1. Improved Known‐Key Distinguisher on Round‐Reduced 3D Block Cipher. Issue 1 (1st January 2015) Authors: Zha, Daren; Wu, Shuang; Wang, Qiongxiao Journal: Chinese journal of electronics Issue: Volume 24:Issue 1(2015) Page Start: 199 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. Correlation template matching CPA method. Issue 15 (1st July 2016) Authors: Akalp Kuzu, E.; Tangel, A. Journal: Electronics letters Issue: Volume 52:Issue 15(2016) Page Start: 1306 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. Fault Analysis on a New Block Cipher DBlock with at Most Two Fault Injections. Issue 6 (1st November 2018) Authors: Feng, Jingyi; Chen, Hua; Gao, Si; Cao, Weiqiong; Fan, Limin; Zhu, Shaofeng Journal: Chinese journal of electronics Issue: Volume 27:Issue 6(2018) Page Start: 1277 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. Observations on the truncated differential of SP block ciphers and their applications to mCrypton and CRYPTON V1.0. (1st September 2018) Authors: Yang, Dong; Qi, Wen‐Feng; Chen, Hua‐Jin Journal: IET information security Issue: Volume 12:Number 5(2018) Page Start: 419 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. Watch your constants: malicious Streebog. Issue 6 (1st November 2015) Authors: AlTawy, Riham; Youssef, Amr M. Journal: IET information security Issue: Volume 9:Issue 6(2015) Page Start: 328 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. Integral distinguishers for Grøstl‐512 and Kupyna‐512 permutation functions. (1st January 2020) Authors: Li, Rongjia; Jin, Chenhui; Pan, Hongchen Journal: IET information security Issue: Volume 14:Number 1(2020) Page Start: 126 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. New chaotic encryption algorithm based on chaotic sequence and plain text. Issue 3 (1st May 2014) Authors: Wang, Xing‐Yuan; Gu, Sheng‐Xian Journal: IET information security Issue: Volume 8:Issue 3(2014) Page Start: 213 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. Conditional differential attacks on Grain‐128a stream cipher. (1st May 2017) Authors: Ma, Zhen; Tian, Tian; Qi, Wen‐Feng Journal: IET information security Issue: Volume 11:Number 3(2017) Page Start: 139 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. Publicly verifiable multi‐secret sharing scheme from bilinear pairings. Issue 3 (1st September 2013) Authors: Wu, Tsu‐Yang; Tseng, Yuh‐Min Journal: IET information security Issue: Volume 7:Issue 3(2013) Page Start: 239 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
10. Meet‐in‐the‐middle attacks on round‐reduced tweakable block cipher Deoxys‐BC. (1st January 2019) Authors: Li, Rongjia; Jin, Chenhui Journal: IET information security Issue: Volume 13:Number 1(2019) Page Start: 70 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