Journal: Science in China Series F: Information Sciences

Volume 61, Issue 3

0 -- 0Lixue Sun, Chunxiang Xu, Mingwu Zhang, Kefei Chen, Hongwei Li. Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation
0 -- 0Jiao Hu, Ruilin Li, Chaojing Tang. A real-time inversion attack on the GMR-2 cipher used in the satellite phones
0 -- 0Wenbo Wang, Shuqin Fan. Attacking OpenSSL ECDSA with a small amount of side-channel information
0 -- 0Sen Xu, Xiangjun Lu, Kaiyu Zhang, Yang Li, Lei Wang, Weijia Wang, Haihua Gu, Zheng Guo, Junrong Liu, Dawu Gu. Similar operation template attack on RSA-CRT as a case study
0 -- 0Wenying Zhang, Guoyong Han. Construction of rotation symmetric bent functions with maximum algebraic degree
0 -- 0Ziran Tu, Xiangyong Zeng, Zhiyong Zhang. More permutation polynomials with differential uniformity six
0 -- 0Qian Yao. A systematic framework to understand central bank digital currency
0 -- 0Ping Zhou, Tao Wang 0008, Xiaoxuan Lou, Xinjie Zhao 0001, Fan Zhang 0010, Shize Guo. Efficient flush-reload cache attack on scalar multiplication based signature algorithm
0 -- 0Yanzhao Shen, Dongxia Bai, Hongbo Yu. Improved cryptanalysis of step-reduced SM3
0 -- 0Ying Dong, Yuqing Zhang, Hua Ma, Qianru Wu, Qixu Liu, Kai Wang, Wenjie Wang. An adaptive system for detecting malicious queries in web attacks
0 -- 0Gaofei Wu, Nian Li, Yuqing Zhang, Xuefeng Liu. Several classes of negabent functions over finite fields
0 -- 0Qianwen Wang, Rongquan Feng, Yan Zhu. Verifiable random functions with Boolean function constraints
0 -- 0Libo Wang, Baofeng Wu, Zhuojun Liu, Dongdai Lin. Three new infinite families of bent functions
0 -- 0Hui Zeng, Jingjing Yu, Xiangui Kang, Siwei Lyu. Countering JPEG anti-forensics based on noise level estimation
0 -- 0Min Dong, Yanli Ren. Efficient and secure outsourcing of bilinear pairings with single server
0 -- 0Taek-Young Youn, Ku-Young Chang. Bi-directional and concurrent proof of ownership for stronger storage services with de-duplication
0 -- 0Xinjie Zhao 0001, Fan Zhang 0010, Shize Guo, Zheng Gong. Optimal model search for hardware-trojan-based bit-level fault attacks on block ciphers
0 -- 0Shixiong Wang, Longjiang Qu, Chao Li 0002, Shaojing Fu. A better bound for implicit factorization problem with shared middle bits
0 -- 0Ya Liu, Liang Cheng, Zhiqiang Liu, Wei Li, Qingju Wang, Dawu Gu. Improved meet-in-the-middle attacks on reduced-round Piccolo
0 -- 0an Wang, Yu Zhang, Weina Tian, Qian Wang, Guoshuang Zhang, Liehuang Zhu. Right or wrong collision rate analysis without profiling: full-automatic collision fault attack
0 -- 0Dongmei Li, Xiaolei Dong, Zhenfu Cao, Haijiang Wang. Privacy-preserving large-scale systems of linear equations in outsourcing storage and computation
0 -- 0Wei Li, Vincent Rijmen, Zhi Tao, Qingju Wang, Hua Chen, Yunwen Liu, Chaoyun Li, Ya Liu. Impossible meet-in-the-middle fault analysis on the LED lightweight cipher in VANETs
0 -- 0Yaoling Ding, Xiaoyun Wang, Ning Wang, Wei Wang. -1 layers
0 -- 0Tao Xu, Chuankun Wu, Feng Liu, Ruoxin Zhao. Protecting white-box cryptographic implementations with obfuscated round boundaries
0 -- 0Rui Zong, Xiaoyang Dong, Xiaoyun Wang. Impossible differential attack on Simpira v2
32102 -- 0Kai Zhang, Hui Li, Jianfeng Ma, Ximeng Liu. Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability
32115 -- 0Zhongxiang Zheng, Xiaoyun Wang, Guangwu Xu, Yang Yu. Orthogonalized lattice enumeration for solving SVP
39101 -- 0Haiqin Wu, Liangmin Wang, Tao Jiang. k-nearest neighbor query for location-based services in outsourced environments