By Topic

Information Security, IET

Issue 2 • Date June 2011

Filter Results

Displaying Results 1 - 5 of 5
  • Cheating resistance and reversibility-oriented secret sharing mechanism

    Publication Year: 2011 , Page(s): 81 - 92
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (1358 KB)  

    The secret-sharing mechanism has been widely applied to the e-commerce, communications and multimedia fields. With sufficient shares, the involved participants can cooperate to reveal secret data. Fraudulent participants, however, may provide a fake shadow in order to fool others. Consequently, cheating prevention has become a critical essential for secret sharing systems. In this article, the aut... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Balanced rotation symmetric boolean functions with maximum algebraic immunity

    Publication Year: 2011 , Page(s): 93 - 99
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (144 KB)  

    Rotation symmetric Boolean functions (RSBFs) that are invariant under circular translation of indices have been used as components of different cryptosystems. In this paper, even-variable-balanced RSBFs with maximum algebraic immunity (AI) are investigated. At first, we give an original construction of 2m-variable-balanced RSBFs with maximum AI. Then we improve the construction to obtain mo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • One for all ?? all for one: unifying standard differential power analysis attacks

    Publication Year: 2011 , Page(s): 100 - 110
    Cited by:  Papers (3)
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (454 KB)  

    In this study, the authors examine the relationship between and the efficiency of different approaches to standard (univariate) differential power analysis (DPA) attacks. The authors first show that, when fed with the same assumptions about the target device (i.e. with the same leakage model), the most popular approaches such as using a distance-of-means test, correlation analysis and Bayes attack... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Impossible differential cryptanalysis of SPN ciphers

    Publication Year: 2011 , Page(s): 111 - 120
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (171 KB)  

    Impossible differential cryptanalysis is a very popular tool for analysing the security of modern block ciphers and the core of such attack is based on the existence of impossible differentials. Currently, most methods for finding impossible differentials are based on the miss-in-the-middle technique and they are very ad hoc. In this study, the authors concentrate on substitution-permutatio... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Robust visual cryptography-based watermarking scheme for multiple cover images and multiple owners

    Publication Year: 2011 , Page(s): 121 - 128
    Cited by:  Papers (2)
    Save to Project icon | Click to expandAbstract | PDF file iconPDF (675 KB)  

    Watermarking is a technique to protect the copyright of digital media such as image, text, music and movie. In this study, a robust watermarking scheme for multiple cover images and multiple owners is proposed. The proposed scheme makes use of the visual cryptography (VC) technique, transform domain technique, chaos technique, noise reduction technique and error correcting code technique where the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IET Information Security publishes original research papers in the following areas of information security and cryptography.

Full Aims & Scope

Meet Our Editors

Publisher
IET Research Journals
iet_ifs@theiet.org