


default search action
IET Information Security, Volume 2
Volume 2, Number 1, 2008
- Gilles Piret, François-Xavier Standaert

:
Security analysis of higher-order Boolean masking schemes for block ciphers (with conditions of perfect masking). 1-11 - Gautam Biswas:

Diffie-Hellman technique: extended to multiple two-party keys and one multi-party key. 12-18
Volume 2, Number 2, 2008
- Nigel P. Smart, Elisabeth Oswald

, Daniel Page:
Randomised representations. 19-27 - Behnam Bahrak, Mohammad Reza Aref:

Impossible differential attack on seven-round AES-128. 28-32 - Chin-Chen Chang, Chia-Chen Lin

, Yi-Hui Chen:
Reversible data-embedding scheme using differences between original and predicted pixel values. 35-46 - Mihir Bellare, Sarah Shoup:

Two-tier signatures from the Fiat-Shamir transform, with applications to strongly unforgeable and one-time signatures. 47-63
Volume 2, Number 3, 2008
- Michel Abdalla

, Eike Kiltz
, Gregory Neven:
Generalised key delegation for hierarchical identity-based encryption. 67-78 - Lukasz Krzywiecki

, Miroslaw Kutylowski, Maciej Nikodem
:
General anonymous key broadcasting via Lagrangian interpolation. 79-84 - Emmanuel Bresson, Mark Manulis

:
Contributory group key exchange in the presence of malicious participants. 85-93 - Julie Ferrigno, Martin Hlavác:

When AES blinks: introducing optical side channel. 94-98
Volume 2, Number 4, 2008
- Christophe Tartary, Sujing Zhou, Dongdai Lin, Huaxiong Wang, Josef Pieprzyk

:
Analysis of bilinear pairing-based accumulator for identity escrowing. 99-107 - Shivaramakrishnan Narayan, Udaya Parampalli

:
Efficient identity-based signatures in the standard model. 108-118 - M. Jayalakshmi, Shabbir N. Merchant, Uday B. Desai:

Optimum retrieval of watermark from wavelet significant coefficients. 119-128 - Hafiz Malik

, Rashid Ansari, Ashfaq A. Khokhar:
Robust audio watermarking using frequency-selective spread spectrum. 129-150 - Feng Liu, Chuan Kun Wu, Xi Jun Lin:

Colour visual cryptography schemes. 151-165

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














