- Tapaswini Mohanty, Vikas Srivastava, Sumit Kumar Debnath, Pantelimon Stanica. Quantum secure protocols for multiparty computations. Inf. Sec. Techn. Report, 90:104033, 2025.
- Han Cao 0004, Qindong Sun, Rong Geng 0001, Xiaoxiong Wang, Rui Yang. Decision attribution and local extremum-guided black-box adversarial attack with adjustable sparsity and discreteness. Inf. Sec. Techn. Report, 93:104172, 2025.
- Li Yu, Je Sen Teh. Boomerang cryptanalysis of SAND. Inf. Sec. Techn. Report, 92:104086, 2025.
- Xiaohan Wan, Hao Lin, Mingqiang Wang, Wenting Shen. Hierarchical Threshold Multi-Key Fully Homomorphic Encryption. Inf. Sec. Techn. Report, 89:103919, 2025.
- Jinyuan Liu 0005, Yong Wang 0009, Kun Wang, Zhuo Liu. A secure and efficient face template protection scheme based on chaos. Inf. Sec. Techn. Report, 93:104111, 2025.
- Mansi Gupta, Mohit Kumar 0004, Renu Dhir. Privacy-preserving federated learning in asynchronous environment using homomorphic encryption. Inf. Sec. Techn. Report, 93:104116, 2025.
- Han Yu, Jianhong Zhou, Maode Ma. A high-security batch message authentication protocol assisted by edge servers in industrial Internet of Things. Inf. Sec. Techn. Report, 92:104075, 2025.
- Amir Javadpour 0001, Forough Ja'fari, Chafika Benzaïd, Tarik Taleb. An optimized reinforcement learning based MTD mutation strategy for securing edge IoT against DDoS attack. Inf. Sec. Techn. Report, 93:104138, 2025.
- Thanh Nhan Vo, Tzu-Chuen Lu. Interpolation data hiding schemes based on center folding strategy and well-turned embedded positions. Inf. Sec. Techn. Report, 91:104055, 2025.
- Suriya U.-ruekolan, Manot Rattananen, Jukkrapong Ponharn, Naiyana Sahavechaphan. Enforcing data access control and privacy: The graph-driven data regulatory approach. Inf. Sec. Techn. Report, 93:104163, 2025.