IET Information Security
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
Inhaltsverzeichnis
- 177
-
Efficient methods to generate cryptographically significant binary diffusion layersAkleylek, Sedat / Rijmen, Vincent / Sakallı, Muharrem Tolga et al. | 2017
- 188
-
Robust profiled attacks: should the adversary trust the dataset?Lerman, Liran / Martinasek, Zdenek / Markowitch, Olivier et al. | 2017
- 195
-
Note on scalar multiplication using division polynomialsChen, Binglong / Hu, Chuangqiang / Zhao, Chang-An et al. | 2017
- 199
-
Construction of resilient S-boxes with higher-dimensional vectorial outputs and strictly almost optimal non-linearityZhang, WeiGuo / Li, LuYang / Pasalic, Enes et al. | 2017
- 204
-
Private reputation retrieval in public – a privacy-aware announcement scheme for VANETsChen, Liqun / Li, Qin / Martin, Keith M. et al. | 2017
- 211
-
Cheating prevention visual cryptography scheme using Latin squareRen, Yawei / Liu, Feng / Guo, Teng et al. | 2017
- 220
-
Comment on ‘Efficient and secure dynamic ID-based remote user authentication scheme for distributed systems using smart cards’Goutham Reddy, Alavalapati / Yoon, Eun-Jun / Yoo, Kee-Young et al. | 2017