Abstract is missing.
- Revocable and Linkable Ring SignatureXinyu Zhang, Joseph K. Liu, Ron Steinfeld, Veronika Kuchta, Jiangshan Yu. 3-27 [doi]
- Efficient Password-Authenticated Key Exchange from RLWE Based on Asymmetric Key ConsensusYingshan Yang, Xiaozhuo Gu, Bin Wang, Taizhong Xu. 31-49 [doi]
- A Lattice-Based Certificateless Public Key Encryption with Equality Test in Standard ModelDung Hoang Duong, Willy Susilo, Minh Kim Bui, Thanh Xuan Khuc. 50-65 [doi]
- Attribute-Based Keyword Search from LatticesJie Li, Mimi Ma, Jiang Zhang, Shuqin Fan, Shuaigang Li. 66-85 [doi]
- Group Key Exchange from CSIDH and Its Application to Trusted Setup in Supersingular Isogeny CryptosystemsTomoki Moriya, Katsuyuki Takashima, Tsuyoshi Takagi. 86-98 [doi]
- RoLMA: A Practical Adversarial Attack Against Deep Learning-Based LPR SystemsMingming Zha, Guozhu Meng, Chaoyang Lin, Zhe Zhou, Kai Chen. 101-117 [doi]
- A SeqGAN-Based Method for Mimicking AttackWeiqing Huang, Xiao Peng, Zhixin Shi. 118-133 [doi]
- Suzzer: A Vulnerability-Guided Fuzzer Based on Deep LearningYuyue Zhao, Yangyang Li, Tengfei Yang, Haiyong Xie 0001. 134-153 [doi]
- Symmetric Frame Cracking: A Powerful Dynamic Textual CAPTCHAs Cracking PolicyYueyao Chen, Qianjun Liu, Tianyu Du, Yuan Chen, Shouling Ji. 157-172 [doi]
- Invisible Poisoning: Highly Stealthy Targeted Poisoning AttackJinyin Chen, Haibin Zheng, Mengmeng Su, Tianyu Du, Chang-Ting Lin, Shouling Ji. 173-198 [doi]
- Privacy-Preserving and yet Robust Collaborative Filtering Recommender as a ServiceQiang Tang. 199-207 [doi]
- CAVAEva: An Engineering Platform for Evaluating Commercial Anti-malware Applications on SmartphonesHao Jiang, Weizhi Meng, Chunhua Su, Kim-Kwang Raymond Choo. 208-224 [doi]
- SymSem: Symbolic Execution with Time Stamps for DeobfuscationHuayi Li, Yuanyuan Zhang, Jianqiang Wang, Dawu Gu. 225-245 [doi]
- Elaphurus: Ensemble Defense Against Fraudulent Certificates in TLSBingyu Li, Wei Wang, Lingjia Meng, Jingqiang Lin, Xuezhong Liu, Congli Wang. 246-259 [doi]
- Improving Division Property Based Cube Attacks by Removing Invalid MonomialsSenshan Pan, Zhuhua Li, Liangmin Wang. 260-276 [doi]
- PPIDS: A Pyramid-Like Printer Intrusion Detection System Based on ATT&CK FrameworkHouhua He, Lei Yu, Weixia Cai, Xiaoyu Wang, Xiaorui Gong, Haoyu Wang, Chen Liu. 277-290 [doi]
- A Privacy Enhancing Scheme for Mobile Devices Based Secure Multi-party Computation SystemXueyi Yang, Na Lv, Tianyu Chen, Cunqing Ma, Limin Liu. 291-308 [doi]
- Consolidating Hash Power in Blockchain Shards with a ForestJun Zhao, Jiangshan Yu, Joseph K. Liu. 309-322 [doi]
- Evaluating the Cache Side Channel Attacks Against ECDSAZiQiang Ma, Quanwei Cai 0001, Jingqiang Lin, Jiwu Jing, Dingfeng Ye, Lingjia Meng. 325-345 [doi]
- Side-Channel Leakage of Alarm Signal for a Bulk-Current-Based Laser SensorYang Li 0001, Ryota Hatano, Sho Tada, Kohei Matsuda, Noriyuki Miura, Takeshi Sugawara, Kazuo Sakiyama. 346-361 [doi]
- Efficient Identity-Based Outsider Anonymous Public-Key Trace and Revoke with Constant Ciphertext-Size and Fast DecryptionMriganka Mandal, Ratna Dutta. 365-380 [doi]
- Generic Constructions of Revocable Identity-Based EncryptionXuecheng Ma, Dongdai Lin. 381-396 [doi]
- Certificateless Identity-Concealed Authenticated Encryption Under Multi-KGCChuang Li, Chunxiang Xu, Yunlei Zhao, Kefei Chen, Xiaojun Zhang. 397-415 [doi]
- A Pairing-Less Identity-Based Blind Signature with Message Recovery Scheme for Cloud-Assisted ServicesMahender Kumar, Satish Chand. 419-434 [doi]
- Group Signatures with Decentralized TracingTingting Lu, Jiangtao Li 0003, Lei Zhang, Kwok-Yan Lam. 435-442 [doi]
- MQ Aggregate Signature Schemes with Exact Security Based on UOV SignatureJiahui Chen, Jie Ling, Jianting Ning, Zhiniang Peng, Yang Tan. 443-451 [doi]
- Untraceability of Partial Blind and Blind Signature SchemesSwati Rawal, Sahadeo Padhye. 452-459 [doi]
- Improved Integral Attack on Generalized Feistel CipherZhichao Xu, Hong Xu, Xuejia Lai. 463-479 [doi]
- Enhanced Differential Cache Attacks on SM4 with Algebraic Analysis and Error-ToleranceXiaoxuan Lou, Fan Zhang 0010, Guorui Xu, Ziyuan Liang, Xinjie Zhao 0001, Shize Guo, Kui Ren 0001. 480-496 [doi]
- Round-Efficient Anonymous Password-Authenticated Key Exchange Protocol in the Standard ModelQihui Zhang, Wenfen Liu, Kang Yang, Xuexian Hu, Ying Mei. 499-516 [doi]
- Strong Authenticity with Leakage Under Weak and Falsifiable Physical AssumptionsFrancesco Berti, Chun Guo, Olivier Pereira, Thomas Peters, François-Xavier Standaert. 517-532 [doi]
- Improving ECDLP Computation in Characteristic 2Fangguo Zhang, Zhijie Liu, Ping Wang, Haibo Tian. 535-550 [doi]
- nVladimir Edemskiy, Nikita Sokolovskii. 551-559 [doi]