1789 | -- | 1812 | Lin Jiao, Yongqiang Li 0001, Yonglin Hao. A Guess-And-Determine Attack On SNOW-V Stream Cipher |
1813 | -- | 1825 | Amirhossein Ebrahimi Moghaddam, Zahra Ahmadian. New Automatic Search Method for Truncated-Differential Characteristics Application to Midori, SKINNY and CRAFT |
1826 | -- | 1834 | Yiming Li, Shengli Liu, Dawu Gu, Kefei Chen. Reusable Fuzzy Extractor Based on the LPN Assumption |
1835 | -- | 1848 | Ge Wu 0001, Zhen Zhao 0005, Fuchun Guo, Willy Susilo, Futai Zhang. On the General Construction of Tightly Secure Identity-Based Signature Schemes |
1849 | -- | 1858 | Sha Ma, Qiong Huang. A New Framework of IND-CCA Secure Public Key Encryption with Keyword Search |
1859 | -- | 1870 | Ya Liu 0001, Bing Shi, Dawu Gu, Fengyu Zhao, Wei Li 0013, Zhiqiang Liu 0001. Improved Meet-in-the-Middle Attacks on Reduced-Round Deoxys-BC-256 |
1871 | -- | 1885 | Cheng-Jun Lin, Rui Xue 0001, Shao-Jun Yang, Xinyi Huang, Shimin Li. Linearly Homomorphic Signatures from Lattices |
1886 | -- | 1903 | Zhidan Li, Wenmin Li, Fei Gao 0001, Ping Yu, Hua Zhang 0001, Zhengping Jin, Qiaoyan Wen. New Blind Filter Protocol: An Improved Privacy-Preserving Scheme for Location-Based Services |
1904 | -- | 1914 | Janaka Alawatugoda. Public-Key Encryption In The Standard Model Against Strong Leakage Adversary |
1915 | -- | 1938 | Huizhong Li, Yongbin Zhou, Jingdian Ming, Guang Yang, Chengbin Jin. The Notion of Transparency Order, Revisited |