul Haq:
A deep learning-based framework to identify and characterise heterogeneous secure network traffic. 294-308 - Zhe Xia, Yu Yang, Fuyou Miao:
Comments on 'Chinese Remainder Theorem-based centralised group key management for secure multicast communication'. 309-314
Volume 17, Number 3, May 2023
Original Research
- Sahar Lazim Qaddoori, Qutaiba Ibrahim Ali:
An embedded intrusion detection and prevention system for home area networks in advanced metering infrastructure. 315-334 - Jiajie Liu, Bing Sun, Chao Li:
Design and cryptanalysis of a new iterative structure. 335-346 - Dongdong Lin, Manman Li, Zezhou Hou, Shaozhen Chen:
Conditional differential analysis on the KATAN ciphers based on deep learning. 347-359 - Meng Yue, Silin Peng, Wenzhi Feng:
MF-RF: A detection approach based on multi-features and random forest algorithm for improved collusive interest flooding attack. 360-376 - Ngoc-Tuan Do, Van-Phuc Hoang, Van-Sang Doan, Cong-Kha Pham:
On the performance of non-profiled side channel attacks based on deep learning techniques. 377-393 - Junling Pei, Lusheng Chen:
Preimage attacks on reduced-round Keccak hash functions by solving algebraic systems. 394-406 - Jiamei Liu, Lin Tan, Hong Xu:
Improved related-tweakey rectangle attacks on round-reduced Deoxys-BC. 407-422 - Manoj Kumar Prabakaran, Parvathy Meenakshi Sundaram, Abinaya Devi Chandrasekar:
An enhanced deep learning-based phishing detection mechanism to effectively identify malicious URLs using variational autoencoders. 423-440 - Fabio Massimo Zennaro, László Erdodi:
Modelling penetration testing with reinforcement learning using capture-the-flag challenges: Trade-offs between model-free learning and a priori knowledge. 441-457 - Takuro Shiraya, Nobuyuki Takeuchi, Kosei Sakamoto, Takanori Isobe:
MILP-based security evaluation for AEGIS/Tiaoxin-346/Rocca. 458-467 - Akiko Inoue, Chun Guo, Kazuhiko Minematsu:
Nonce-misuse resilience of Romulus-N and GIFT-COFB. 468-484 - Zibo Zhou, Zongyang Zhang, Hongyu Tao, Tianyu Li, Boyu Zhao:
Efficient inner product arguments and their applications in range proofs. 485-504 - Wei Bai, Angxuan Cheng, Cailing Wang, Zhisong Pan:
A fast user actual privilege reasoning framework based on privilege dependency graph reduction. 505-517 - Munir Geden, Kasper Rasmussen:
Hardware-assisted remote attestation design for critical embedded systems. 518-533 - Zhangjun Ma, Manman Li, Shaozhen Chen:
Meet-in-the-middle attacks on round-reduced CRAFT based on automatic search. 534-543
Comment
- Sonia Miri, Masoud Kaveh, Hadi Shahriar Shahhoseini, Mohammad Reza Mosavi, Saeed Aghapour:
On the security of 'an ultra-lightweight and secure scheme for communications of smart metres and neighbourhood gateways by utilisation of an ARM Cortex-M microcontroller'. 544-551
Volume 17, Number 4, July 2023
Original Research
- Ángel Luis Perales Gómez, Lorenzo Fernández Maimó, Alberto Huertas Celdrán, Félix J. García Clemente:
An interpretable semi-supervised system for detecting cyberattacks using anomaly detection in industrial scenarios. 553-566 - Zhe Jiang, Xiwen Wang, Kai Zhang, Junqing Gong, Jie Chen, Haifeng Qian:
Revocable identity-based matchmaking encryption in the standard model. 567-581 - Cong Sun, Xinpeng Xu, Yafei Wu, Dongrui Zeng, Gang Tan, Siqi Ma, Peicheng Wang:
CryptoEval: Evaluating the risk of cryptographic misuses in Android apps with data-flow analysis. 582-597 - Liukun He, Liang-Min Wang, Keyang Cheng, Yifan Xu:
FlowMFD: Characterisation and classification of tor traffic using MFD chromatographic features and spatial-temporal modelling. 598-615 - Shion Utsumi, Kosei Sakamoto, Takanori Isobe:
Bit-level evaluation of piccolo block cipher by satisfiability problem solver. 616-625 - Yanbin Xu, Yonglin Hao, Mingxing Wang:
Revisit two memoryless state-recovery cryptanalysis methods on A5/1. 626-638 - Navid Vafaei, Hadi Soleimany, Nasour Bagheri:
Exploiting statistical effective fault attack in a blind setting. 639-646 - Degang Li, Yang Yang, Guang Zeng:
Search framework for neutral bits and boomerangs in SHA-1 collision attacks. 647-663 - Kexin Hu, Zhenfeng Zhang, Kaiwen Guo, Weiyu Jiang, Xiaoman Li, Jiang Han:
An optimisation for a two-round good-case latency protocol. 664-680 - Saha Reno, Md. Mokammel Haque:
Solving blockchain trilemma using off-chain storage protocol. 681-702 - Tong Li, Chuanyong Song, Qinyu Pang:
Defending against social engineering attacks: A security pattern-based analysis framework. 703-726
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.