


default search action
IET Information Security, Volume 17
Volume 17, Number 1, January 2023
- Jong Hwan Park

:
Guest Editorial: Selected papers from the 24th International Conference on Information Security and Cryptology (ICISC 2021). 1-2 - Peixin Ren

, Xiaozhuo Gu, Ziliang Wang:
Efficient module learning with errors-based post-quantum password-authenticated key exchange. 3-17 - Valeh Farzaliyev

, Jan Willemson
, Jaan Kristjan Kaasik:
Improved lattice-based mix-nets for electronic voting. 18-34 - Kazuki Yamamura, Yuntao Wang

, Eiichiro Fujisaki:
Improved lattice enumeration algorithms by primal and dual reordering methods. 35-45 - Jongheon Lee

, Sokjoon Lee
, You-Seok Lee, Dooho Choi
:
T-depth reduction method for efficient SHA-256 quantum circuit construction. 46-65 - Yongseong Lee

, Jinkeon Kang
, Donghoon Chang, Seokhie Hong:
A preimage attack on reduced GIMLI-HASH with unbalanced squeezing phase. 66-79 - Seonghyuck Lim

, Dong-Guk Han
:
Experimental evaluation of differential fault attack on lightweight block cipher PIPO. 80-88 - Yi Fei Chen, Rahul Punchhi, Mahesh Tripunitara

:
The poor usability of OpenLDAP Access Control Lists. 89-101 - Zhengbin Zhu

, Qinrang Liu, Dongpei Liu, Chenyang Ge, Chong Wang:
MHSDN: A Hierarchical Software Defined Network Reliability Framework design. 102-117 - Yafei Wu, Jian Shi, Peicheng Wang, Dongrui Zeng, Cong Sun:

DeepCatra: Learning flow- and graph-based behaviours for Android malware detection. 118-130 - Rentaro Shiba

, Ravi Anand, Kazuhiko Minematsu, Takanori Isobe:
Cubicle: A family of space-hard ciphers for IoT. 131-146 - Jun Liu

, Dachao Wang, Yupu Hu, Jie Chen
, Baocang Wang
:
Improved integral cryptanalysis of SPNbox in digital rights management systems. 147-158
Volume 17, Number 2, March 2023
- Ayoub Otmani, Christophe Petit

, Mehdi Tibouchi
:
Guest Editorial: Guest Editorial on Cryptanalysis of (NIST PQC) post-quantum proposals. 159-160 - Péter Kutas

, Christophe Petit:
Torsion point attacks on 'SIDH-like' cryptosystems. 161-170 - Jean-François Biasse

, Xavier Bonnetain, Elena Kirshanova
, André Schrottenloher, Fang Song
:
Quantum algorithms for attacking hardness assumptions in classical and post-quantum cryptography. 171-209 - Yasuhiko Ikematsu

, Shuhei Nakamura, Tsuyoshi Takagi:
Recent progress in the security evaluation of multivariate public-key cryptography. 210-226 - Anyu Wang

, Dianyan Xiao, Yang Yu
:
Lattice-based cryptosystems in standardisation processes: A survey. 227-243 - Yi-feng Wang

, Yuanbo Guo, Chen Fang:
A semantic-based method for analysing unknown malicious behaviours via hyper-spherical variational auto-encoders. 244-254 - Mingjun Dai, Haiyan Deng, Xiaofeng Li, Gongchao Su, Zhonghao Zhang:

Robust private information retrieval for low encoding/decoding complexity distributed storage. 255-268 - Junyu Ren

, Haibin Wan, Chaoyang Zhu, Tuanfa Qin:
Stacking ensemble learning with heterogeneous models and selected feature subset for prediction of service trust in internet of medical things. 269-288 - Zhixiong Chen

, Vladimir Edemskiy
, Zhihua Niu
, Yuqi Sang
:
Arithmetic correlation of binary half- ℓ -sequences. 289-293 - Faiz Ul Islam

, Guangjie Liu
, Weiwei Liu
, Qazi Mazhar ul Haq
:
A deep learning-based framework to identify and characterise heterogeneous secure network traffic. 294-308 - Zhe Xia

, Yu Yang, Fuyou Miao:
Comments on 'Chinese Remainder Theorem-based centralised group key management for secure multicast communication'. 309-314
Volume 17, Number 3, May 2023
Original Research
- Sahar Lazim Qaddoori

, Qutaiba Ibrahim Ali
:
An embedded intrusion detection and prevention system for home area networks in advanced metering infrastructure. 315-334 - Jiajie Liu

, Bing Sun, Chao Li:
Design and cryptanalysis of a new iterative structure. 335-346 - Dongdong Lin

