Abstract is missing.
- Biclique Attack of Block Cipher SKINNYYafei Zheng, Wenling Wu. 3-17 [doi]
- Improved Differential Cryptanalysis of CAST-128 and CAST-256Shaomei Wang, Tingting Cui, Meiqin Wang. 18-32 [doi]
- Improved Integral and Zero-correlation Linear Cryptanalysis of CLEFIA Block CipherWentan Yi, Baofeng Wu, Shaozhen Chen, Dongdai Lin. 33-46 [doi]
- Impossible Differentials of SPN CiphersXuan Shen, Guoqiang Liu, Bing Sun, Chao Li. 47-63 [doi]
- SPF: A New Family of Efficient Format-Preserving Encryption AlgorithmsDonghoon Chang, Mohona Ghosh, Kishan Chand Gupta, Arpan Jati, Abhishek Kumar 0002, Dukjae Moon, Indranil Ghosh Ray, Somitra Kumar Sanadhya. 64-83 [doi]
- Transposition of AES Key ScheduleJialin Huang, Hailun Yan, Xuejia Lai. 84-102 [doi]
- Revisiting the Security Proof of QUAD Stream Cipher: Some Corrections and Tighter BoundsGoutam Paul, Abhiroop Sanyal. 103-116 [doi]
- Achieving IND-CCA Security for Functional Encryption for Inner ProductsShiwei Zhang, Yi Mu, Guomin Yang. 119-139 [doi]
- An Improved Analysis on Three Variants of the RSA CryptosystemLiqiang Peng, Lei Hu, Yao Lu, Hongyun Wei. 140-149 [doi]
- How to Make the Cramer-Shoup Cryptosystem Secure Against Linear Related-Key AttacksBaodong Qin, Shuai Han, Yu Chen, Shengli Liu, Zhuo Wei. 150-165 [doi]
- On Privacy-Preserving Biometric AuthenticationAysajan Abidin. 169-186 [doi]
- A Lightweight Authentication and Key Agreement Scheme for Mobile Satellite Communication SystemsXinghua Wu, Aixin Zhang, Jianhua Li, Weiwei Zhao, Yuchen Liu. 187-204 [doi]
- Identity-Based Blind Signature from Lattices in Standard ModelWen Gao 0001, Yupu Hu, Baocang Wang, Jia Xie. 205-218 [doi]
- Multi-bit Leveled Homomorphic Encryption via \mathsf Dual.LWE -BasedZengpeng Li, Chunguang Ma, Eduardo Morais, Gang Du. 221-242 [doi]
- Cryptanalysis of a Homomorphic Encryption Scheme Over IntegersJingguo Bi, Jiayang Liu, Xiaoyun Wang. 243-252 [doi]
- Fully Homomorphic Encryption for Point NumbersSeiko Arita, Shota Nakasato. 253-270 [doi]
- Bounded-Retrieval Model with Keys Derived from Private DataKonrad Durnoga, Stefan Dziembowski, Tomasz Kazana, Michal Zajac 0001, Maciej Zdanowicz. 273-290 [doi]
- Leakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability ObfuscationWenpan Jing, Xianhui Lu, Bao Li. 291-308 [doi]
- Codes for Detection of Limited View Algebraic TamperingFuchun Lin, Reihaneh Safavi-Naini, Pengwei Wang. 309-320 [doi]
- On Fast Calculation of Addition Chains for Isogeny-Based CryptographyBrian Koziel, Reza Azarderakhsh, David Jao, Mehran Mozaffari Kermani. 323-342 [doi]
- A Linear Algebra Attack on the Non-commuting Cryptography Class Based on Matrix Power FunctionJinhui Liu, Huanguo Zhang, Jianwei Jia. 343-354 [doi]
- Partial Bits Exposure Attacks on a New Commitment Scheme Based on the Zagier PolynomialXiaona Zhang, Li-Ping Wang. 357-366 [doi]
- Key Predistribution Schemes Using Bent Functions in Distributed Sensor NetworksDeepak Kumar Dalai, Pinaki Sarkar. 367-385 [doi]
- One-Round Cross-Domain Group Key Exchange Protocol in the Standard ModelXiao Lan, Jing Xu, Hui Guo, Zhenfeng Zhang. 386-400 [doi]
- On Constructing Parameterized Families of Pairing-Friendly Elliptic Curves with \rho =1Meng Zhang, Zhi Hu, MaoZhi Xu. 403-415 [doi]
- Constructing Isogenies on Extended Jacobi Quartic CurvesXiu Xu, Wei Yu 0008, Kunpeng Wang, Xiaoyang He. 416-427 [doi]
- Cyber-Attacks on Remote State Estimation in Industrial Control System: A Game-Based FrameworkCong Chen, Dongdai Lin. 431-450 [doi]
- Secure Collaborative Outsourced k-Nearest Neighbor Classification with Multiple Owners in Cloud EnvironmentHong Rong, Huimei Wang, Jian Liu, Wei Wu, Jialu Hao, Ming-xian. 451-471 [doi]
- Video Steganalysis Based on Centralized Error Detection in Spatial DomainYu Wang, Yun Cao, Xianfeng Zhao. 472-483 [doi]
- Log Your Car: Reliable Maintenance Services RecordHafizah Mansor, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes, Iakovos Gurulian. 484-504 [doi]
- Provably Secure Fair Mutual Private Set Intersection Cardinality Utilizing Bloom FilterSumit Kumar Debnath, Ratna Dutta. 505-525 [doi]
- Evaluating Entropy for True Random Number Generators: Efficient, Robust and Provably SecureMaciej Skorski. 526-541 [doi]