Abstract is missing.
- A Deterministic Algorithm for Computing Divisors in an IntervalLiqiang Peng, Yao Lu, Noboru Kunihiro, Rui Zhang, Lei Hu. 3-12 [doi]
- Reusable Fuzzy Extractor from LWEYunhua Wen, Shengli Liu. 13-27 [doi]
- A Reusable Fuzzy Extractor with Practical Storage Size: Modifying Canetti et al.'s ConstructionJung Hee Cheon, Jinhyuck Jeong, Dongwoo Kim, Jongchan Lee. 28-44 [doi]
- 21 - Bringing Down the Complexity: Fast Composable Protocols for Card Games Without Secret StateBernardo David, Rafael Dowsley, Mario Larangeira. 45-63 [doi]
- Efficient Bit-Decomposition and Modulus-Conversion Protocols with an Honest MajorityRyo Kikuchi, Dai Ikarashi, Takahiro Matsuda, Koki Hamada, Koji Chida. 64-82 [doi]
- Verifiable Secret Sharing Based on Hyperplane Geometry with Its Applications to Optimal Resilient Proactive CryptosystemsZhe Xia, Liuying Sun, Bo Yang 0003, Yanwei Zhou, Mingwu Zhang. 83-100 [doi]
- Towards Round-Optimal Secure Multiparty Computations: Multikey FHE Without a CRSEunkyung Kim, Hyang-Sook Lee, Jeongeun Park. 101-113 [doi]
- Robust Multiparty Computation with Faster Verification TimeSouradyuti Paul, Ananya Shrivastava. 114-131 [doi]
- Distributed Time-Memory Tradeoff Attacks on Ciphers - (with Application to Stream Ciphers and Counter Mode)Howard M. Heys. 135-153 [doi]
- New Iterated RC4 Key CorrelationsRyoma Ito, Atsuko Miyaji. 154-171 [doi]
- A New Framework for Finding Nonlinear Superpolies in Cube Attacks Against Trivium-Like CiphersChen-Dong Ye, Tian Tian. 172-187 [doi]
- Differential Attacks on Reduced Round LILLIPUTNicolas Marrière, Valérie Nachef, Emmanuel Volte. 188-206 [doi]
- Bounds on Differential and Linear Branch Number of PermutationsSumanta Sarkar, Habeeb Syed. 207-224 [doi]
- Keyed Sponge with Prefix-Free Padding: Independence Between Capacity and Online Queries Without the Suffix KeyYusuke Naito. 225-242 [doi]
- Forward-Secure Linkable Ring SignaturesXavier Boyen, Thomas Haines. 245-264 [doi]
- Revocable Identity-Based Encryption from the Computational Diffie-Hellman ProblemZiyuan Hu, Shengli Liu, Kefei Chen, Joseph K. Liu. 265-283 [doi]
- Private Functional Signatures: Definition and ConstructionShimin Li, Bei Liang, Rui Xue. 284-303 [doi]
- Linkable Group Signature for Auditing Anonymous CommunicationHaibin Zheng, Qianhong Wu, Bo Qin, Lin Zhong, Shuangyu He, Jianwei Liu. 304-321 [doi]
- Auditable Hierarchy-Private Public-Key EncryptionLin Zhong, Qianhong Wu, Bo Qin, Haibin Zheng, Jianwei Liu. 322-340 [doi]
- Key-Updatable Public-Key Encryption with Keyword Search: Models and Generic ConstructionsHiroaki Anada, Akira Kanaoka, Natsume Matsuzaki, Yohei Watanabe. 341-359 [doi]
- Anonymous Identity-Based Encryption with Identity RecoveryXuecheng Ma, Xin Wang, Dongdai Lin. 360-375 [doi]
- Asymmetric Subversion Attacks on Signature SchemesChi Liu, Rongmao Chen, Yi Wang, Yongjun Wang. 376-395 [doi]
- Intrusion-Resilient Public Auditing Protocol for Data Storage in Cloud ComputingYan Xu, Ran Ding, Jie Cui, Hong Zhong 0001. 399-416 [doi]
- Secure Publicly Verifiable Computation with Polynomial Commitment in Cloud ComputingJian Shen, Dengzhi Liu, Xiaofeng Chen 0001, Xinyi Huang, Jiageng Chen, Mingwu Zhang. 417-430 [doi]
- Privacy-Preserving Mining of Association Rule on Outsourced Cloud Data from Multiple PartiesLin Liu, Jinshu Su, Rongmao Chen, Ximeng Liu, Xiaofeng Wang 0002, Shuhui Chen, Ho-Fung Leung. 431-451 [doi]
- Cryptanalysis of the Randomized Version of a Lattice-Based Signature Scheme from PKC'08Haoyu Li, Renzhang Liu, Abderrahmane Nitaj, Yanbin Pan. 455-466 [doi]
