Journal: Comput. J.

Volume 63, Issue 12

1789 -- 1812Lin Jiao, Yongqiang Li 0001, Yonglin Hao. A Guess-And-Determine Attack On SNOW-V Stream Cipher
1813 -- 1825Amirhossein Ebrahimi Moghaddam, Zahra Ahmadian. New Automatic Search Method for Truncated-Differential Characteristics Application to Midori, SKINNY and CRAFT
1826 -- 1834Yiming Li, Shengli Liu, Dawu Gu, Kefei Chen. Reusable Fuzzy Extractor Based on the LPN Assumption
1835 -- 1848Ge Wu 0001, Zhen Zhao 0005, Fuchun Guo, Willy Susilo, Futai Zhang. On the General Construction of Tightly Secure Identity-Based Signature Schemes
1849 -- 1858Sha Ma, Qiong Huang. A New Framework of IND-CCA Secure Public Key Encryption with Keyword Search
1859 -- 1870Ya Liu 0001, Bing Shi, Dawu Gu, Fengyu Zhao, Wei Li 0013, Zhiqiang Liu 0001. Improved Meet-in-the-Middle Attacks on Reduced-Round Deoxys-BC-256
1871 -- 1885Cheng-Jun Lin, Rui Xue 0001, Shao-Jun Yang, Xinyi Huang, Shimin Li. Linearly Homomorphic Signatures from Lattices
1886 -- 1903Zhidan Li, Wenmin Li, Fei Gao 0001, Ping Yu, Hua Zhang 0001, Zhengping Jin, Qiaoyan Wen. New Blind Filter Protocol: An Improved Privacy-Preserving Scheme for Location-Based Services
1904 -- 1914Janaka Alawatugoda. Public-Key Encryption In The Standard Model Against Strong Leakage Adversary
1915 -- 1938Huizhong Li, Yongbin Zhou, Jingdian Ming, Guang Yang, Chengbin Jin. The Notion of Transparency Order, Revisited