Works matching IS 17518709 AND DT 2023 AND VI 17 AND IP 3
Results: 16
Meet‐in‐the‐middle attacks on round‐reduced CRAFT based on automatic search.
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 3, p. 534, doi. 10.1049/ise2.12114
- By:
- Publication type:
- Article
Hardware‐assisted remote attestation design for critical embedded systems.
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 3, p. 518, doi. 10.1049/ise2.12113
- By:
- Publication type:
- Article
A fast user actual privilege reasoning framework based on privilege dependency graph reduction.
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 3, p. 505, doi. 10.1049/ise2.12112
- By:
- Publication type:
- Article
Efficient inner product arguments and their applications in range proofs.
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 3, p. 485, doi. 10.1049/ise2.12111
- By:
- Publication type:
- Article
Nonce‐misuse resilience of Romulus‐N and GIFT‐COFB.
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 3, p. 468, doi. 10.1049/ise2.12110
- By:
- Publication type:
- Article
MILP‐based security evaluation for AEGIS/Tiaoxin‐346/Rocca.
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 3, p. 458, doi. 10.1049/ise2.12109
- By:
- Publication type:
- Article
On the security of 'an ultra‐lightweight and secure scheme for communications of smart metres and neighbourhood gateways by utilisation of an ARM Cortex‐M microcontroller'.
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 3, p. 544, doi. 10.1049/ise2.12108
- By:
- Publication type:
- Article
Modelling penetration testing with reinforcement learning using capture‐the‐flag challenges: Trade‐offs between model‐free learning and a priori knowledge.
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 3, p. 441, doi. 10.1049/ise2.12107
- By:
- Publication type:
- Article
An enhanced deep learning‐based phishing detection mechanism to effectively identify malicious URLs using variational autoencoders.
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 3, p. 423, doi. 10.1049/ise2.12106
- By:
- Publication type:
- Article
Improved related‐tweakey rectangle attacks on round‐reduced Deoxys‐BC.
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 3, p. 407, doi. 10.1049/ise2.12104
- By:
- Publication type:
- Article
Preimage attacks on reduced‐round Keccak hash functions by solving algebraic systems.
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 3, p. 394, doi. 10.1049/ise2.12103
- By:
- Publication type:
- Article
On the performance of non‐profiled side channel attacks based on deep learning techniques.
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 3, p. 377, doi. 10.1049/ise2.12102
- By:
- Publication type:
- Article
MF‐RF: A detection approach based on multi‐features and random forest algorithm for improved collusive interest flooding attack.
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 3, p. 360, doi. 10.1049/ise2.12100
- By:
- Publication type:
- Article
Conditional differential analysis on the KATAN ciphers based on deep learning.
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 3, p. 347, doi. 10.1049/ise2.12099
- By:
- Publication type:
- Article
Design and cryptanalysis of a new iterative structure.
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 3, p. 335, doi. 10.1049/ise2.12098
- By:
- Publication type:
- Article
An embedded intrusion detection and prevention system for home area networks in advanced metering infrastructure.
- Published in:
- IET Information Security (Wiley-Blackwell), 2023, v. 17, n. 3, p. 315, doi. 10.1049/ise2.12097
- By:
- Publication type:
- Article