0 | -- | 0 | Lixue Sun, Chunxiang Xu, Mingwu Zhang, Kefei Chen, Hongwei Li. Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation |
0 | -- | 0 | Jiao Hu, Ruilin Li, Chaojing Tang. A real-time inversion attack on the GMR-2 cipher used in the satellite phones |
0 | -- | 0 | Wenbo Wang, Shuqin Fan. Attacking OpenSSL ECDSA with a small amount of side-channel information |
0 | -- | 0 | Sen Xu, Xiangjun Lu, Kaiyu Zhang, Yang Li, Lei Wang, Weijia Wang, Haihua Gu, Zheng Guo, Junrong Liu, Dawu Gu. Similar operation template attack on RSA-CRT as a case study |
0 | -- | 0 | Wenying Zhang, Guoyong Han. Construction of rotation symmetric bent functions with maximum algebraic degree |
0 | -- | 0 | Ziran Tu, Xiangyong Zeng, Zhiyong Zhang. More permutation polynomials with differential uniformity six |
0 | -- | 0 | Qian Yao. A systematic framework to understand central bank digital currency |
0 | -- | 0 | Ping Zhou, Tao Wang 0008, Xiaoxuan Lou, Xinjie Zhao 0001, Fan Zhang 0010, Shize Guo. Efficient flush-reload cache attack on scalar multiplication based signature algorithm |
0 | -- | 0 | Yanzhao Shen, Dongxia Bai, Hongbo Yu. Improved cryptanalysis of step-reduced SM3 |
0 | -- | 0 | Ying Dong, Yuqing Zhang, Hua Ma, Qianru Wu, Qixu Liu, Kai Wang, Wenjie Wang. An adaptive system for detecting malicious queries in web attacks |
0 | -- | 0 | Gaofei Wu, Nian Li, Yuqing Zhang, Xuefeng Liu. Several classes of negabent functions over finite fields |
0 | -- | 0 | Qianwen Wang, Rongquan Feng, Yan Zhu. Verifiable random functions with Boolean function constraints |
0 | -- | 0 | Libo Wang, Baofeng Wu, Zhuojun Liu, Dongdai Lin. Three new infinite families of bent functions |
0 | -- | 0 | Hui Zeng, Jingjing Yu, Xiangui Kang, Siwei Lyu. Countering JPEG anti-forensics based on noise level estimation |
0 | -- | 0 | Min Dong, Yanli Ren. Efficient and secure outsourcing of bilinear pairings with single server |
0 | -- | 0 | Taek-Young Youn, Ku-Young Chang. Bi-directional and concurrent proof of ownership for stronger storage services with de-duplication |
0 | -- | 0 | Xinjie Zhao 0001, Fan Zhang 0010, Shize Guo, Zheng Gong. Optimal model search for hardware-trojan-based bit-level fault attacks on block ciphers |
0 | -- | 0 | Shixiong Wang, Longjiang Qu, Chao Li 0002, Shaojing Fu. A better bound for implicit factorization problem with shared middle bits |
0 | -- | 0 | Ya Liu, Liang Cheng, Zhiqiang Liu, Wei Li, Qingju Wang, Dawu Gu. Improved meet-in-the-middle attacks on reduced-round Piccolo |
0 | -- | 0 | an Wang, Yu Zhang, Weina Tian, Qian Wang, Guoshuang Zhang, Liehuang Zhu. Right or wrong collision rate analysis without profiling: full-automatic collision fault attack |
0 | -- | 0 | Dongmei Li, Xiaolei Dong, Zhenfu Cao, Haijiang Wang. Privacy-preserving large-scale systems of linear equations in outsourcing storage and computation |
0 | -- | 0 | Wei Li, Vincent Rijmen, Zhi Tao, Qingju Wang, Hua Chen, Yunwen Liu, Chaoyun Li, Ya Liu. Impossible meet-in-the-middle fault analysis on the LED lightweight cipher in VANETs |
0 | -- | 0 | Yaoling Ding, Xiaoyun Wang, Ning Wang, Wei Wang. -1 layers |
0 | -- | 0 | Tao Xu, Chuankun Wu, Feng Liu, Ruoxin Zhao. Protecting white-box cryptographic implementations with obfuscated round boundaries |
0 | -- | 0 | Rui Zong, Xiaoyang Dong, Xiaoyun Wang. Impossible differential attack on Simpira v2 |
32102 | -- | 0 | Kai Zhang, Hui Li, Jianfeng Ma, Ximeng Liu. Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability |
32115 | -- | 0 | Zhongxiang Zheng, Xiaoyun Wang, Guangwu Xu, Yang Yu. Orthogonalized lattice enumeration for solving SVP |
39101 | -- | 0 | Haiqin Wu, Liangmin Wang, Tao Jiang. k-nearest neighbor query for location-based services in outsourced environments |