Abstract is missing.
- Concurrent Signatures from a Variety of KeysGeorge Teseleanu. 3-22 [doi]
- A Generic Construction of Fuzzy SignatureJie Song, Yunhua Wen. 23-41 [doi]
- Identity Based Linkable Ring Signature with Logarithmic SizeMohamed Nassurdine, Huang Zhang, Fangguo Zhang. 42-60 [doi]
- Security Analysis of DGM and GM Group Signature Schemes Instantiated with XMSS-TMahmoud Yehia, Riham AlTawy, T. Aaron Gulliver. 61-81 [doi]
- UC-Secure Cryptographic Reverse Firewall-Guarding Corrupted Systems with the Minimum Trusted ModuleGeng Li, Jianwei Liu 0001, Zongyang Zhang, Yanting Zhang 0002. 85-110 [doi]
- A Message Franking ChannelLoïs Huguenin-Dumittan, Iraklis Leontiadis. 111-128 [doi]
- SparrowHawk: Memory Safety Flaw Detection via Data-Driven Source Code AnnotationYunlong Lyu, Wang Gao, Siqi Ma, Qibin Sun, Juanru Li. 129-148 [doi]
- A New Approach for Finding Low-Weight Polynomial MultiplesLaila El Aimani. 151-170 [doi]
- Differential-Linear Cryptanalysis of the Lightweight Crytographic Algorithm KNOTShichang Wang, Shiqi Hou, Meicheng Liu, Dongdai Lin. 171-190 [doi]
- Revisit Two Memoryless State-Recovery Cryptanalysis Methods on A5/1Mingxing Wang, Yonglin Hao. 191-211 [doi]
- More Accurate Division Property Propagations Based on Optimized Implementations of Linear LayersChunlei Hong, Shasha Zhang, Siwei Chen, Da Lin, Zejun Xiang 0001. 212-232 [doi]
- Security Analysis on an ElGamal-Like Multivariate Encryption Scheme Based on Isomorphism of PolynomialsYasuhiko Ikematsu, Shuhei Nakamura, Bagus Santoso, Takanori Yasuda. 235-250 [doi]
- Attacking ECDSA Leaking Discrete Bits with a More Efficient LatticeShuaigang Li, Shuqin Fan, Xianhui Lu. 251-266 [doi]
- A Simple Post-Quantum Non-interactive Zero-Knowledge Proof from Garbled CircuitsHongrui Cui, Kaiyi Zhang. 269-280 [doi]
- Improved Zero-Knowledge Argument of Encrypted Extended PermutationYi Liu, Qi Wang 0012, Siu-Ming Yiu. 281-298 [doi]
- Isomorphism and Equivalence of Galois Nonlinear Feedback Shift RegistersWenhui Kong, Jianghua Zhong, Dongdai Lin. 301-315 [doi]
- Elliptic Curve and Integer FactorizationZhizhong Pan, Xiao Li. 316-330 [doi]
- On the Linear Complexity of Feedforward Clock-Controlled SequenceYangpan Zhang, MaoZhi Xu. 331-348 [doi]
- On Characterization of Transparency Order for (n, m)-functionsYu Zhou 0012, Yongzhuang Wei, Hailong Zhang 0001, Luyang Li, Enes Pasalic, Wenling Wu. 351-370 [doi]
- p)Qun-Xiong Zheng, Yupeng Jiang, Dongdai Lin, Wen-Feng Qi 0001. 371-383 [doi]
- On the Provable Security Against Truncated Impossible Differential Cryptanalysis for AES in the Master-Key SettingXueping Yan, Lin Tan 0003, Hong Xu, Wenfeng Qi. 384-398 [doi]
- Adaptive Side-Channel Analysis Model and Its Applications to White-Box Block Cipher ImplementationsYufeng Tang, Zheng Gong, Tao Sun, Jinhai Chen, Fan Zhang. 399-417 [doi]
- Fully Secure Lattice-Based ABE from Noisy Linear Functional EncryptionGeng Wang, Ming Wan, Zhen Liu 0008, Dawu Gu. 421-441 [doi]
- Revocable Identity-Based Encryption with Server-Aided Ciphertext Evolution from LatticesYanhua Zhang, Ximeng Liu, Yupu Hu, Huiwen Jia. 442-465 [doi]
- Homomorphic Modular Reduction and Improved Bootstrapping for BGV SchemeRuiqi Li, Chunfu Jia. 466-484 [doi]
- Privacy Preserving OpenPGP Public Key Distribution with Spamming ResistanceWenyuan Li, Wei Wang, Jingqiang Lin, Qiongxiao Wang, Wenjie Wang. 487-506 [doi]
- Collaborative Verifiable Delay FunctionsLiam Medley, Elizabeth A. Quaglia. 507-530 [doi]
- SMCOS: Fast and Parallel Modular Multiplication on ARM NEON Architecture for ECCWenjie Wang, Wei Wang, Jingqiang Lin, Yu Fu, Lingjia Meng, Qiongxiao Wang. 531-550 [doi]