1 | -- | 5 | Kun Peng. Attack against a batch zero-knowledge proof system |
6 | -- | 13 | G. Zheng, H.-T. Ma, C. Cheng, Y.-C. Tu. Design and logical analysis on the access authentication scheme for satellite mobile communication networks |
14 | -- | 19 | Haining Fan, Ming Gu, Jiaguang Sun, Kwok-Yan Lam. Obtaining more Karatsuba-like formulae over the binary field |
20 | -- | 27 | Huaqun Wang, Yi-Chun Zhang, Hu Xiong, Bo Qin. Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme |
28 | -- | 40 | Kahraman D. Akdemir, Deniz Karakoyunlu, Berk Sunar. Non-linear error detection for elliptic curve cryptosystems |
41 | -- | 46 | Qichun Wang, Thoinas Johansson, Haibin Kan. Some results on fast algebraic attacks and higher-order non-linearities |