1 | -- | 3 | Xiaofeng Chen. Provable Security |
4 | -- | 20 | Wissam Mallouli, Amel Mammar, Ana R. Cavalli, Willy Jimenez. VDC-Based Dynamic Code Analysis: Application to C Programs |
21 | -- | 31 | Maciej Grzeskowiak. Algorithm for Generating Primes for the Giuliani-Gong Public Key System |
32 | -- | 43 | Hai Huang. An eCK-Secure One Round Authenticated Key Exchange Protocol with Perfect Forward Security |
44 | -- | 56 | Dexin Yang, Bo Yang. A Novel Multi-factor Authenticated Key Exchange Scheme With Privacy Preserving |
57 | -- | 73 | Mario Larangeira, Keisuke Tanaka. Programmability in the Generic Ring and Group Models |
74 | -- | 88 | Shengli Liu, Junzuo Lai, Robert H. Deng. General Construction of Chameleon All-But-One Trapdoor Functions |
89 | -- | 106 | Kristian Gjøsteen, George Petrides, Asgeir Steine. A Novel Framework for Protocol Analysis |
107 | -- | 124 | Jiaxin Pan, Libin Wang. TMQV: A Strongly eCK-secure Diffie-Hellman Protocol without Gap Assumption |
125 | -- | 139 | Yutaka Kawai, Yusuke Sakai, Noboru Kunihiro. On the (Im)possibility Results for Strong Attack Models for Public Key Cryptsystems |
140 | -- | 160 | Sébastien Canard, Julien Devigne, Fabien Laguillaumie. Improving the Security of an Efficient Unidirectional Proxy Re-Encryption Scheme |
161 | -- | 180 | Sumit Kumar Pandey, Rana Barua. Efficient Construction of Identity Based Signcryption Schemes from Identity Based Encryption and Signature Schemes |