Journal: Comput. J.

Volume 62, Issue 8

1087 -- 1091Xi Jun Lin, Lin Sun 0005, Haipeng Qu, He-qun Xian. Cryptanalysis of a Compact Anonymous HIBE with Constant Size Private Keys
1092 -- 1105Yanwei Zhou, Bo Yang 0003, Hong-xia Hou, Lina Zhang, Tao Wang 0039, Mingxiao Hu. Continuous Leakage-Resilient Identity-Based Encryption with Tight Security
1106 -- 1120Jordan S. Queiroz, Eduardo Feitosa. A Web Browser Fingerprinting Method Based on the Web Audio API
1121 -- 1131Qian Wang 0013, Chenhui Jin. A Method to Bound the Number of Active S-Boxes for a Kind of AES-Like Structure
1132 -- 1147Jiahui Chen, Jie Ling, Jianting Ning, Jintai Ding. Identity-Based Signature Schemes for Multivariate Public Key Cryptosystems
1148 -- 1157Nanyuan Cao, Zhenfu Cao, Zhen Liu, Xiaolei Dong, Xiaopeng Zhao. All-But-Many Lossy Trapdoor Functions under Decisional RSA Subgroup Assumption and Application
1158 -- 1165Hanqiu Liu, Chenhui Jin. An Improvement of the CS Attack to DSC Cipher
1166 -- 1177Yuzhao Cui, Qiong Huang, Jianye Huang, Hongbo Li, Guomin Yang. Ciphertext-Policy Attribute-Based Encrypted Data Equality Test and Classification
1178 -- 1193Parvin Rastegari, Willy Susilo, Mohammad Dakhlalian. Efficient Certificateless Signcryption in the Standard Model: Revisiting Luo and Wan's Scheme from Wireless Personal Communications (2018)
1194 -- 1213Thierry Mefenza, Damien Vergnaud. Cryptanalysis of Server-Aided RSA Protocols with Private-Key Splitting
1214 -- 1231Jinguang Han, Maoxuan Bei, Liqun Chen, Yang Xiang, Jie Cao, Fuchun Guo, Weizhi Meng. Attribute-Based Information Flow Control
1232 -- 1245Jinyong Chang, Genqing Bian, Yanyan Ji, MaoZhi Xu. On the KDM-CCA Security from Partial Trapdoor One-Way Family in the Random Oracle Model