463 | -- | 474 | Frédéric Lafitte. CryptoSAT: a tool for SAT-based cryptanalysis |
475 | -- | 483 | Mingxing Hu, Qing Ye, Yongli Tang. Efficient batch identity-based fully homomorphic encryption scheme in the standard model |
484 | -- | 497 | Lin Jiao, Yongqiang Li, Yonglin Hao. Guess-and-determine attacks on PANAMA-like stream ciphers |
498 | -- | 501 | Jiayang Liu, Jingguo Bi. Equivalent key attack against a public-key cryptosystem based on subset sum problem |
502 | -- | 512 | Khundrakpam Johnson Singh, Thongam Khelchandra, Tanmay De. Detection and differentiation of application layer DDoS attack from flash events using fuzzy-GA computation |
513 | -- | 520 | Zhihui Chu, Huaifeng Chen, Xiaoyun Wang, Lu Li 0006, Xiaoyang Dong, Yaoling Ding, Yonglin Hao. Improved integral attacks without full codebook |
521 | -- | 526 | Amor Gueddana, Vasudevan Lakshminarayanan. Physical feasibility of QKD based on probabilistic quantum circuits |
527 | -- | 533 | Jian Zou, Le Dong, Wenling Wu. New algorithms for the unbalanced generalised birthday problem |
534 | -- | 542 | Guangliang Xu, Wei Yang 0011, Liusheng Huang. Supervised learning framework for covert channel detection in LTE-A |
543 | -- | 550 | Mohammad Taherifard, Ahmad Patooghy, Mahdi Fazeli. Vulnerability modelling of crypto-chips against scan-based attacks |
551 | -- | 557 | Md. Mokammel Haque, Josef Pieprzyk. Preprocessing optimisation: revisiting recursive-BKZ lattice reduction algorithm |
558 | -- | 565 | Mina Sadat Khazaei, Hossein Homaei, Hamid Reza Shahriari. OPEXA: analyser assistant for detecting over-privileged extensions |