55 | -- | 65 | Xiangling Ding, Yingzhuo Deng, Gaobo Yang, Yun Song, Dajiang He, Xingming Sun. Design of new scan orders for perceptual encryption of H.264/AVC videos |
66 | -- | 77 | Bahram Rashidi, Reza Rezaeian Farashahi, Sayed Masoud Sayedi. m ) |
78 | -- | 81 | Thomas W. Cusick. Highly nonlinear plateaued functions |
82 | -- | 88 | Xiaomin Zhao, Jiabin Zhu, Xueli Liang, Shuangshuang Jiang, Qingzhang Chen. Lightweight and integrity-protecting oriented data aggregation scheme for wireless sensor networks |
89 | -- | 96 | Ting Cui, Chenhui Jin, Bin Zhang, Zhuo Chen, Guoshuang Zhang. Searching all truncated impossible differentials in SPN |
97 | -- | 103 | Rongjia Li, Chenhui Jin. Improved meet-in-the-middle attacks on Crypton and mCrypton |
104 | -- | 113 | Zouheir Trabelsi, Safaa Zeidan, Mohammad M. Masud. Hybrid mechanism towards network packet early acceptance and rejection for unified threat management |
114 | -- | 120 | Md. Mokammel Haque, Josef Pieprzyk. Analysing recursive preprocessing of BKZ lattice reduction algorithm |