IET Information Security

Table of Contents

Table of Contents: 2023

  • IET Information Security -
  • Special Issue
  • Volume 2023
  • - Article ID 8234537
  • - Research Article

A Secure Anonymous Identity-Based Virtual-Space Agreement Method for Crowds-Based Anonymous Communicate Scheme

Kai Lin | Kaiyu Wang | ... | Qindong Sun
  • IET Information Security -
  • Special Issue
  • Volume 2023
  • - Article ID 7171600
  • - Research Article

Similarity Property and Slide Attack of Block Cipher FESH

Yafei Zheng | Wenling Wu
  • IET Information Security -
  • Special Issue
  • Volume 2023
  • - Article ID 6653956
  • - Research Article

Improving the Performance of CPA Attacks for Ciphers Using Parallel Implementation of S-Boxes

Fu Yao | Yongzhuang Wei | ... | Enes Pasalic
  • IET Information Security -
  • Special Issue
  • Volume 2023
  • - Article ID 5323380
  • - Research Article

SAT-Based Security Evaluation for WARP against Linear Cryptanalysis

Jiali Shi | Guoqiang Liu | Chao Li
  • IET Information Security -
  • Special Issue
  • Volume 2023
  • - Article ID 6691726
  • - Research Article

Differential, Linear, and Meet-in-the-Middle Attacks on the Lightweight Block Cipher RBFK

Sugio Nobuyuki
  • IET Information Security -
  • Special Issue
  • Volume 2023
  • - Article ID 9922828
  • - Research Article

Generic Construction of Fully Anonymous Broadcast Authenticated Encryption with Keyword Search with Adaptive Corruptions

Keita Emura
  • IET Information Security -
  • Special Issue
  • Volume 2023
  • - Article ID 8829580
  • - Research Article

Inner-Product Matchmaking Encryption: Bilateral Access Control and Beyond Equality

Qiaohan Chu | Anmin Fu | ... | Jie Chen
  • IET Information Security -
  • Special Issue
  • Volume 2023
  • - Article ID 1377042
  • - Research Article

A Publicly Verifiable Leveled Fully Homomorphic Signcryption Scheme

Zhaoxuan Bian | Fuqun Wang | ... | Kefei Chen
  • IET Information Security -
  • Special Issue
  • Volume 2023
  • - Article ID 9399887
  • - Research Article

Kyber, Saber, and SK-MLWR Lattice-Based Key Encapsulation Mechanisms Model Checking with Maude

Duong Dinh Tran | Kazuhiro Ogata | ... | Ayoub Otmani
  • IET Information Security -
  • Special Issue
  • Volume 2023
  • - Article ID 1821499
  • - Research Article

Bit-Sliced Implementation of SM4 and New Performance Records

Xin Miao | Lu Li | ... | Weijia Wang
  • IET Information Security -
  • Special Issue
  • Volume 2023
  • - Article ID 5604802
  • - Review Article

A Survey of Secure Communications for Satellite Internet Based on Cryptography and Physical Layer Security

Yu Zhang | Shuangrui Zhao | ... | Xiaohong Jiang
  • IET Information Security -
  • Special Issue
  • Volume 2023
  • - Article ID 9006166
  • - Research Article

Cross-Space Conduction Assessment Method of Network Attack Risk under the Strong Coupling Characteristics of Electric Power Cyber Physics

Shenjian Qiu | Jiaxuan Fei | Jian Wang
  • IET Information Security -
  • Special Issue
  • Volume 2023
  • - Article ID 2969432
  • - Research Article

Hardness of Module-LWE with Semiuniform Seeds from Module-NTRU

Wenjuan Jia | Jiang Zhang | Baocang Wang
  • IET Information Security -
  • Special Issue
  • Volume 2023
  • - Article ID 2104380
  • - Research Article

Hardness of (Semiuniform) MLWE with Short Distributions Using the Rényi Divergence

Wenjuan Jia | Baocang Wang
IET Information Security
Publishing Collaboration
More info
IET logo
 Journal metrics
See full report
Acceptance rate14%
Submission to final decision104 days
Acceptance to publication34 days
CiteScore4.000
Journal Citation Indicator0.370
Impact Factor1.4
 Submit Evaluate your manuscript with the free Manuscript Language Checker

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.