Login / Signup
IET Inf. Secur.
2007
2013
2017
2023
2007
2023
Keyphrases
Publications
volume 17, number 1, 2023
Jun Liu
,
Dachao Wang
,
Yupu Hu
,
Jie Chen
,
Baocang Wang
Improved integral cryptanalysis of SPNbox in digital rights management systems.
IET Inf. Secur.
17 (1) (2023)
Yongseong Lee
,
Jinkeon Kang
,
Donghoon Chang
,
Seokhie Hong
A preimage attack on reduced GIMLI-HASH with unbalanced squeezing phase.
IET Inf. Secur.
17 (1) (2023)
Jong Hwan Park
Guest Editorial: Selected papers from the 24th International Conference on Information Security and Cryptology (ICISC 2021).
IET Inf. Secur.
17 (1) (2023)
Peixin Ren
,
Xiaozhuo Gu
,
Ziliang Wang
Efficient module learning with errors-based post-quantum password-authenticated key exchange.
IET Inf. Secur.
17 (1) (2023)
Valeh Farzaliyev
,
Jan Willemson
,
Jaan Kristjan Kaasik
Improved lattice-based mix-nets for electronic voting.
IET Inf. Secur.
17 (1) (2023)
Yafei Wu
,
Jian Shi
,
Peicheng Wang
,
Dongrui Zeng
,
Cong Sun
DeepCatra: Learning flow- and graph-based behaviours for Android malware detection.
IET Inf. Secur.
17 (1) (2023)
Yi Fei Chen
,
Rahul Punchhi
,
Mahesh Tripunitara
The poor usability of OpenLDAP Access Control Lists.
IET Inf. Secur.
17 (1) (2023)
Zhengbin Zhu
,
Qinrang Liu
,
Dongpei Liu
,
Chenyang Ge
,
Chong Wang
MHSDN: A Hierarchical Software Defined Network Reliability Framework design.
IET Inf. Secur.
17 (1) (2023)
Kazuki Yamamura
,
Yuntao Wang
,
Eiichiro Fujisaki
Improved lattice enumeration algorithms by primal and dual reordering methods.
IET Inf. Secur.
17 (1) (2023)
Seonghyuck Lim
,
Dong-Guk Han
Experimental evaluation of differential fault attack on lightweight block cipher PIPO.
IET Inf. Secur.
17 (1) (2023)
Jongheon Lee
,
Sokjoon Lee
,
You-Seok Lee
,
Dooho Choi
T-depth reduction method for efficient SHA-256 quantum circuit construction.
IET Inf. Secur.
17 (1) (2023)
Rentaro Shiba
,
Ravi Anand
,
Kazuhiko Minematsu
,
Takanori Isobe
Cubicle: A family of space-hard ciphers for IoT.
IET Inf. Secur.
17 (1) (2023)
volume 17, number 2, 2023
Faiz Ul Islam
,
Guangjie Liu
,
Weiwei Liu
,
Qazi Mazhar ul Haq
A deep learning-based framework to identify and characterise heterogeneous secure network traffic.
IET Inf. Secur.
17 (2) (2023)
Péter Kutas
,
Christophe Petit
Torsion point attacks on 'SIDH-like' cryptosystems.
IET Inf. Secur.
17 (2) (2023)
Zhixiong Chen
,
Vladimir Edemskiy
,
Zhihua Niu
,
Yuqi Sang
-sequences.
IET Inf. Secur.
17 (2) (2023)
Anyu Wang
,
Dianyan Xiao
,
Yang Yu
Lattice-based cryptosystems in standardisation processes: A survey.
IET Inf. Secur.
17 (2) (2023)
Jean-François Biasse
,
Xavier Bonnetain
,
Elena Kirshanova
,
André Schrottenloher
,
Fang Song
Quantum algorithms for attacking hardness assumptions in classical and post-quantum cryptography.
IET Inf. Secur.
