IET Information Security
Conditional differential analysis on the KATAN ciphers based on deep learning
IET Information Security, EarlyView.
IET Information Security
Design and cryptanalysis of a new iterative structure
IET Information Security, EarlyView.
IET Information Security
An embedded intrusion detection and prevention system for home area networks in advanced metering infrastructure
IET Information Security, EarlyView.
IET Information Security
A deep learning‐based framework to identify and characterise heterogeneous secure network traffic
IET Information Security, Volume 17, Issue 2, Page 294-308, March 2023.
IET Information Security
Efficient module learning with errors‐based post‐quantum password‐authenticated key exchange
IET Information Security, Volume 17, Issue 1, Page 3-17, January 2023.
IET Information Security
Comments on ‘Chinese Remainder Theorem‐based centralised group key management for secure multicast communication’
IET Information Security, Volume 17, Issue 2, Page 309-314, March 2023.
IET Information Security
Arithmetic correlation of binary half‐ℓ‐sequences
IET Information Security, Volume 17, Issue 2, Page 289-293, March 2023.
IET Information Security
Recent progress in the security evaluation of multivariate public‐key cryptography
IET Information Security, Volume 17, Issue 2, Page 210-226, March 2023.
IET Information Security
Quantum algorithms for attacking hardness assumptions in classical and post‐quantum cryptography
IET Information Security, Volume 17, Issue 2, Page 171-209, March 2023.