145 | -- | 160 | Rentaro Shiba, Kosei Sakamoto, Takanori Isobe 0001. Efficient constructions for large-state block ciphers based on AES New Instructions |
161 | -- | 177 | Mo Shaohui, Gulanbaier Tuerhong, Mairidan Wushouer, Tuergen Yibulayin. PCA mix-based Hotelling's T2 multivariate control charts for intrusion detection system |
178 | -- | 192 | Huanruo Li, Yunfei Guo, Penghao Sun, Yawen Wang, Shumin Huo. An optimal defensive deception framework for the container-based cloud with deep reinforcement learning |
193 | -- | 207 | Yibing Liu, Lijun Huo, Gang Zhou. TR-AKA: A two-phased, registered authentication and key agreement protocol for 5G mobile networks |
208 | -- | 219 | Jiseung Kim 0001, Changmin Lee 0001. Cryptanalysis of FRS obfuscation based on the CLT13 multilinear map |
220 | -- | 234 | Zhengbin Liu, Yongqiang Li 0001, Lin Jiao, Mingsheng Wang. On the upper bound of squared correlation of SIMON-like functions and its applications |