253 | -- | 0 | . Guest Editorial: Selected Papers from 17th International Conference on Cryptology and Network Security (CANS) |
254 | -- | 265 | Kimmo Järvinen 0001, Ágnes Kiss, Thomas Schneider 0003, Oleksandr Tkachenko, Zheng Yang 0001. Faster privacy-preserving location proximity schemes for circles and polygons |
266 | -- | 285 | Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig. Fully invisible protean signatures schemes |
286 | -- | 303 | Huy Quoc Le, Pradeep Kumar Mishra, Satoshi Nakamura, Koha Kinjo, Dung Hoang Duong, Masaya Yasuda. Impact of the modulus switching technique on some attacks against learning problems |
304 | -- | 312 | Paolo Santini, Marco Baldi, Franco Chiaraluce. Complexity of statistical attacks on QC-LDPC code-based cryptosystems |
313 | -- | 320 | Zhen Liu, Yanbin Pan, Tianyuan Xie. Breaking the hardness assumption and IND-CPA security of HQC submitted to NIST PQC project |
321 | -- | 331 | Ji Li 0004, Jianghong Wei, Mao Ye 0004, Wenfen Liu, Xuexian Hu. Privacy-preserving constrained spectral clustering algorithm for large-scale data sets |
332 | -- | 341 | Fariba Khazaei Koohpar, Afsaneh Fatemi, Fatemeh Raji. Data availability improvement in peer-to-peer online social networks |
342 | -- | 351 | Xuyang Wang, Aiqun Hu, Hao Fang. Improved collusion-resistant unidirectional proxy re-encryption scheme from lattice |
352 | -- | 364 | Mahmoud Ghorbanzadeh, Hamid Reza Shahriari. ANOVUL: Detection of logic vulnerabilities in annotated programs via data and control flow analysis |
365 | -- | 366 | Michel Abdalla, Fabrice Benhamouda, David Pointcheval. Corrigendum: Public-key encryption indistinguishable under plaintext-checkable attacks |