17 (2) (2023)
Mingjun Dai
,
Haiyan Deng
,
Xiaofeng Li
,
Gongchao Su
,
Zhonghao Zhang
Robust private information retrieval for low encoding/decoding complexity distributed storage.
IET Inf. Secur.
17 (2) (2023)
Junyu Ren
,
Haibin Wan
,
Chaoyang Zhu
,
Tuanfa Qin
Stacking ensemble learning with heterogeneous models and selected feature subset for prediction of service trust in internet of medical things.
IET Inf. Secur.
17 (2) (2023)
Yifeng Wang
,
Yuanbo Guo
,
Chen Fang
A semantic-based method for analysing unknown malicious behaviours via hyper-spherical variational auto-encoders.
IET Inf. Secur.
17 (2) (2023)
Ayoub Otmani
,
Christophe Petit
,
Mehdi Tibouchi
Guest Editorial: Guest Editorial on Cryptanalysis of (NIST PQC) post-quantum proposals.
IET Inf. Secur.
17 (2) (2023)
Yasuhiko Ikematsu
,
Shuhei Nakamura
,
Tsuyoshi Takagi
Recent progress in the security evaluation of multivariate public-key cryptography.
IET Inf. Secur.
17 (2) (2023)
Zhe Xia
,
Yu Yang
,
Fuyou Miao
Comments on 'Chinese Remainder Theorem-based centralised group key management for secure multicast communication'.
IET Inf. Secur.
17 (2) (2023)
volume 17, number 3, 2023
Wei Bai
,
Angxuan Cheng
,
Cailing Wang
,
Zhisong Pan
A fast user actual privilege reasoning framework based on privilege dependency graph reduction.
IET Inf. Secur.
17 (3) (2023)
Sonia Miri
,
Masoud Kaveh
,
Hadi Shahriar Shahhoseini
,
Mohammad Reza Mosavi
,
Saeed Aghapour
On the security of 'an ultra-lightweight and secure scheme for communications of smart metres and neighbourhood gateways by utilisation of an ARM Cortex-M microcontroller'.
IET Inf. Secur.
17 (3) (2023)
Dongdong Lin
,
Manman Li
,
Zezhou Hou
,
Shaozhen Chen
Conditional differential analysis on the KATAN ciphers based on deep learning.
IET Inf. Secur.
17 (3) (2023)
Jiamei Liu
,
Lin Tan
,
Hong Xu
Improved related-tweakey rectangle attacks on round-reduced Deoxys-BC.
IET Inf. Secur.
17 (3) (2023)
Akiko Inoue
,
Chun Guo
,
Kazuhiko Minematsu
Nonce-misuse resilience of Romulus-N and GIFT-COFB.
IET Inf. Secur.
17 (3) (2023)
Manoj Kumar Prabakaran
,
Parvathy Meenakshi Sundaram
,
Abinaya Devi Chandrasekar
An enhanced deep learning-based phishing detection mechanism to effectively identify malicious URLs using variational autoencoders.
IET Inf. Secur.
17 (3) (2023)
Zibo Zhou
,
Zongyang Zhang
,
Hongyu Tao
,
Tianyu Li
,
Boyu Zhao
Efficient inner product arguments and their applications in range proofs.
IET Inf. Secur.
17 (3) (2023)
Jiajie Liu
,
Bing Sun
,
Chao Li
Design and cryptanalysis of a new iterative structure.
IET Inf. Secur.
17 (3) (2023)
Meng Yue
,
Silin Peng
,
Wenzhi Feng
MF-RF: A detection approach based on multi-features and random forest algorithm for improved collusive interest flooding attack.
IET Inf. Secur.
17 (3) (2023)
Sahar Lazim Qaddoori
,
Qutaiba Ibrahim Ali
An embedded intrusion detection and prevention system for home area networks in advanced metering infrastructure.
IET Inf. Secur.
