default search action
IET Information Security, Volume 2
Volume 2, Number 1, 2008
- Gilles Piret, François-Xavier Standaert:
Security analysis of higher-order Boolean masking schemes for block ciphers (with conditions of perfect masking). 1-11 - Gautam Biswas:
Diffie-Hellman technique: extended to multiple two-party keys and one multi-party key. 12-18
Volume 2, Number 2, 2008
- Nigel P. Smart, Elisabeth Oswald, Daniel Page:
Randomised representations. 19-27 - Behnam Bahrak, Mohammad Reza Aref:
Impossible differential attack on seven-round AES-128. 28-32 - Chin-Chen Chang, Chia-Chen Lin, Yi-Hui Chen:
Reversible data-embedding scheme using differences between original and predicted pixel values. 35-46 - Mihir Bellare, Sarah Shoup:
Two-tier signatures from the Fiat-Shamir transform, with applications to strongly unforgeable and one-time signatures. 47-63
Volume 2, Number 3, 2008
- Michel Abdalla, Eike Kiltz, Gregory Neven:
Generalised key delegation for hierarchical identity-based encryption. 67-78 - Lukasz Krzywiecki, Miroslaw Kutylowski, Maciej Nikodem:
General anonymous key broadcasting via Lagrangian interpolation. 79-84 - Emmanuel Bresson, Mark Manulis:
Contributory group key exchange in the presence of malicious participants. 85-93 - Julie Ferrigno, Martin Hlavác:
When AES blinks: introducing optical side channel. 94-98
Volume 2, Number 4, 2008
- Christophe Tartary, Sujing Zhou, Dongdai Lin, Huaxiong Wang, Josef Pieprzyk:
Analysis of bilinear pairing-based accumulator for identity escrowing. 99-107 - Shivaramakrishnan Narayan, Udaya Parampalli:
Efficient identity-based signatures in the standard model. 108-118 - M. Jayalakshmi, Shabbir N. Merchant, Uday B. Desai:
Optimum retrieval of watermark from wavelet significant coefficients. 119-128 - Hafiz Malik, Rashid Ansari, Ashfaq A. Khokhar:
Robust audio watermarking using frequency-selective spread spectrum. 129-150 - Feng Liu, Chuan Kun Wu, Xi Jun Lin:
Colour visual cryptography schemes. 151-165
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.