53 | -- | 59 | Yang Tan, Shaohua Tang, Jie Chen, Yong Yu, Xiangxue Li. Building a new secure variant of Rainbow signature scheme |
60 | -- | 68 | Esther Palomar, Lorena González-Manzano, Almudena Alcaide, Álvaro Galán. Implementing a privacy-enhanced attribute-based credential system for online social networks with co-ownership management |
69 | -- | 79 | Xiaoming Hu, WenAn Tan, Huajie Xu, Jian Wang. Short and provably secure designated verifier proxy signature scheme |
80 | -- | 86 | Yang Lu, Jiguo Li. Improved certificate-based signature scheme without random oracles |
87 | -- | 94 | Lingfeng Liu, Suoxia Miao, Hanping Hu, Ya Shuang Deng. Pseudorandom bit generator based on non-stationary logistic maps |
95 | -- | 103 | Zhiqiang Liu, Bing Sun, Qingju Wang, Kerem Varici, Dawu Gu. Improved zero-correlation linear cryptanalysis of reduced-round Camellia under weak keys |
104 | -- | 111 | Dandan Li, Zuling Chang, Qiaoyan Wen, Jie Zhang. n+1 |