149 | -- | 157 | Kwangsu Lee, Dong-Hoon Lee. Adaptively secure broadcast encryption under standard assumptions with better efficiency |
158 | -- | 166 | Yinxia Sun, Futai Zhang, Limin Shen, Robert H. Deng. Efficient revocable certificateless encryption against decryption key exposure |
167 | -- | 178 | Dongxia Bai, Hongbo Yu, Gaoli Wang, Xiaoyun Wang. Improved boomerang attacks on round-reduced SM3 and keyed permutation of BLAKE-256 |
179 | -- | 184 | Hadi Soleimany. Self-similarity cryptanalysis of the block cipher ITUbee |
185 | -- | 193 | Zuhua Shao, Yipeng Gao. Practical verifiably encrypted signature based on Waters signatures |
194 | -- | 201 | Liaojun Pang, Lu Gao, Huixian Li, YuMin Wang. Anonymous multi-receiver ID-based signcryption scheme |