223 | -- | 229 | Xianfang Wang, Fang-Wei Fu. Multi-receiver authentication scheme with hierarchical structure |
230 | -- | 234 | Dong Yang, Wen-Feng Qi, Tian Tian. All-subkeys-recovery attacks on a variation of Feistel-2 block ciphers |
235 | -- | 242 | Yi Sun, Xingyuan Chen, Xuehui Du, Jian Xu. Dynamic authenticated data structures with access control for outsourcing data stream |
243 | -- | 249 | Zheng Yang, Junyu Lai, Wanping Liu, Chao Liu, Song Luo. SignORKE: improving pairing-based one-round key exchange without random oracles |
250 | -- | 255 | Yining Liu, Qi Zhong, Liang Chang, Zhe Xia, Debiao He, Chi Cheng. A secure data backup scheme using multi-factor authentication |
256 | -- | 260 | Caixue Zhou, Zongmin Cui. Certificate-based signature scheme in the standard model |
261 | -- | 266 | Fengrong Zhang, Shixiong Xia, Yupu Hu, Min Xie 0003. Constructions of involutions with optimal minimum degree |
267 | -- | 272 | Santanu Sarkar. Results on significant anomalies of state values after key scheduling algorithm in RC4 |
273 | -- | 276 | Lei Cheng, Chao Li. Revisiting impossible differentials of MARS-like structures |
277 | -- | 286 | Kai Fu, Ling Sun, Meiqin Wang. New integral attacks on SIMON |
287 | -- | 293 | Ryo Kikuchi, Dai Ikarashi, Koji Chida, Koki Hamada, Wakaha Ogata. Computational SS and conversion protocols in both active and passive settings |
294 | -- | 300 | Barsha Mitra, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri. Migrating from RBAC to temporal RBAC |