411 | -- | 419 | Lin Jiao, Yonglin Hao, Yongqiang Li. Improved guess-and-determine attack on TRIVIUM |
420 | -- | 425 | Jin-Yuan Wang, Sheng-Hong Lin, Wei Cai, Jianxin Dai. ESR analysis over ST-MRC multi-input multi-output Nakagami fading channels |
426 | -- | 434 | Yanwei Zhou, Bo Yang 0003, Yi Mu 0001, Tao Wang 0039, Xin Wang 0058. Identity-based encryption resilient to continuous key leakage |
435 | -- | 447 | Matej Zuzcak, Petr Bujok. Causal analysis of attacks against honeypots based on properties of countries |
448 | -- | 458 | Hossein Arabnezhad Khanooki, Babak Sadeghiyan, Josef Pieprzyk. S-boxes representation and efficiency of algebraic attack |
459 | -- | 468 | Parvin Rastegari, Mohammad Dakhilalian, Mehdi Berenjkoub, Willy Susilo. Multi-designated verifiers signature schemes with threshold verifiability: generic pattern and a concrete scheme in the standard model |
469 | -- | 478 | Hailun Yan, Xuejia Lai, Lei Wang 0031, Yu Yu 0001, Yiran Xing. New zero-sum distinguishers on full 24-round Keccak-f using the division property |
479 | -- | 485 | Lingchen Li, Wenling Wu, Lei Zhang 0012, Yafei Zheng. New method to describe the differential distribution table for large S-boxes in MILP and its application |
486 | -- | 495 | Morteza Noferesti, Rasool Jalili. Inline high-bandwidth network analysis using a robust stream clustering algorithm |
498 | -- | 507 | David Nuñez 0001, Isaac Agudo, Javier López 0001. Escrowed decryption protocols for lawful interception of encrypted data |
508 | -- | 514 | Bagher Bagherpour, Ali Zaghian, Mahdi Sajadieh. Sigma protocol for faster proof of simultaneous homomorphism relations |
515 | -- | 518 | Tianfeng Sun, Bin Hu, Yang Yang. Research on highly non-linear plateaued functions |