17 (3) (2023)
Munir Geden
,
Kasper Rasmussen
Hardware-assisted remote attestation design for critical embedded systems.
IET Inf. Secur.
17 (3) (2023)
Zhangjun Ma
,
Manman Li
,
Shaozhen Chen
Meet-in-the-middle attacks on round-reduced CRAFT based on automatic search.
IET Inf. Secur.
17 (3) (2023)
Ngoc-Tuan Do
,
Van-Phuc Hoang
,
Van-Sang Doan
,
Cong-Kha Pham
On the performance of non-profiled side channel attacks based on deep learning techniques.
IET Inf. Secur.
17 (3) (2023)
Takuro Shiraya
,
Nobuyuki Takeuchi
,
Kosei Sakamoto
,
Takanori Isobe
MILP-based security evaluation for AEGIS/Tiaoxin-346/Rocca.
IET Inf. Secur.
17 (3) (2023)
Fabio Massimo Zennaro
,
László Erdodi
Modelling penetration testing with reinforcement learning using capture-the-flag challenges: Trade-offs between model-free learning and a priori knowledge.
IET Inf. Secur.
17 (3) (2023)
Junling Pei
,
Lusheng Chen
Preimage attacks on reduced-round Keccak hash functions by solving algebraic systems.
IET Inf. Secur.
17 (3) (2023)
volume 17, number 4, 2023
Liukun He
,
Liang-Min Wang
,
Keyang Cheng
,
Yifan Xu
FlowMFD: Characterisation and classification of tor traffic using MFD chromatographic features and spatial-temporal modelling.
IET Inf. Secur.
17 (4) (2023)
Ángel Luis Perales Gómez
,
Lorenzo Fernández Maimó
,
Alberto Huertas Celdrán
,
Félix J. García Clemente
An interpretable semi-supervised system for detecting cyberattacks using anomaly detection in industrial scenarios.
IET Inf. Secur.
17 (4) (2023)
Cong Sun
,
Xinpeng Xu
,
Yafei Wu
,
Dongrui Zeng
,
Gang Tan
,
Siqi Ma
,
Peicheng Wang
CryptoEval: Evaluating the risk of cryptographic misuses in Android apps with data-flow analysis.
IET Inf. Secur.
17 (4) (2023)
Saha Reno
,
Md. Mokammel Haque
Solving blockchain trilemma using off-chain storage protocol.
IET Inf. Secur.
17 (4) (2023)
Yanbin Xu
,
Yonglin Hao
,
Mingxing Wang
Revisit two memoryless state-recovery cryptanalysis methods on A5/1.
IET Inf. Secur.
17 (4) (2023)
Kexin Hu
,
Zhenfeng Zhang
,
Kaiwen Guo
,
Weiyu Jiang
,
Xiaoman Li
,
Jiang Han
An optimisation for a two-round good-case latency protocol.
IET Inf. Secur.
17 (4) (2023)
Navid Vafaei
,
Hadi Soleimany
,
Nasour Bagheri
Exploiting statistical effective fault attack in a blind setting.
IET Inf. Secur.
17 (4) (2023)
Zhe Jiang
,
Xiwen Wang
,
Kai Zhang
,
Junqing Gong
,
Jie Chen
,
Haifeng Qian
Revocable identity-based matchmaking encryption in the standard model.
IET Inf. Secur.
17 (4) (2023)
Shion Utsumi
,
Kosei Sakamoto
,
Takanori Isobe
Bit-level evaluation of piccolo block cipher by satisfiability problem solver.
IET Inf. Secur.
17 (4) (2023)
Degang Li
,
Yang Yang
,
Guang Zeng
Search framework for neutral bits and boomerangs in SHA-1 collision attacks.
IET Inf. Secur.
17 (4) (2023)
Tong Li
,
Chuanyong Song
,
Qinyu Pang
Defending against social engineering attacks: A security pattern-based analysis framework.
IET Inf. Secur.
17 (4) (2023)