, Manman Li
, Zezhou Hou
, Shaozhen Chen
:
Conditional differential analysis on the KATAN ciphers based on deep learning. 347-359 - Meng Yue, Silin Peng

, Wenzhi Feng:
MF-RF: A detection approach based on multi-features and random forest algorithm for improved collusive interest flooding attack. 360-376 - Ngoc-Tuan Do

, Van-Phuc Hoang
, Van-Sang Doan
, Cong-Kha Pham
:
On the performance of non-profiled side channel attacks based on deep learning techniques. 377-393 - Junling Pei

, Lusheng Chen:
Preimage attacks on reduced-round Keccak hash functions by solving algebraic systems. 394-406 - Jiamei Liu, Lin Tan

, Hong Xu
:
Improved related-tweakey rectangle attacks on round-reduced Deoxys-BC. 407-422 - Manoj Kumar Prabakaran

, Parvathy Meenakshi Sundaram
, Abinaya Devi Chandrasekar
:
An enhanced deep learning-based phishing detection mechanism to effectively identify malicious URLs using variational autoencoders. 423-440 - Fabio Massimo Zennaro

, László Erdodi:
Modelling penetration testing with reinforcement learning using capture-the-flag challenges: Trade-offs between model-free learning and a priori knowledge. 441-457 - Takuro Shiraya

, Nobuyuki Takeuchi, Kosei Sakamoto, Takanori Isobe:
MILP-based security evaluation for AEGIS/Tiaoxin-346/Rocca. 458-467 - Akiko Inoue

, Chun Guo
, Kazuhiko Minematsu
:
Nonce-misuse resilience of Romulus-N and GIFT-COFB. 468-484 - Zibo Zhou

, Zongyang Zhang
, Hongyu Tao, Tianyu Li, Boyu Zhao
:
Efficient inner product arguments and their applications in range proofs. 485-504 - Wei Bai

, Angxuan Cheng, Cailing Wang, Zhisong Pan:
A fast user actual privilege reasoning framework based on privilege dependency graph reduction. 505-517 - Munir Geden

, Kasper Rasmussen:
Hardware-assisted remote attestation design for critical embedded systems. 518-533 - Zhangjun Ma

, Manman Li, Shaozhen Chen:
Meet-in-the-middle attacks on round-reduced CRAFT based on automatic search. 534-543
Comment
- Sonia Miri, Masoud Kaveh, Hadi Shahriar Shahhoseini, Mohammad Reza Mosavi

, Saeed Aghapour:
On the security of 'an ultra-lightweight and secure scheme for communications of smart metres and neighbourhood gateways by utilisation of an ARM Cortex-M microcontroller'. 544-551
Volume 17, Number 4, July 2023
Original Research
- Ángel Luis Perales Gómez

, Lorenzo Fernández Maimó, Alberto Huertas Celdrán
, Félix J. García Clemente:
An interpretable semi-supervised system for detecting cyberattacks using anomaly detection in industrial scenarios. 553-566 - Zhe Jiang, Xiwen Wang

, Kai Zhang
, Junqing Gong, Jie Chen, Haifeng Qian:
Revocable identity-based matchmaking encryption in the standard model. 567-581 - Cong Sun

, Xinpeng Xu, Yafei Wu, Dongrui Zeng, Gang Tan, Siqi Ma
, Peicheng Wang:
CryptoEval: Evaluating the risk of cryptographic misuses in Android apps with data-flow analysis. 582-597 - Liukun He, Liang-Min Wang, Keyang Cheng, Yifan Xu:

FlowMFD: Characterisation and classification of tor traffic using MFD chromatographic features and spatial-temporal modelling. 598-615 - Shion Utsumi

, Kosei Sakamoto, Takanori Isobe:
Bit-level evaluation of piccolo block cipher by satisfiability problem solver. 616-625 - Yanbin Xu, Yonglin Hao

, Mingxing Wang:
Revisit two memoryless state-recovery cryptanalysis methods on A5/1. 626-638 - Navid Vafaei, Hadi Soleimany

, Nasour Bagheri
:
Exploiting statistical effective fault attack in a blind setting. 639-646 - Degang Li

, Yang Yang, Guang Zeng:
Search framework for neutral bits and boomerangs in SHA-1 collision attacks. 647-663 - Kexin Hu

, Zhenfeng Zhang, Kaiwen Guo, Weiyu Jiang, Xiaoman Li, Jiang Han:
An optimisation for a two-round good-case latency protocol. 664-680 - Saha Reno

, Md. Mokammel Haque
:
Solving blockchain trilemma using off-chain storage protocol. 681-702 - Tong Li

, Chuanyong Song, Qinyu Pang:
Defending against social engineering attacks: A security pattern-based analysis framework. 703-726

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














