Abstract is missing.
- Polytopic Attack on Round-Reduced Simon32/64 Using Deep LearningHeng-Chuan Su, Xuan Yong Zhu, Duan Ming. 3-20 [doi]
- DAS-AST: Defending Against Model Stealing Attacks Based on Adaptive Softmax TransformationJinyin Chen, Changan Wu, Shijing Shen, Xuhong Zhang 0005, Jianhao Chen. 21-36 [doi]
- Bidirectional RNN-Based Few-Shot Training for Detecting Multi-stage AttackBowei Jia, Yunzhe Tian, Di Zhao, Xiaojin Wang, Chenyang Li, Wenjia Niu, Endong Tong, Jiqiang Liu. 37-52 [doi]
- An Illumination Modulation-Based Adversarial Attack Against Automated Face Recognition SystemZhaojie Chen, Puxi Lin, Zoe Lin Jiang, Zhanhang Wei, Sichen Yuan, Junbin Fang. 53-69 [doi]
- Generic Construction of Server-Aided Revocable Hierarchical Identity-Based EncryptionYanyan Liu, Yiru Sun. 73-82 [doi]
- Fully Secure ABE with Outsourced Decryption against Chosen Ciphertext AttackTi Wang, Yongbin Zhou, Hui Ma 0002, Yuejun Liu, Rui Zhang. 83-103 [doi]
- An Efficient CCA-Secure Access Control Encryption for Any PolicyGaosheng Tan, Rui Zhang, Hui Ma 0002, Yang Tao 0001. 104-112 [doi]
- Distributed Key Generation for SM9-Based SystemsRui Zhang 0002, Huan Zou, Cong Zhang, Yuting Xiao, Yang Tao 0001. 113-129 [doi]
- Chosen Ciphertext Attacks Secure Inner-Product Functional Encryption from Learning with Errors AssumptionKelly Yun, Rui Xue 0001. 133-147 [doi]
- CSURF-TWO: CSIDH for the Ratio (2 : 1)Xuejun Fan, Song Tian, Xiu Xu, Bao Li. 148-156 [doi]
- Group Key Exchange Protocols from Supersingular IsogeniesXuejun Fan, Xiu Xu, Bao Li. 157-173 [doi]
- A Paid Message Forwarding Scheme Based on Social NetworkYifu Geng, Bo Qin, Wenchang Shi, Qianhong Wu. 177-192 [doi]
- WebSmell: An Efficient Malicious HTTP Traffic Detection Framework Using Data AugmentationTieming Chen, Zhengqiu Weng, Yunpeng Chen, Chenqiang Jin, Mingqi Lv, Tiantian Zhu, Jianhong Lin. 193-201 [doi]
- Blockchain-Based Efficient Public Integrity Auditing for Cloud Storage Against Malicious AuditorsShanshan Li, Chunxiang Xu, Yuan Zhang 0006, Anjia Yang, Xinsheng Wen, Kefei Chen. 202-220 [doi]
- E-SGX: Effective Cache Side-Channel Protection for Intel SGX on Untrusted OSFan Lang, Huorong Li, Wei Wang, Jingqiang Lin, Fengwei Zhang, Wuqiong Pan, Qiongxiao Wang. 221-243 [doi]
- Public Verifiable Private Decision Tree PredictionHailong Wang, Yi Deng 0002, Xiang Xie. 247-256 [doi]
- P2A: Privacy Preserving Anonymous Authentication Based on Blockchain and SGXTianlin Song, Wei Wang, Fan Lang, Wenyi Ouyang, Qiongxiao Wang, Jingqiang Lin. 257-276 [doi]
- Spectrum Privacy Preserving for Social Networks: A Personalized Differential Privacy ApproachYang Liu, Yong Zeng 0002, Zhihong Liu, Jianfeng Ma 0001. 277-287 [doi]
- LPPRS: New Location Privacy Preserving Schemes Based on Ring Signature over Mobile Social NetworksCailing Cai, Tsz Hon Yuen, Handong Cui, Mingli Wu, Siu-Ming Yiu. 288-303 [doi]
- On the Structure Property of PCR's Adjacency Graph with a Prime Order and Its Application of Constructing M-SequencesCongwei Zhou, Jie Guan, Bin Hu, Kuan He. 307-317 [doi]
- Symmetric 2-Adic Complexity of Ding-Helleseth Generalized Cyclotomic Sequences of Period pqVladimir Edemskiy, Chenhuang Wu. 318-327 [doi]
- A Distinguisher for RNGs with LFSR Post-processingXinying Wu, Yuan Ma, Tianyu Chen, Na Lv. 328-343 [doi]
- On the k-Error Linear Complexities of De Bruijn SequencesMing Li 0033, Yupeng Jiang, Dongdai Lin. 344-356 [doi]
- A Lattice-Based Fully Dynamic Group Signature Scheme Without NIZKYiru Sun, Yanyan Liu. 359-367 [doi]
- An Efficient Blind Signature Scheme Based on SM2 Signature AlgorithmYudi Zhang 0001, Debiao He, Fangguo Zhang, Xinyi Huang, Dawei Li. 368-384 [doi]
- A New Efficient Quantum Digital Signature Scheme for Multi-bit MessagesYukun Wang, Mingqiang Wang. 385-394 [doi]
- An Improvement of Multi-exponentiation with Encrypted Bases Argument: Smaller and FasterYi Liu, Qi Wang, Siu-Ming Yiu. 397-414 [doi]
- Number Theoretic Transform: Generalization, Optimization, Concrete Analysis and ApplicationsZhichuang Liang, Shiyu Shen, Yuantao Shi, Dongni Sun, Chongxuan Zhang, Guoyun Zhang, Yunlei Zhao, Zhixiang Zhao. 415-432 [doi]
- On Galois NFSRs Equivalent to Fibonacci OnesJianghua Zhong, Yingyin Pan, Dongdai Lin. 433-449 [doi]
- Bagua: A NFSR-Based Stream Cipher Constructed Following Confusion and Diffusion PrinciplesLin Tan 0010, Xuanyong Zhu, Wenfeng Qi. 453-465 [doi]
- Provable Related-Key Security of Contracting Feistel NetworksWenqi Yu, Yuqing Zhao, Chun Guo. 466-490 [doi]
- Revisiting Construction of Online Cipher in Hash-ECB-Hash StructureGang Liu, Peng Wang, Rong Wei, Dingfeng Ye. 491-503 [doi]