Abstract is missing.
- Extended Policy-Based Sanitizable SignaturesIsmail Afia, Riham AlTawy. 3-22 [doi]
- Practical Generic Construction of Fully Collision Resistant Chameleon Hash and InstantiationsSiyue Yao, Zhikang Xie, Man Ho Au. 23-43 [doi]
- Quasi-Linearly Homomorphic Signature for Data Integrity Auditing in Cloud StorageFutai Zhang, Yichi Huang, Wenjie Yang, Jinmei Tian. 44-65 [doi]
- Generalized Cryptanalysis of Cubic Pell RSAHao Kang, Mengce Zheng. 66-85 [doi]
- On Concrete Security Treatment of Signatures Based on Multiple Discrete LogarithmsGeorge Teseleanu. 86-106 [doi]
- Hierarchical Functional Encryption for Quadratic TransformationJun Zhao, Kai Zhang 0016, Junqing Gong 0001, Haifeng Qian. 107-126 [doi]
- Solving Modular Linear Equations via Automated Coppersmith and Its ApplicationsYansong Feng 0001, Zhen Liu, Abderrahmane Nitaj, Yanbin Pan. 127-146 [doi]
- How to Construct Public Timeline for RSA-Formed Time-Lock CryptographyHuixuan Jin, Cong Peng 0005, Jintao Fu, Min Luo 0002. 147-167 [doi]
- Permutation Argument via Bases TransformationYu Wang. 171-190 [doi]
- Efficient and Verifiable Multi-server Framework for Secure Information Classification and StorageZiqing Guo, Yaohui Wang, Xuanyu Jin, Xiuhua Wang, Yuanyuan He, Yueyue Dai. 191-210 [doi]
- Formal Analysis of WAPI Authentication and Key Agreement ProtocolZhongqi Lv, Hui Li 0070, Haisong Ye, Chi Ma, Jingjing Guan. 211-234 [doi]
- Committing Security of AEAD Based on Stream CipherXueqi Zhu, Yan Jia, Jun Xu, Peng Wang 0009. 237-256 [doi]
- Integral Attacks Against DIBO Structures: A Low-Complexity Key Extraction MethodXinming Zhu, Shihui Zheng, Zihao Han. 257-277 [doi]
- Cube Attacks Against Trivium, Kreyvium and ACORN with Practical ComplexityYanqi Chen, Ting Li, Yao Sun. 278-300 [doi]
- Improving the Search Algorithm for the Best Differential/Linear Trails of Bit-Permutation-Based CiphersJingsui Weng, Wentao Zhang, Ting Peng, Tianyou Ding. 301-321 [doi]
- A Note on Neutral Bits for ARX Ciphers from the Perspective of BCTJiahao Zhao, Qianqian Yang 0003, Ling Song 0001, Lei Hu. 322-341 [doi]
- An Automatic Search Method for 4-Bit Optimal S-Boxes Towards Considering Cryptographic Properties and Hardware Area SimultaneouslyHongtao Hu, Chenhao Jia, Qing Ling, Sijia Gong, Ting Wu 0001, Tingting Cui. 342-360 [doi]
- Revisiting Truncated Differential Attack from the Perspective of Equivalent Propagation Equations - Improved Attacks on TWINE and LBlockShiqi Hou, Muzhou Li, Kai Hu 0001, Shichang Wang, Bart Preneel. 361-381 [doi]
- Cryptanalysis of BAKSHEESH Block CipherShengyuan Xu, Siwei Chen 0005, Xiutao Feng, Zejun Xiang 0001, Xiangyong Zeng. 382-402 [doi]
- Quantum Cryptanalysis of Generalized Unbalanced Feistel Structures: Distinguisher and Key Recovery AttackBoyun Li, Qun Liu. 405-424 [doi]
- Simplified Periodic Distinguishers Searching: Application to GFS-4F/2F and TWINEJingwen Chen, Qun Liu 0006, Boyun Li, Jingbo Qiao, Jinliang Wang. 425-443 [doi]
- Fast Fourier Transform and Gaussian Sampling Instructions Designed for FALCON Digital SignatureTao-Yun Wang, Shuai-Yu Chen, Lu Li, Weijia Wang 0003. 444-463 [doi]
- Quantum Public-Key Encryption of Quantum States, and MoreTianshu Shan, Shujiao Cao, Rui Xue 0001. 464-484 [doi]