1749 | -- | 1771 | David W. Archer, Dan Bogdanov, Yehuda Lindell, Liina Kamm, Kurt Nielsen, Jakob Illeborg Pagter, Nigel P. Smart, Rebecca N. Wright. From Keys to Databases - Real-World Applications of Secure Multi-Party Computation |
1772 | -- | 1782 | Eunsung Lee, Sang-Woo Kim. Non-interactive Conditional Proxy Re-Signature in the Standard Model |
1783 | -- | 1790 | Tingting Lin, Hailun Yan, Xuejia Lai, Yixin Zhong, Yin Jia. Security Evaluation and Improvement of a White-Box SMS4 Implementation Based on Affine Equivalence Algorithm |
1791 | -- | 1793 | Xi Jun Lin, Lin Sun 0005, Haipeng Qu, Dongxiao Liu. On the Security of Secure Server-Designation Public Key Encryption with Keyword Search |
1794 | -- | 1805 | Yunhua Wen, Shengli Liu, Ziyuan Hu, Shuai Han. Computational Robust Fuzzy Extractor |
1806 | -- | 1824 | Yi Dou, Henry C. B. Chan, Man Ho Au. Order-Hiding Range Query over Encrypted Data without Search Pattern Leakage |
1825 | -- | 1844 | Shuai Han, Shengli Liu, Lin Lyu, Dawu Gu. Tightly Secure Encryption Schemes against Related-Key Attacks |
1845 | -- | 1861 | Biao Wang, Xueqing Wang, Rui Xue 0001, Xinyi Huang. Matrix FHE and Its Application in Optimizing Bootstrapping |
1862 | -- | 1879 | Yung-Ting Chuang, Yi-Fan Lee. Defense Mechanism for Malicious and Selective Forwarding Attacks in Large and Mobile Wireless Networks |
1880 | -- | 1896 | Jinhui Liu, Yong Yu, Bo Yang, Jianwei Jia, Shijia Wang, Houzhen Wang. Structural Key Recovery of Simple Matrix Encryption Scheme Family |
1897 | -- | 1908 | Qingwen Guo, Qiong Huang, Guomin Yang. Authorized Function Homomorphic Signature |