509 | -- | 533 | Cong Li, Qingni Shen, Zhikang Xie, Xinyu Feng, Yuejian Fang, Zhonghai Wu. Large Universe CCA2 CP-ABE With Equality and Validity Test in the Standard Model |
534 | -- | 549 | Zhenbin Yan, Yi Deng. Non-Malleable Zero-Knowledge Arguments with Lower Round Complexity |
550 | -- | 563 | Hui Cui, Russell Paulet, Surya Nepal, Xun Yi, Butrus Mbimbi. Two-Factor Decryption: A Better Way to Protect Data Security and Privacy |
564 | -- | 574 | Murat Yasin Kubilay, Mehmet Sabir Kiraz, Haci Ali Mantar. KORGAN: An Efficient PKI Architecture Based on PBFT Through Dynamic Threshold Signatures |
575 | -- | 598 | Zhen Liu 0008, Qiong Huang, Duncan S. Wong. On Enabling Attribute-Based Encryption to Be Traceable Against Traitors |
599 | -- | 609 | Tran Nghi Phu, Nguyen Dai Tho, Le Huy Hoang, Nguyen Ngoc Toan, Nguyen Ngoc Binh. An Efficient Algorithm to Extract Control Flow-Based Features for IoT Malware Detection |
610 | -- | 627 | Fulei Ji, Wentao Zhang, Tianyou Ding. Improving Matsui's Search Algorithm For The Best Differential/Linear Trails And Its Applications For DES, DESL And GIFT |
628 | -- | 638 | Haibo Zhou, Rui Zong, Xiaoyang Dong, Keting Jia, Willi Meier. Interpolation Attacks on Round-Reduced Elephant, Kravatte and Xoofff |
639 | -- | 652 | Colin Boyd, Kai Gellert. A Modern View on Forward Security |
653 | -- | 660 | Xi Jun Lin, Qihui Wang, Lin Sun 0005, Zhen Yan, Peishun Liu. Security Analysis of the First Certificateless Proxy Signature Scheme Against Malicious-But-Passive KGC Attacks |
661 | -- | 674 | Yunhao Ling, Sha Ma, Qiong Huang, XiMing Li, Yijian Zhong, YunZhi Ling. Efficient Group ID-Based Encryption With Equality Test Against Insider Attack |