Works matching IS 17518709 AND DT 2017 AND VI 11 AND IP 2
Results: 8
Analysing recursive preprocessing of BKZ lattice reduction algorithm.
- Published in:
- IET Information Security (Wiley-Blackwell), 2017, v. 11, n. 2, p. 114, doi. 10.1049/iet-ifs.2016.0049
- By:
- Publication type:
- Article
Hybrid mechanism towards network packet early acceptance and rejection for unified threat management.
- Published in:
- IET Information Security (Wiley-Blackwell), 2017, v. 11, n. 2, p. 104, doi. 10.1049/iet-ifs.2015.0246
- By:
- Publication type:
- Article
Improved meet‐in‐the‐middle attacks on Crypton and mCrypton.
- Published in:
- IET Information Security (Wiley-Blackwell), 2017, v. 11, n. 2, p. 97, doi. 10.1049/iet-ifs.2015.0518
- By:
- Publication type:
- Article
Searching all truncated impossible differentials in SPN.
- Published in:
- IET Information Security (Wiley-Blackwell), 2017, v. 11, n. 2, p. 89, doi. 10.1049/iet-ifs.2015.0052
- By:
- Publication type:
- Article
Lightweight and integrity‐protecting oriented data aggregation scheme for wireless sensor networks.
- Published in:
- IET Information Security (Wiley-Blackwell), 2017, v. 11, n. 2, p. 82, doi. 10.1049/iet-ifs.2015.0387
- By:
- Publication type:
- Article
Highly nonlinear plateaued functions.
- Published in:
- IET Information Security (Wiley-Blackwell), 2017, v. 11, n. 2, p. 78, doi. 10.1049/iet-ifs.2016.0131
- By:
- Publication type:
- Article
High‐performance and high‐speed implementation of polynomial basis Itoh–Tsujii inversion algorithm over GF(2<sup>m</sup>).
- Published in:
- IET Information Security (Wiley-Blackwell), 2017, v. 11, n. 2, p. 66, doi. 10.1049/iet-ifs.2015.0461
- By:
- Publication type:
- Article
Design of new scan orders for perceptual encryption of H.264/AVC videos.
- Published in:
- IET Information Security (Wiley-Blackwell), 2017, v. 11, n. 2, p. 55, doi. 10.1049/iet-ifs.2015.0492
- By:
- Publication type:
- Article