Works matching IS 17518709 AND DT 2019 AND VI 13 AND IP 5
Results: 12
Research on highly non‐linear plateaued functions.
- Published in:
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 5, p. 515, doi. 10.1049/iet-ifs.2018.5062
- By:
- Publication type:
- Article
Sigma protocol for faster proof of simultaneous homomorphism relations.
- Published in:
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 5, p. 508, doi. 10.1049/iet-ifs.2018.5167
- By:
- Publication type:
- Article
Escrowed decryption protocols for lawful interception of encrypted data.
- Published in:
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 5, p. 498, doi. 10.1049/iet-ifs.2018.5082
- By:
- Publication type:
- Article
Inline high‐bandwidth network analysis using a robust stream clustering algorithm.
- Published in:
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 5, p. 486, doi. 10.1049/iet-ifs.2018.5287
- By:
- Publication type:
- Article
New method to describe the differential distribution table for large S‐boxes in MILP and its application.
- Published in:
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 5, p. 479, doi. 10.1049/iet-ifs.2018.5284
- By:
- Publication type:
- Article
New zero‐sum distinguishers on full 24‐round Keccak ‐f using the division property.
- Published in:
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 5, p. 469, doi. 10.1049/iet-ifs.2018.5263
- By:
- Publication type:
- Article
Multi‐designated verifiers signature schemes with threshold verifiability: generic pattern and a concrete scheme in the standard model.
- Published in:
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 5, p. 459, doi. 10.1049/iet-ifs.2018.5063
- By:
- Publication type:
- Article
S‐boxes representation and efficiency of algebraic attack.
- Published in:
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 5, p. 448, doi. 10.1049/iet-ifs.2018.5201
- By:
- Publication type:
- Article
Causal analysis of attacks against honeypots based on properties of countries.
- Published in:
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 5, p. 435, doi. 10.1049/iet-ifs.2018.5141
- By:
- Publication type:
- Article
Identity‐based encryption resilient to continuous key leakage.
- Published in:
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 5, p. 426, doi. 10.1049/iet-ifs.2018.5203
- By:
- Publication type:
- Article
ESR analysis over ST‐MRC multi‐input multi‐output Nakagami fading channels.
- Published in:
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 5, p. 420, doi. 10.1049/iet-ifs.2018.5185
- By:
- Publication type:
- Article
Improved guess‐and‐determine attack on TRIVIUM.
- Published in:
- IET Information Security (Wiley-Blackwell), 2019, v. 13, n. 5, p. 411, doi. 10.1049/iet-ifs.2018.5357
- By:
- Publication type:
- Article