


default search action
IET Information Security, Volume 17
Volume 17, Number 1, January 2023
- Jong Hwan Park
:
Guest Editorial: Selected papers from the 24th International Conference on Information Security and Cryptology (ICISC 2021). 1-2 - Peixin Ren
, Xiaozhuo Gu, Ziliang Wang:
Efficient module learning with errors-based post-quantum password-authenticated key exchange. 3-17 - Valeh Farzaliyev
, Jan Willemson
, Jaan Kristjan Kaasik:
Improved lattice-based mix-nets for electronic voting. 18-34 - Kazuki Yamamura, Yuntao Wang
, Eiichiro Fujisaki:
Improved lattice enumeration algorithms by primal and dual reordering methods. 35-45 - Jongheon Lee
, Sokjoon Lee
, You-Seok Lee, Dooho Choi
:
T-depth reduction method for efficient SHA-256 quantum circuit construction. 46-65 - Yongseong Lee
, Jinkeon Kang
, Donghoon Chang, Seokhie Hong:
A preimage attack on reduced GIMLI-HASH with unbalanced squeezing phase. 66-79 - Seonghyuck Lim
, Dong-Guk Han
:
Experimental evaluation of differential fault attack on lightweight block cipher PIPO. 80-88 - Yi Fei Chen, Rahul Punchhi, Mahesh Tripunitara
:
The poor usability of OpenLDAP Access Control Lists. 89-101 - Zhengbin Zhu
, Qinrang Liu, Dongpei Liu, Chenyang Ge, Chong Wang:
MHSDN: A Hierarchical Software Defined Network Reliability Framework design. 102-117 - Yafei Wu, Jian Shi, Peicheng Wang, Dongrui Zeng, Cong Sun:
DeepCatra: Learning flow- and graph-based behaviours for Android malware detection. 118-130 - Rentaro Shiba
, Ravi Anand, Kazuhiko Minematsu, Takanori Isobe:
Cubicle: A family of space-hard ciphers for IoT. 131-146 - Jun Liu
, Dachao Wang, Yupu Hu, Jie Chen
, Baocang Wang
:
Improved integral cryptanalysis of SPNbox in digital rights management systems. 147-158
Volume 17, Number 2, March 2023
- Ayoub Otmani, Christophe Petit
, Mehdi Tibouchi
:
Guest Editorial: Guest Editorial on Cryptanalysis of (NIST PQC) post-quantum proposals. 159-160 - Péter Kutas
, Christophe Petit:
Torsion point attacks on 'SIDH-like' cryptosystems. 161-170 - Jean-François Biasse
, Xavier Bonnetain, Elena Kirshanova
, André Schrottenloher, Fang Song
:
Quantum algorithms for attacking hardness assumptions in classical and post-quantum cryptography. 171-209 - Yasuhiko Ikematsu
, Shuhei Nakamura, Tsuyoshi Takagi:
Recent progress in the security evaluation of multivariate public-key cryptography. 210-226 - Anyu Wang
, Dianyan Xiao, Yang Yu
:
Lattice-based cryptosystems in standardisation processes: A survey. 227-243 - Yi-feng Wang
, Yuanbo Guo, Chen Fang:
A semantic-based method for analysing unknown malicious behaviours via hyper-spherical variational auto-encoders. 244-254 - Mingjun Dai, Haiyan Deng, Xiaofeng Li, Gongchao Su, Zhonghao Zhang:
Robust private information retrieval for low encoding/decoding complexity distributed storage. 255-268 - Junyu Ren
, Haibin Wan, Chaoyang Zhu, Tuanfa Qin:
Stacking ensemble learning with heterogeneous models and selected feature subset for prediction of service trust in internet of medical things. 269-288 - Zhixiong Chen
, Vladimir Edemskiy
, Zhihua Niu
, Yuqi Sang
:
Arithmetic correlation of binary half- ℓ -sequences. 289-293 - Faiz Ul Islam
, Guangjie Liu
, Weiwei Liu
, Qazi Mazhar ul Haq
:
A deep learning-based framework to identify and characterise heterogeneous secure network traffic. 294-308 - Zhe Xia
, Yu Yang, Fuyou Miao:
Comments on 'Chinese Remainder Theorem-based centralised group key management for secure multicast communication'. 309-314
Volume 17, Number 3, May 2023
Original Research
- Sahar Lazim Qaddoori
, Qutaiba Ibrahim Ali
:
An embedded intrusion detection and prevention system for home area networks in advanced metering infrastructure. 315-334 - Jiajie Liu
, Bing Sun, Chao Li:
Design and cryptanalysis of a new iterative structure. 335-346 - Dongdong Lin
, Manman Li
, Zezhou Hou
, Shaozhen Chen
:
