Journal: Int. J. Found. Comput. Sci.

Volume 31, Issue 2

157 -- 174Eunkyung Kim, Hyang-Sook Lee, Jeongeun Park. Towards Round-Optimal Secure Multiparty Computations: Multikey FHE Without a CRS
175 -- 191Yinxia Sun, Futai Zhang, Anmin Fu, Zhe Xia. CCA-Secure and Revocable Certificateless Encryption with Ciphertext Evolution
193 -- 206Jiaxian Lv, Yi Wang, Jinshu Su, Rongmao Chen, Wenjun Wu. Security of Auditing Protocols Against Subversion Attacks
207 -- 231Hatem M. Bahig, Dieaa I. Nassr, Ashraf Bhery, Abderrahmane Nitaj. A Unified Method for Private Exponent Attacks on RSA Using Lattices
233 -- 252Yuejuan Han, Lantao You, Cheng-Kuan Lin, Jianxi Fan. Communication Performance Evaluation of the Locally Twisted Cube
253 -- 273Tatsuya Akutsu, Avraham A. Melkman, Takeyuki Tamura. Improved Hardness of Maximum Common Subgraph Problems on Labeled Graphs of Bounded Treewidth and Bounded Degree
275 -- 291Manjanna Basappa, Ramesh K. Jallu, Gautam K. Das. Constrained k-Center Problem on a Convex Polygon