Works matching IS 17518709 AND DT 2023 AND VI 17 AND IP 1
Results: 12
Guest Editorial: Selected papers from the 24th International Conference on Information Security and Cryptology (ICISC 2021).
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 1, p. 1, doi. 10.1049/ise2.12096
- By:
- Publication type:
- Article
Efficient module learning with errors‐based post‐quantum password‐authenticated key exchange.
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 1, p. 3, doi. 10.1049/ise2.12094
- By:
- Publication type:
- Article
Improved lattice‐based mix‐nets for electronic voting.
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 1, p. 18, doi. 10.1049/ise2.12089
- By:
- Publication type:
- Article
Improved integral cryptanalysis of SPNbox in digital rights management systems.
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 1, p. 147, doi. 10.1049/ise2.12087
- By:
- Publication type:
- Article
Cubicle : A family of space‐hard ciphers for IoT.
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 1, p. 131, doi. 10.1049/ise2.12086
- By:
- Publication type:
- Article
Improved lattice enumeration algorithms by primal and dual reordering methods.
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 1, p. 35, doi. 10.1049/ise2.12083
- By:
- Publication type:
- Article
MHSDN: A Hierarchical Software Defined Network Reliability Framework design.
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 1, p. 102, doi. 10.1049/ise2.12080
- By:
- Publication type:
- Article
DeepCatra: Learning flow‐ and graph‐based behaviours for Android malware detection.
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 1, p. 118, doi. 10.1049/ise2.12082
- By:
- Publication type:
- Article
Experimental evaluation of differential fault attack on lightweight block cipher PIPO.
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 1, p. 80, doi. 10.1049/ise2.12078
- By:
- Publication type:
- Article
A preimage attack on reduced GIMLI‐HASH with unbalanced squeezing phase.
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 1, p. 66, doi. 10.1049/ise2.12060
- By:
- Publication type:
- Article
The poor usability of OpenLDAP Access Control Lists.
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 1, p. 89, doi. 10.1049/ise2.12079
- By:
- Publication type:
- Article
T‐depth reduction method for efficient SHA‐256 quantum circuit construction.
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 1, p. 46, doi. 10.1049/ise2.12074
- By:
- Publication type:
- Article