31. A New Method for Finding Impossible Differentials of Generalized Feistel Structures. Issue 4 (1st July 2018) Authors: Cui, Ting; Jin, Chenhui; Ma, Jing Journal: Chinese journal of electronics Issue: Volume 27:Issue 4(2018) Page Start: 728 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
32. Hash‐One: a lightweight cryptographic hash function. Issue 5 (1st September 2016) Authors: Megha Mukundan, Puliparambil; Manayankath, Sindhu; Srinivasan, Chungath; Sethumadhavan, Madathil Journal: IET information security Issue: Volume 10:Issue 5(2016) Page Start: 225 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
33. Diffusion and Security Evaluation of Feistel‐PG. Issue 4 (1st July 2017) Authors: Wang, Yanfeng; Wu, Wenling; Zhang, Lei Journal: Chinese journal of electronics Issue: Volume 26:Issue 4(2017) Page Start: 734 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
34. Threshold trapdoor functions and their applications. (1st March 2020) Authors: Tu, Binbin; Chen, Yu; Wang, Xueli Journal: IET information security Issue: Volume 14:Number 2(2020) Page Start: 220 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
35. Implementation flaws in the masking scheme of DPA Contest v4. (1st November 2017) Authors: Veshchikov, Nikita; Guilley, Sylvain Journal: IET information security Issue: Volume 11:Number 6(2017) Page Start: 356 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
36. Provably secure verifiable multi‐stage secret sharing scheme based on monotone span program. (1st November 2017) Authors: Mashhadi, Samaneh; Hadian Dehkordi, Massoud; Kiamari, Niloofar Journal: IET information security Issue: Volume 11:Number 6(2017) Page Start: 326 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
37. More realistic analysis of mass surveillance – security in multi‐surveillant settings. (1st November 2020) Authors: Li, Geng; Liu, Jianwei; Zhang, Zongyang Journal: IET information security Issue: Volume 14:Number 6(2020) Page Start: 641 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
38. Distinguisher and non‐randomness of Grain‐v1 for 112, 114 and 116 initialisation rounds with multiple‐bit difference in IVs. (1st November 2019) Authors: Dalai, Deepak Kumar; Maitra, Subhamoy; Pal, Santu; Roy, Dibyendu Journal: IET information security Issue: Volume 13:Number 6(2019) Page Start: 603 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
39. Improved boomerang attacks on round‐reduced SM3 and keyed permutation of BLAKE‐256. Issue 3 (1st May 2015) Authors: Bai, Dongxia; Yu, Hongbo; Wang, Gaoli; Wang, Xiaoyun Journal: IET information security Issue: Volume 9:Issue 3(2015) Page Start: 167 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
40. Self‐similarity cryptanalysis of the block cipher ITUbee. Issue 3 (1st May 2015) Authors: Soleimany, Hadi Journal: IET information security Issue: Volume 9:Issue 3(2015) Page Start: 179 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