157 | -- | 174 | Eunkyung Kim, Hyang-Sook Lee, Jeongeun Park. Towards Round-Optimal Secure Multiparty Computations: Multikey FHE Without a CRS |
175 | -- | 191 | Yinxia Sun, Futai Zhang, Anmin Fu, Zhe Xia. CCA-Secure and Revocable Certificateless Encryption with Ciphertext Evolution |
193 | -- | 206 | Jiaxian Lv, Yi Wang, Jinshu Su, Rongmao Chen, Wenjun Wu. Security of Auditing Protocols Against Subversion Attacks |
207 | -- | 231 | Hatem M. Bahig, Dieaa I. Nassr, Ashraf Bhery, Abderrahmane Nitaj. A Unified Method for Private Exponent Attacks on RSA Using Lattices |
233 | -- | 252 | Yuejuan Han, Lantao You, Cheng-Kuan Lin, Jianxi Fan. Communication Performance Evaluation of the Locally Twisted Cube |
253 | -- | 273 | Tatsuya Akutsu, Avraham A. Melkman, Takeyuki Tamura. Improved Hardness of Maximum Common Subgraph Problems on Labeled Graphs of Bounded Treewidth and Bounded Degree |
275 | -- | 291 | Manjanna Basappa, Ramesh K. Jallu, Gautam K. Das. Constrained k-Center Problem on a Convex Polygon |