165 | -- | 171 | Sedat Akleylek, Murat Cenk, Ferruh Ă–zbudak. On the generalisation of special moduli for faster interleaved montgomery modular multiplication |
172 | -- | 180 | Jung-San Lee, Wei-Chiang Kao, Bo Li. Aryabhata remainder theorem-based non-iterative electronic lottery mechanism with robustness |
181 | -- | 188 | Youjiao Zou, Wenping Ma, Zhanjun Ran, Shangping Wang. Newmultivariate hash function quadratic polynomials multiplying linear polynomials |
189 | -- | 194 | Hung-Wen Yang, Chou Chen Yang, Woei Lin. Enhanced digital rights management authentication scheme based on smart card |
195 | -- | 202 | Yoon Ho Choi, Seung-Woo Seo. BLAST: B-LAyered bad-character SHIFT tables for high-speed pattern matching |
203 | -- | 211 | Muthumanickam Gunasekaran, Kandhasamy Premalatha. TEAP: trust-enhanced anonymous on-demand routing protocol for mobile ad hoc networks |
212 | -- | 220 | Marco Baldi, Marco Bianchi 0002, Franco Chiaraluce. Security and complexity of the McEliece cryptosystem based on quasi-cyclic low-density parity-check codes |
221 | -- | 229 | Dimitrios S. Karas, George K. Karagiannidis, Robert Schober. Channel level crossing-based security for communications over fading channels |
230 | -- | 238 | Ali Vardasbi, Mahmoud Salmasizadeh, Javad Mohajeri. Superpoly algebraic normal form monomial test on Trivium |
239 | -- | 246 | Tsu-Yang Wu, Yuh-Min Tseng. Publicly verifiable multi-secret sharing scheme from bilinear pairings |
247 | -- | 252 | Hsiu-Lien Yeh, Tien-Ho Chen, Kuei-Jung Hu, Wei Kuan Shih. Robust elliptic curve cryptography-based three factor user authentication providing privacy of biometric data |
253 | -- | 263 | Yu-Chi Chen, Gwoboa Horng, Chao-Liang Liu. Strong non-repudiation based on certificateless short signatures |