<![CDATA[ Information Security, IET - new TOC ]]>
http://ieeexplore.ieee.org
TOC Alert for Publication# 4149673 2014October 30<![CDATA[Cryptanalysis of the dragonfly key exchange protocol]]>86283289280<![CDATA[Group-based key array authentication protocol in radio frequency identification systems]]>86290296225<![CDATA[Families of rotation symmetric functions with useful cryptographic properties]]>GF(2)^{n} to GF(2)^{m}] which are k-rotation symmetric and they give two infinite families of such functions which are permutations with the maximum possible algebraic degree. The families of functions that they give provide a source, which can be searched for functions with other useful cryptographic properties.]]>86297302142<![CDATA[Comments on 'fair (t, n) threshold secret sharing scheme']]>et al. have proposed a fair (t, n) threshold secret sharing scheme recently. Three attacks have been introduced and analysed in this study. Among them, two attacks are associated with a synchronous network where the shares are released simultaneously, and one attack is associated with an asynchronous network where the shares are released asynchronously. In this study, the authors want to point out that the scheme only works properly in a synchronous network; but not in an asynchronous network. In other words, Theorem 3 in their paper which was associated with the attack in an asynchronous network is incorrect.]]>8630330464