Found: 7
Select item for more details and to access through your institution.
Dynamic cube attack on Grain‐v1.
- Published in:
- IET Information Security (Wiley-Blackwell), 2016, v. 10, n. 4, p. 165, doi. 10.1049/iet-ifs.2014.0239
- By:
- Publication type:
- Article
Leakage‐resilient message authentication code scheme based on hidden identity weak hash proof system.
- Published in:
- IET Information Security (Wiley-Blackwell), 2016, v. 10, n. 4, p. 173, doi. 10.1049/iet-ifs.2014.0579
- By:
- Publication type:
- Article
Effective certificate revocation scheme based on weighted voting game approach.
- Published in:
- IET Information Security (Wiley-Blackwell), 2016, v. 10, n. 4, p. 180, doi. 10.1049/iet-ifs.2015.0047
- By:
- Publication type:
- Article
Privacy failure in the public‐key distance‐bounding protocols.
- Published in:
- IET Information Security (Wiley-Blackwell), 2016, v. 10, n. 4, p. 188, doi. 10.1049/iet-ifs.2014.0616
- By:
- Publication type:
- Article
Cryptanalysis of McEliece cryptosystem variants based on quasi‐cyclic low‐density parity check codes.
- Published in:
- IET Information Security (Wiley-Blackwell), 2016, v. 10, n. 4, p. 194, doi. 10.1049/iet-ifs.2015.0064
- By:
- Publication type:
- Article
Design and formal verification of a cloud compliant secure logging mechanism.
- Published in:
- IET Information Security (Wiley-Blackwell), 2016, v. 10, n. 4, p. 203, doi. 10.1049/iet-ifs.2014.0625
- By:
- Publication type:
- Article
Multidimensional zero‐correlation linear cryptanalysis of the block cipher KASUMI.
- Published in:
- IET Information Security (Wiley-Blackwell), 2016, v. 10, n. 4, p. 215, doi. 10.1049/iet-ifs.2014.0543
- By:
- Publication type:
- Article