Works matching IS 17518709 AND DT 2022 AND VI 16 AND IP 3
Results: 6
On the upper bound of squared correlation of SIMON‐like functions and its applications.
- Published in:
- IET Information Security (Wiley-Blackwell), 2022, v. 16, n. 3, p. 220, doi. 10.1049/ise2.12057
- By:
- Publication type:
- Article
Cryptanalysis of FRS obfuscation based on the CLT13 multilinear map.
- Published in:
- IET Information Security (Wiley-Blackwell), 2022, v. 16, n. 3, p. 208, doi. 10.1049/ise2.12055
- By:
- Publication type:
- Article
TR‐AKA: A two‐phased, registered authentication and key agreement protocol for 5G mobile networks.
- Published in:
- IET Information Security (Wiley-Blackwell), 2022, v. 16, n. 3, p. 193, doi. 10.1049/ise2.12054
- By:
- Publication type:
- Article
Efficient constructions for large‐state block ciphers based on AES New Instructions.
- Published in:
- IET Information Security (Wiley-Blackwell), 2022, v. 16, n. 3, p. 145, doi. 10.1049/ise2.12053
- By:
- Publication type:
- Article
PCA mix‐based Hotelling's T<sup>2</sup> multivariate control charts for intrusion detection system.
- Published in:
- IET Information Security (Wiley-Blackwell), 2022, v. 16, n. 3, p. 161, doi. 10.1049/ise2.12051
- By:
- Publication type:
- Article
An optimal defensive deception framework for the container‐based cloud with deep reinforcement learning.
- Published in:
- IET Information Security (Wiley-Blackwell), 2022, v. 16, n. 3, p. 178, doi. 10.1049/ise2.12050
- By:
- Publication type:
- Article