IET Information Security

Table of Contents

Table of Contents

  • IET Information Security -
  • Special Issue
  • Volume 2024
  • - Article ID 5559522
  • - Research Article

A Blockchain-Based Trustworthy Access Control Scheme for Medical Data Sharing

Canling Wang | Wei Wu | ... | Chuanxin Zhao
  • IET Information Security -
  • Special Issue
  • Volume 2024
  • - Article ID 2786399
  • - Research Article

On Accuracy of Testing Decryption Failure Rate for Encryption Schemes under the LWE Assumption

Lin Wang | Yang Wang | Huiwen Jia
  • IET Information Security -
  • Special Issue
  • Volume 2024
  • - Article ID 5544999
  • - Research Article

Improved Masking Multiplication with PRGs and Its Application to Arithmetic Addition

Bohan Wang | Qian Sui | ... | Weijia Wang
  • IET Information Security -
  • Special Issue
  • Volume 2024
  • - Article ID 8315115
  • - Research Article

MILP/MIQCP-Based Fully Automatic Method of Searching for Differential-Linear Distinguishers for SIMON-Like Ciphers

Yanyan Zhou | Senpeng Wang | Bin Hu
  • IET Information Security -
  • Special Issue
  • Volume 2023
  • - Article ID 8234537
  • - Research Article

A Secure Anonymous Identity-Based Virtual-Space Agreement Method for Crowds-Based Anonymous Communicate Scheme

Kai Lin | Kaiyu Wang | ... | Qindong Sun
  • IET Information Security -
  • Special Issue
  • Volume 2023
  • - Article ID 7171600
  • - Research Article

Similarity Property and Slide Attack of Block Cipher FESH

Yafei Zheng | Wenling Wu
  • IET Information Security -
  • Special Issue
  • Volume 2023
  • - Article ID 6653956
  • - Research Article

Improving the Performance of CPA Attacks for Ciphers Using Parallel Implementation of S-Boxes

Fu Yao | Yongzhuang Wei | ... | Enes Pasalic
  • IET Information Security -
  • Special Issue
  • Volume 2023
  • - Article ID 5323380
  • - Research Article

SAT-Based Security Evaluation for WARP against Linear Cryptanalysis

Jiali Shi | Guoqiang Liu | Chao Li
  • IET Information Security -
  • Special Issue
  • Volume 2023
  • - Article ID 6691726
  • - Research Article

Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK

Sugio Nobuyuki
  • IET Information Security -
  • Special Issue
  • Volume 2023
  • - Article ID 9922828
  • - Research Article

Generic Construction of Fully Anonymous Broadcast Authenticated Encryption with Keyword Search with Adaptive Corruptions

Keita Emura
  • IET Information Security -
  • Special Issue
  • Volume 2023
  • - Article ID 8829580
  • - Research Article

Inner-Product Matchmaking Encryption: Bilateral Access Control and Beyond Equality

Qiaohan Chu | Anmin Fu | ... | Jie Chen
  • IET Information Security -
  • Special Issue
  • Volume 2023
  • - Article ID 1377042
  • - Research Article

A Publicly Verifiable Leveled Fully Homomorphic Signcryption Scheme

Zhaoxuan Bian | Fuqun Wang | ... | Kefei Chen
  • IET Information Security -
  • Special Issue
  • Volume 2023
  • - Article ID 9399887
  • - Research Article

Kyber, Saber, and SK-MLWR Lattice-Based Key Encapsulation Mechanisms Model Checking with Maude

Duong Dinh Tran | Kazuhiro Ogata | ... | Ayoub Otmani
  • IET Information Security -
  • Special Issue
  • Volume 2023
  • - Article ID 1821499
  • - Research Article

Bit-Sliced Implementation of SM4 and New Performance Records

Xin Miao | Lu Li | ... | Weijia Wang
  • IET Information Security -
  • Special Issue
  • Volume 2023
  • - Article ID 5604802
  • - Review Article

A Survey of Secure Communications for Satellite Internet Based on Cryptography and Physical Layer Security

Yu Zhang | Shuangrui Zhao | ... | Xiaohong Jiang
IET Information Security
Publishing Collaboration
More info
IET logo
 Journal metrics
See full report
Acceptance rate14%
Submission to final decision104 days
Acceptance to publication34 days
CiteScore4.000
Journal Citation Indicator0.370
Impact Factor1.4
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.