Abstract is missing.
- Biclique Cryptanalysis of Full Round AES-128 Based Hashing ModesDonghoon Chang, Mohona Ghosh, Somitra Kumar Sanadhya. 3-21 [doi]
- Hashing into Generalized Huff CurvesXiaoyang He, Wei Yu 0008, Kunpeng Wang. 22-44 [doi]
- Cubic Unbalance Oil and Vinegar Signature SchemeXuyun Nie, Bo Liu, Hu Xiong, Gang Lu. 47-56 [doi]
- Two Approaches to Build UOV Variants with Shorter Private Key and Faster Signature GenerationYang Tan, Shaohua Tang. 57-74 [doi]
- A Secure Variant of Yasuda, Takagi and Sakurai's Signature SchemeWenbin Zhang, Chik-How Tan. 75-89 [doi]
- Statistical and Algebraic Properties of DESStian Fauskanger, Igor A. Semaev. 93-107 [doi]
- Accurate Estimation of the Full Differential Distribution for General Feistel StructuresJiageng Chen, Atsuko Miyaji, Chunhua Su, Jesen Teh. 108-124 [doi]
- Improved Zero-Correlation Cryptanalysis on SIMONLing Sun, Kai Fu, Meiqin Wang. 125-143 [doi]
- A New Cryptographic Analysis of 4-bit S-BoxesLing Cheng, Wentao Zhang, Zejun Xiang. 144-164 [doi]
- 2)Jincheng Zhuang, Qi Cheng. 167-177 [doi]
- Recovering a Sum of Two Squares Decomposition RevisitedXiaona Zhang, Li-Ping Wang, Jun Xu, Lei Hu, Liqiang Peng, Zhangjie Huang, Zeyi Liu. 178-192 [doi]
- Improved Tripling on Elliptic CurvesWeixuan Li, Wei Yu 0008, Kunpeng Wang. 193-205 [doi]
- An Approach for Mitigating Potential Threats in Practical SSO SystemsMenghao Li, Liang Yang, Zimu Yuan, Rui Zhang 0016, Rui Xue. 209-226 [doi]
- EQPO: Obscuring Encrypted Web Traffic with Equal-Sized Pseudo-ObjectsYi Tang, Manjia Lin. 227-245 [doi]
- A Blind Dual Color Images Watermarking Method via SVD and DNA SequencesXiangjun Wu, Haibin Kan. 246-259 [doi]
- On the Application of Clique Problem for Proof-of-Work in CryptocurrenciesSamiran Bag, Sushmita Ruj, Kouichi Sakurai. 260-279 [doi]
- Proxy Provable Data Possession with General Access Structure in Public CloudsHuaqun Wang, Debiao He. 283-300 [doi]
- A Provable Data Possession Scheme with Data Hierarchy in CloudChanglu Lin, Fucai Luo, Huaxiong Wang, Yan Zhu. 301-321 [doi]
- Threshold Broadcast Encryption with Keyword SearchShiwei Zhang, Yi Mu, Guomin Yang. 322-337 [doi]
- Secret Sharing Schemes with General Access StructuresJian Liu, Sihem Mesnager, Lusheng Chen. 341-360 [doi]
- CCA Secure Public Key Encryption Scheme Based on LWE Without Gaussian SamplingXiaochao Sun, Bao Li, Xianhui Lu, Fuyang Fang. 361-378 [doi]
- Slow Motion Zero Knowledge Identifying with Colliding CommitmentsHouda Ferradi, Rémi Géraud, David Naccache. 381-396 [doi]
- Multi-client Outsourced ComputationPeili Li, Haixia Xu, Yuanyuan Ji. 397-409 [doi]
- Privacy-Enhanced Data Collection Scheme for Smart-MeteringJan Hajny, Petr Dzurenda, Lukas Malina. 413-429 [doi]
- A Secure Architecture for Operating System-Level Virtualization on Mobile DevicesManuel Huber, Julian Horsch, Michael Velten, Michael Weiß, Sascha Wessel. 430-450 [doi]
- Assessing the Disclosure of User Profile in Mobile-Aware ServicesDaiyong Quan, Lihuan Yin, Yunchuan Guo. 451-467 [doi]
- Interactive Function Identification Decreasing the Effort of Reverse EngineeringFatih Kiliç, Hannes Laner, Claudia Eckert. 468-487 [doi]