Conditional differential analysis on the KATAN ciphers based on deep learning. 347-359 - Meng Yue, Silin Peng
, Wenzhi Feng:
MF-RF: A detection approach based on multi-features and random forest algorithm for improved collusive interest flooding attack. 360-376 - Ngoc-Tuan Do
, Van-Phuc Hoang
, Van-Sang Doan
, Cong-Kha Pham
:
On the performance of non-profiled side channel attacks based on deep learning techniques. 377-393 - Junling Pei
, Lusheng Chen:
Preimage attacks on reduced-round Keccak hash functions by solving algebraic systems. 394-406 - Jiamei Liu, Lin Tan
, Hong Xu
:
Improved related-tweakey rectangle attacks on round-reduced Deoxys-BC. 407-422 - Manoj Kumar Prabakaran
, Parvathy Meenakshi Sundaram
, Abinaya Devi Chandrasekar
:
An enhanced deep learning-based phishing detection mechanism to effectively identify malicious URLs using variational autoencoders. 423-440 - Fabio Massimo Zennaro
, László Erdodi:
Modelling penetration testing with reinforcement learning using capture-the-flag challenges: Trade-offs between model-free learning and a priori knowledge. 441-457 - Takuro Shiraya
, Nobuyuki Takeuchi, Kosei Sakamoto, Takanori Isobe:
MILP-based security evaluation for AEGIS/Tiaoxin-346/Rocca. 458-467 - Akiko Inoue
, Chun Guo
, Kazuhiko Minematsu
:
Nonce-misuse resilience of Romulus-N and GIFT-COFB. 468-484 - Zibo Zhou
, Zongyang Zhang
, Hongyu Tao, Tianyu Li, Boyu Zhao
:
Efficient inner product arguments and their applications in range proofs. 485-504 - Wei Bai
, Angxuan Cheng, Cailing Wang, Zhisong Pan:
A fast user actual privilege reasoning framework based on privilege dependency graph reduction. 505-517 - Munir Geden
, Kasper Rasmussen:
Hardware-assisted remote attestation design for critical embedded systems. 518-533 - Zhangjun Ma
, Manman Li, Shaozhen Chen:
Meet-in-the-middle attacks on round-reduced CRAFT based on automatic search. 534-543
Comment
- Sonia Miri, Masoud Kaveh, Hadi Shahriar Shahhoseini, Mohammad Reza Mosavi
, Saeed Aghapour:
On the security of 'an ultra-lightweight and secure scheme for communications of smart metres and neighbourhood gateways by utilisation of an ARM Cortex-M microcontroller'. 544-551
Volume 17, Number 4, July 2023
Original Research
- Ángel Luis Perales Gómez
, Lorenzo Fernández Maimó, Alberto Huertas Celdrán
, Félix J. García Clemente:
An interpretable semi-supervised system for detecting cyberattacks using anomaly detection in industrial scenarios. 553-566 - Zhe Jiang, Xiwen Wang
, Kai Zhang
, Junqing Gong, Jie Chen, Haifeng Qian:
Revocable identity-based matchmaking encryption in the standard model. 567-581 - Cong Sun
, Xinpeng Xu, Yafei Wu, Dongrui Zeng, Gang Tan, Siqi Ma
, Peicheng Wang:
CryptoEval: Evaluating the risk of cryptographic misuses in Android apps with data-flow analysis. 582-597 - Liukun He, Liang-Min Wang, Keyang Cheng, Yifan Xu:
FlowMFD: Characterisation and classification of tor traffic using MFD chromatographic features and spatial-temporal modelling. 598-615 - Shion Utsumi
, Kosei Sakamoto, Takanori Isobe:
Bit-level evaluation of piccolo block cipher by satisfiability problem solver. 616-625 - Yanbin Xu, Yonglin Hao
, Mingxing Wang:
Revisit two memoryless state-recovery cryptanalysis methods on A5/1. 626-638 - Navid Vafaei, Hadi Soleimany
, Nasour Bagheri
:
Exploiting statistical effective fault attack in a blind setting. 639-646 - Degang Li
, Yang Yang, Guang Zeng:
Search framework for neutral bits and boomerangs in SHA-1 collision attacks. 647-663 - Kexin Hu
, Zhenfeng Zhang, Kaiwen Guo, Weiyu Jiang, Xiaoman Li, Jiang Han:
An optimisation for a two-round good-case latency protocol. 664-680 - Saha Reno
, Md. Mokammel Haque
:
Solving blockchain trilemma using off-chain storage protocol. 681-702 - Tong Li
, Chuanyong Song, Qinyu Pang:
Defending against social engineering attacks: A security pattern-based analysis framework. 703-726

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.