Abstract is missing.
- Ciphertext-Delegatable CP-ABE for a Dynamic Credential: A Modular ApproachJongkil Kim, Willy Susilo, Joonsang Baek, Surya Nepal, Dongxi Liu. 3-20 [doi]
- Location Based EncryptionTran Viet Xuan Phuong, Willy Susilo, Guomin Yang, Jun Yan 0005, Dongxi Liu. 21-38 [doi]
- Group ID-Based Encryption with Equality TestYunhao Ling, Sha Ma, Qiong Huang, Ru Xiang, XiMing Li. 39-57 [doi]
- Strong Post-Compromise Secure Proxy Re-EncryptionAlex Davidson, Amit Deo, Ela Lee, Keith Martin. 58-77 [doi]
- Offline Witness Encryption from Witness PRF and Randomized Encoding in CRS ModelTapas Pal, Ratna Dutta. 78-96 [doi]
- Two-Client and Multi-client Functional Encryption for Set IntersectionTim van de Kamp, David Stritzl, Willem Jonker, Andreas Peter. 97-115 [doi]
- Improving the Security of the DRS Scheme with Uniformly Chosen Random NoiseArnaud Sipasseuth, Thomas Plantard, Willy Susilo. 119-137 [doi]
- A Lattice-Based Public Key Encryption with Equality Test in Standard ModelDung Hoang Duong, Kazuhide Fukushima, Shinsaku Kiyomoto, Partha Sarathi Roy 0001, Willy Susilo. 138-155 [doi]
- Lattice RingCT V2.0 with Multiple Input and Multiple Output WalletsWilson Abel Alberto Torres, Veronika Kuchta, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Jacob Cheng. 156-175 [doi]
- Two New Module-Code-Based KEMs with Rank MetricLi-Ping Wang, Jingwei Hu. 176-191 [doi]
- Adding Distributed Decryption and Key Generation to a Ring-LWE Based CCA Encryption SchemeMichael Kraitsberg, Yehuda Lindell, Valery Osheter, Nigel P. Smart, Younes Talibi Alaoui. 192-210 [doi]
- Cryptanalysis on CCA2-Secured LRPC-Kronecker CryptosystemTerry Shue Chien Lau, Chik-How Tan. 211-228 [doi]
- Pseudorandom Functions from LWE: RKA Security and ApplicationNan Cui, Shengli Liu, Yunhua Wen, Dawu Gu. 229-250 [doi]
- \delta -subgaussian Random Variables in CryptographySean Murphy, Rachel Player. 251-268 [doi]
- Fast-to-Finalize Nakamoto-Like ConsensusShuyang Tang, Sherman S. M. Chow, Zhiqiang Liu, Joseph K. Liu. 271-288 [doi]
- A Flexible Instant Payment System Based on BlockchainLin Zhong, Huili Wang, Jan Xie, Bo Qin, Joseph K. Liu, Qianhong Wu. 289-306 [doi]
- Risk of Asynchronous Protocol Update: Attacks to Monero ProtocolsDimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu. 307-321 [doi]
- A Combined Micro-block Chain Truncation Attack on Bitcoin-NGZiyu Wang, Jianwei Liu, Zongyang Zhang, Yanting Zhang, Jiayuan Yin, Hui Yu, Wenmao Liu. 322-339 [doi]
- Field Extension in Secret-Shared Form and Its Applications to Efficient Secure ComputationRyo Kikuchi, Nuttapong Attrapadung, Koki Hamada, Dai Ikarashi, Ai Ishida, Takahiro Matsuda 0002, Yusuke Sakai 0001, Jacob C. N. Schuldt. 343-361 [doi]
- Efficient Secure Multi-Party Protocols for Decision Tree ClassificationAtsunori Ichikawa, Wakaha Ogata, Koki Hamada, Ryo Kikuchi. 362-380 [doi]
- The Wiener Attack on RSA Revisited: A Quest for the Exact BoundWilly Susilo, Joseph Tonien, Guomin Yang. 381-398 [doi]
- Function-Dependent Commitments from Homomorphic AuthenticatorsLucas Schabhüser, Denis Butin, Johannes Buchmann 0001. 399-418 [doi]
- Security Against Subversion in a Multi-surveillant SettingGeng Li, Jianwei Liu, Zongyang Zhang. 419-437 [doi]
- Dimensionality Reduction and Visualization of Network Intrusion Detection DataWei Zong, Yang-Wai Chow, Willy Susilo. 441-455 [doi]
- DOCSDN: Dynamic and Optimal Configuration of Software-Defined NetworksTimothy Curry, Devon Callahan, Benjamin Fuller, Laurent Michel. 456-474 [doi]
- A Low Overhead Error Correction Algorithm Using Random Permutation for SRAM PUFsLiang Zheng, Donglei Han, Zongbin Liu, Cunqing Ma, Lingchen Zhang, Churan Tang. 475-493 [doi]
- Practical Dynamic Taint Tracking for Exploiting Input Sanitization Error in Java ApplicationsMohammadreza Ashouri. 494-513 [doi]
- AMOGAP: Defending Against Man-in-the-Middle and Offline Guessing Attacks on PasswordsJaryn Shen, Timothy T. Yuen, Kim-Kwang Raymond Choo, Qingkai Zeng. 514-532 [doi]
- MineAuth: Mining Behavioural Habits for Continuous Authentication on a SmartphoneXiaojian Pang, Li Yang, Maozhen Liu, Jianfeng Ma. 533-551 [doi]
- Related-Key Boomerang Attacks on GIFT with Automated Trail Search Including BCT EffectYunwen Liu, Yu Sasaki. 555-572 [doi]
- Fast Chosen-Key Distinguish Attacks on Round-Reduced AES-192Chunbo Zhu, Gaoli Wang, Boyu Zhu. 573-587 [doi]
- A Highly Secure MAC from Tweakable Blockciphers with Support for Short TweaksYusuke Naito 0001. 588-606 [doi]
- Witness Encryption with (Weak) Unique Decryption and Message Indistinguishability: Constructions and ApplicationsDongxue Pan, Bei Liang, Hongda Li, Peifang Ni. 609-619 [doi]
- Speeding up Scalar Multiplication on Koblitz Curves Using \mu _4 CoordinatesWeixuan Li, Wei Yu 0008, Bao Li, Xuejun Fan. 620-629 [doi]
- Constructing Hyperelliptic Covers for Elliptic Curves over Quadratic Extension FieldsXuejun Fan, Song Tian, Bao Li, Weixuan Li. 630-638 [doi]
- Secure and Compact Elliptic Curve CryptosystemsYaoan Jin, Atsuko Miyaji. 639-650 [doi]
- A Quantitative Study of Attribute Based Correlation in Micro-databases and Its Effects on PrivacyDebanjan Sadhya, Bodhi Chakraborty. 651-659 [doi]
- Tagging Malware Intentions by Using Attention-Based Sequence-to-Sequence Neural NetworkYi-Ting Huang, Yu-Yuan Chen, Chih-Chun Yang, Yeali S. Sun, Shun-Wen Hsiao, Meng Chang Chen. 660-668 [doi]
- A Novel Semi-supervised Adaboost Technique Based on Improved Tri-trainingDunming Li, Jenwen Mao, Fuke Shen. 669-678 [doi]
- Automated Cash Mining Attacks on Mobile Advertising NetworksWoojoong Ji, Taeyun Kim, Kuyju Kim, Hyoungshick Kim. 679-686 [doi]