Abstract is missing.
- Lattice Blind Signatures with Forward SecurityHuy Quoc Le, Dung Hoang Duong, Willy Susilo, Ha Thanh Nguyen Tran, Viet Cuong Trinh, Josef Pieprzyk, Thomas Plantard. 3-22 [doi]
- Optimized Arithmetic Operations for Isogeny-Based Cryptography on Huff CurvesYan Huang, Fangguo Zhang, Zhi Hu, Zhijie Liu. 23-40 [doi]
- On Lattice-Based Interactive Protocols: An Approach with Less or No AbortsNabil Alkeilani Alkadri, Rachid El Bansarkhani, Johannes Buchmann 0001. 41-61 [doi]
- SKCN: Practical and Flexible Digital Signature from Module LatticeBoru Gong, Leixiao Cheng, Yunlei Zhao. 62-81 [doi]
- Cloud-Assisted Asynchronous Key Transport with Post-Quantum SecurityGareth T. Davies, Herman Galteland, Kristian Gjøsteen, Yao Jiang. 82-101 [doi]
- Rotational-XOR Cryptanalysis of Simon-Like Block CiphersJinyu Lu, Yunwen Liu, Tomer Ashur, Bing Sun, Chao Li. 105-124 [doi]
- A New Improved AES S-box with Enhanced PropertiesAbderrahmane Nitaj, Willy Susilo, Joseph Tonien. 125-141 [doi]
- Galaxy: A Family of Stream-Cipher-Based Space-Hard CiphersYuji Koike, Kosei Sakamoto, Takuya Hayashi, Takanori Isobe 0001. 142-159 [doi]
- Automated Search for Block Cipher Differentials: A GPU-Accelerated Branch-and-Bound AlgorithmWei-Zhu Yeoh, Je Sen Teh, Jiageng Chen. 160-179 [doi]
- From Rerandomizability to Sequential Aggregation: Efficient Signature Schemes Based on SXDH AssumptionSanjit Chatterjee, R. Kabaleeshwaran. 183-203 [doi]
- Parallel Implementation of SM2 Elliptic Curve Cryptography on Intel Processors with AVX2Junhao Huang, Zhe Liu 0001, Zhi Hu, Johann Großschädl. 204-224 [doi]
- Improved Security Proof for the Camenisch-Lysyanskaya Signature-Based Synchronized Aggregate Signature SchemeMasayuki Tezuka, Keisuke Tanaka. 225-243 [doi]
- DCONST: Detection of Multiple-Mix-Attack Malicious Nodes Using Consensus-Based Trust in IoT NetworksZuchao Ma, Liang Liu 0006, Weizhi Meng. 247-267 [doi]
- A Black-Box Attack on Neural Networks Based on Swarm Evolutionary AlgorithmXiaolei Liu, Teng Hu, Kangyi Ding, Yang Bai, Weina Niu, Jiazhong Lu. 268-284 [doi]
- A Blockchain-Based Resource Supervision Scheme for Edge Devices Under Cloud-Fog-End Computing ModelsTongchen Wang, Jianwei Liu, Dawei Li, Qianhong Wu. 285-305 [doi]
- SHOSVD: Secure Outsourcing of High-Order Singular Value DecompositionJinrong Chen, Lin Liu, Rongmao Chen, Wei Peng. 309-329 [doi]
- Efficient Forward-Secure Threshold Public Key EncryptionRafael Kurek. 330-349 [doi]
- A New Targeted Password Guessing ModelZhijie Xie, Min Zhang, Anqi Yin, Zhenhan Li. 350-368 [doi]
- Multi-input Laconic Function EvaluationBo Pang, Long Chen, Xiong Fan, Qiang Tang. 369-388 [doi]
- Arbitrary-Centered Discrete Gaussian Sampling over the IntegersYusong Du, Baoying Fan, Baodian Wei. 391-407 [doi]
- New Assumptions and Efficient Cryptosystems from the e-th Power Residue SymbolXiaopeng Zhao, Zhenfu Cao, Xiaolei Dong, Jun Shao, Licheng Wang, Zhusen Liu. 408-424 [doi]
- Revisiting the Hardness of Binary Error LWEChao Sun, Mehdi Tibouchi, Masayuki Abe. 425-444 [doi]
- PALOR: Poisoning Attacks Against Logistic RegressionJialin Wen, Benjamin Zi Hao Zhao, Minhui Xue, Haifeng Qian. 447-460 [doi]
- DeepCapture: Image Spam Detection Using Deep Learning and Data AugmentationBedeuro Kim, Sharif Abuadbba, Hyoungshick Kim. 461-475 [doi]
- Rolling Attack: An Efficient Way to Reduce Armors of Office Automation DevicesLinyu Li, Lei Yu, Can Yang, Jie Gou, Jiawei Yin, Xiaorui Gong. 479-504 [doi]
- Improving Key Mismatch Attack on NewHope with Fewer QueriesSatoshi Okada, Yuntao Wang 0002, Tsuyoshi Takagi. 505-524 [doi]
- A Novel Duplication Based Countermeasure to Statistical Ineffective Fault AnalysisAnubhab Baksi, Vinay B. Y. Kumar, Banashri Karmakar, Shivam Bhasin, Dhiman Saha, Anupam Chattopadhyay. 525-542 [doi]
- Design and Evaluation of Enumeration Attacks on Package Tracking SystemsHanbin Jang, Woojoong Ji, Simon S. Woo, Hyoungshick Kim. 543-559 [doi]
- JTaint: Finding Privacy-Leakage in Chrome ExtensionsMengfei Xie, Jianming Fu, Jia He, Chenke Luo, Guojun Peng. 563-583 [doi]
- Unlinkable Updatable Databases and Oblivious Transfer with Access ControlAditya Damodaran, Alfredo Rial. 584-604 [doi]
- Secure and Compact Elliptic Curve LR Scalar MultiplicationYaoan Jin, Atsuko Miyaji. 605-618 [doi]
- User Identity Linkage Across Social Networks via Community Preserving Network EmbeddingXiaoyu Guo, Yan Liu, Lian Liu, Guangsheng Zhang, Jing Chen, Yuan Zhao. 621-630 [doi]
- Improvement of Attribute-Based Encryption Using Blakley Secret SharingZhe Xia, Bo Yang, Yanwei Zhou, Mingwu Zhang, Yi Mu 0001. 631-641 [doi]
- Recovering CRT-RSA Secret Keys from Noisy Square-and-Multiply Sequences in the Sliding Window MethodKento Oonishi, Noboru Kunihiro. 642-652 [doi]
- Security Analysis on Tangle-Based Blockchain Through SimulationBozhi Wang, Qin Wang, Shiping Chen 0001, Yang Xiang. 653-663 [doi]
- Tightly Secure Chameleon Hash Functions in the Multi-user Setting and Their ApplicationsXiangyu Liu, Shengli Liu, Dawu Gu. 664-673 [doi]