11. Double Batch for RLWE‐Based Leveled Fully Homomorphic Encryption. Issue 3 (1st July 2015) Authors: Chen, Hu; Hu, Yupu; Lian, Zhizhu Journal: Chinese journal of electronics Issue: Volume 24:Issue 3(2015) Page Start: 661 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
12. Comments on 'Fair (t, n) threshold secret sharing scheme'. Issue 6 (1st November 2014) Authors: Harn, Lein Journal: IET information security Issue: Volume 8:Issue 6(2014) Page Start: 303 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
13. Dynamic reencryption of return addresses. (1st January 2019) Authors: Lee, Hyungyu; Pyo, Changwoo; Lee, Gyungho Journal: IET information security Issue: Volume 13:Number 1(2019) Page Start: 76 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
14. Identity‐based encryption resilient to continuous key leakage. (1st September 2019) Authors: Zhou, Yanwei; Yang, Bo; Mu, Yi; Wang, Tao; Wang, Xin Journal: IET information security Issue: Volume 13:Number 5(2019) Page Start: 426 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
15. Automatic Search of Threshold Implementations of 4‐Bit S‐Boxes Resisting DPA. Issue 1 (1st January 2017) Authors: Liu, Bozhong; Gong, Zheng; Qiu, Weidong Journal: Chinese journal of electronics Issue: Volume 26:Issue 1(2017) Page Start: 93 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
16. Probing attack of share‐serial threshold implementation of advanced encryption standard. Issue 9 (1st May 2019) Authors: Sugawara, T.; Li, Y.; Sakiyama, K. Journal: Electronics letters Issue: Volume 55:Issue 9(2019) Page Start: 517 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
17. How to construct a verifiable multi‐secret sharing scheme based on graded encoding schemes. (1st July 2019) Authors: Hadian Dehkordi, Massoud; Oraei, Hossein Journal: IET information security Issue: Volume 13:Number 4(2019) Page Start: 343 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
18. Security evaluation on Simeck against zero‐correlation linear cryptanalysis. (1st January 2018) Authors: Zhang, Kai; Guan, Jie; Hu, Bin; Lin, Dongdai Journal: IET information security Issue: Volume 12:Number 1(2018) Page Start: 87 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
19. Related‐Key Impossible Differential Cryptanalysis of LBlock. Issue 1 (1st January 2017) Authors: Xie, Minm; Li, Jingjing; Zang, Yuechuan Journal: Chinese journal of electronics Issue: Volume 26:Issue 1(2017) Page Start: 35 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
20. Degenerate curve attacks: extending invalid curve attacks to Edwards curves and other models. (1st May 2018) Authors: Neves, Samuel; Tibouchi, Mehdi Journal: IET information security Issue: Volume 12:Number 3(2018) Page Start: 217 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