177 | -- | 187 | Sedat Akleylek, Vincent Rijmen, Muharrem Tolga Sakalli, Emir Öztürk. Efficient methods to generate cryptographically significant binary diffusion layers |
188 | -- | 194 | Liran Lerman, Zdenek Martinasek, Olivier Markowitch. Robust profiled attacks: should the adversary trust the dataset? |
195 | -- | 198 | Binglong Chen, Chuangqiang Hu, Chang-An Zhao. Note on scalar multiplication using division polynomials |
199 | -- | 203 | Weiguo Zhang, Luyang Li, Enes Pasalic. Construction of resilient S-boxes with higher-dimensional vectorial outputs and strictly almost optimal non-linearity |
204 | -- | 210 | Liqun Chen, Qin Li, Keith M. Martin, Siaw-Lynn Ng. Private reputation retrieval in public - a privacy-aware announcement scheme for VANETs |
211 | -- | 219 | YaWei Ren, Feng Liu, Teng Guo, Rongquan Feng, Dongdai Lin. Cheating prevention visual cryptography scheme using Latin square |
220 | -- | 221 | Goutham Reddy Alavalapati, Eun-Jun Yoon, Kee-Young Yoo. Comment on 'Efficient and secure dynamic ID-based remote user authentication scheme for distributed systems using smart cards' |