- Complete Attack on RLWE Key Exchange with Reused Keys, Without Signal LeakageJintai Ding, Scott R. Fluhrer, Saraswathy RV. 467-486 [doi]
- Efficient Decryption Algorithms for Extension Field Cancellation Type Encryption SchemesYacheng Wang, Yasuhiko Ikematsu, Dung Hoang Duong, Tsuyoshi Takagi. 487-501 [doi]
- Lattice-Based Universal Accumulator with Nonmembership ArgumentsZuoxia Yu, Man Ho Au, Rupeng Yang, Junzuo Lai, Qiuliang Xu. 502-519 [doi]
- Lattice-Based Dual Receiver Encryption and MoreDaode Zhang, Kai Zhang, Bao Li, Xianhui Lu, Haiyang Xue, Jie Li. 520-538 [doi]
- Anonymous Identity-Based Hash Proof System from Lattices in the Standard ModelQiqi Lai, Bo Yang, Yong Yu, Yuan Chen, Liju Dong. 539-557 [doi]
- Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0)Wilson Abel Alberto Torres, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Veronika Kuchta, Nandita Bhattacharjee, Man Ho Au, Jacob Cheng. 558-576 [doi]
- Secure Contactless PaymentHandan Kilinç, Serge Vaudenay. 579-597 [doi]
- New Attacks and Secure Design for Anonymous Distance-BoundingAhmad Ahmadi, Reihaneh Safavi-Naini, Md. Mamunur Rashid Akand. 598-616 [doi]
- Automatically Identifying Security Bug Reports via Multitype Features AnalysisDeqing Zou, Zhijun Deng, Zhen Li, Hai Jin 0001. 619-633 [doi]
- A Practical Privacy Preserving Protocol in Database-Driven Cognitive Radio NetworksYaLi Zeng, Xu Li, Xu Yang, Qikui Xu, Dongcheng Wang. 634-648 [doi]
- TDDAD: Time-Based Detection and Defense Scheme Against DDoS Attack on SDN ControllerJie Cui, Jiantao He, Yan Xu, Hong Zhong 0001. 649-665 [doi]
- Fast Lottery-Based Micropayments for Decentralized CurrenciesKexin Hu, Zhenfeng Zhang. 669-686 [doi]
- Z-Channel: Scalable and Efficient Scheme in ZerocashYuncong Zhang, Yu Long, Zhen Liu, Zhiqiang Liu, Dawu Gu. 687-705 [doi]
- Revisiting the Incentive Mechanism of Bitcoin-NGJiayuan Yin, Changren Wang, Zongyang Zhang, Jianwei Liu. 706-719 [doi]
- Decentralized Blacklistable Anonymous Credentials with ReputationRupeng Yang, Man Ho Au, Qiuliang Xu, Zuoxia Yu. 720-738 [doi]
- Revocable Certificateless Encryption with Ciphertext EvolutionYinxia Sun, Futai Zhang, Anmin Fu. 741-749 [doi]
- A New Encryption Scheme Based on Rank Metric CodesTerry Shue Chien Lau, Chik-How Tan. 750-758 [doi]
- Enhancing Intelligent Alarm Reduction for Distributed Intrusion Detection Systems via Edge ComputingWeizhi Meng, Yu Wang, Wenjuan Li, Zhe Liu, Jin Li, Christian W. Probst. 759-767 [doi]
- Live Path CFI Against Control Flow Hijacking AttacksMohamad Barbar, Yulei Sui, Hongyu Zhang, Shiping Chen, Jingling Xue. 768-779 [doi]
- Security Analysis and Modification of ID-Based Encryption with Equality Test from ACISP 2017Hyung Tae Lee, Huaxiong Wang, Kai Zhang. 780-786 [doi]
- Improving the BKZ Reduction Algorithm by Quick Reordering TechniqueYuntao Wang, Tsuyoshi Takagi. 787-795 [doi]
- ANTSdroid: Automatic Malware Family Behaviour Generation and Analysis for Android AppsYeali S. Sun, Chien Chun Chen, Shun-Wen Hsiao, Meng Chang Chen. 796-804 [doi]
- Constant-Size CCA-Secure Multi-hop Unidirectional Proxy Re-encryption from Indistinguishability ObfuscationJunzuo Lai, Zhengan Huang, Man Ho Au, Xianping Mao. 805-812 [doi]
- Practical Signatures from the Partial Fourier Recovery Problem Revisited: A Provably-Secure and Gaussian-Distributed ConstructionXingye Lu, Zhenfei Zhang, Man Ho Au. 813-820 [doi]
- CRT-KPS: A Key Predistribution Schemes Using CRTPinaki Sarkar, Mayank Baranwal, Sukumar Nandi. 821-830 [doi]