Related Key Chosen IV Attack on Grain-128a Stream Cipher http://dx.doi.org/10.1109/TIFS.2013.2256419 ........ .... L. Ding and J. Guan Exploiting Vulnerabilities in Cryptographic Hash Functions Based on Reconfigurable Hardware http://dx.doi.org/10.1109/TIFS.2013.2256898 ...... ......... ......... ........ ... ...... ......... ........ ......... .... A. Cilardo and N. Mazzocca Maintaining Hard Disk Integrity With Digital Legal Professional Privilege (LPP) Data http://dx.doi.org/10.1109/TIFS.2013.2256784 ...... .. .. ........ ......... ......... ........ ......... ......... ........ ......... ......... ........ ......... ......... ........ ...... Z. L. Jiang, J. Fang, F. Y. W. Law, P. K. Y. Lai, R. S. C. Ieong, M. Y. K. Kwan, K. P. Chow, L. C. K. Hui, S. M. Yiu, and K. H. Pun www.signalprocessingsociety.org [17] JULY 2013 803 810 821http://dx.doi.org/10.1109/TIFS.2013.2256419 http://dx.doi.org/10.1109/TIFS.2013.2256898 http://dx.doi.org/10.1109/TIFS.2013.2256784 http://www.signalprocessingsociety.org