Secure key-aggregation authorized searchable encryption Haijiang WangXiaolei DongNanyuan Cao Letter 12 February 2019 Article: 39111
Decomposition of nonlinear feedback shift registers based on Boolean networks Jianghua ZhongDongdai Lin Letter 03 January 2019 Article: 39110
Real-time state recovery attack against MORUS in nonce-misuse setting Tairong ShiJie Guan Letter 03 January 2019 Article: 39109
High-efficient generation algorithm for large random active shield Ruishan XinYidong YuanYiqiang Zhao Letter 08 January 2019 Article: 39108
Finding the best answer: measuring the optimization of public and authoritative DNS Jia ZhangHaixin DuanJianping Wu Letter 01 November 2018 Article: 39107
UMBRELLA: user demand privacy preserving framework based on association rules and differential privacy in social networks Chunliu YanZiyi NiQinyu Zhang Letter 18 October 2018 Article: 39106
Side channel attack of multiplication in GF(q)–application to secure RSA-CRT Sen XuWeija WangDawu Gu Letter 18 October 2018 Article: 39105
Some characteristics of logistic map over the finite field Bo YangXiaofeng Liao Letter 10 October 2018 Article: 39104
A rejection sampling algorithm for off-centered discrete Gaussian distributions over the integers Yusong DuBaodian WeiHuang Zhang Letter 11 September 2018 Article: 39103
A revised CVSS-based system to improve the dispersion of vulnerability risk scores Chensi WuTao WenYuqing Zhang Letter 11 September 2018 Article: 39102
A more compact multi-id identity-based FHE scheme in the standard model and its applications Xueqing WangBiao WangRui Xue Letter 11 September 2018 Article: 39101
Universally composable secure geographic area verification without pre-shared secret Junwei ZhangNing LuChao Yang Research Paper 29 January 2019 Article: 32113
Pseudo random oracle of Merkle-Damgård hash functions revisited Kamel AmmourLei WangDawu Gu Research Paper 29 January 2019 Article: 32112
Automatic search method for multiple differentials and its application on MANTIS Shiyao ChenRu LiuMeiqin Wang Research Paper 29 January 2019 Article: 32111
A novel approach to public-coin concurrent zero-knowledge and applications on resettable security Zhenbin YanYi Deng Research Paper 29 January 2019 Article: 32110
A regulated digital currency Yanbing WuHaining FanGuangnan Zou Research Paper 29 January 2019 Article: 32109
New observation on the key schedule of RECTANGLE Hailun YanYiyuan LuoXuejia Lai Research Paper 29 January 2019 Article: 32108
A new discrete Fourier transform randomness test Meihui ChenHua ChenDengguo Feng Research Paper 25 January 2019 Article: 32107
CATH: an effective method for detecting denial-of-service attacks in software defined networks Yi GuoFu MiaoYu Wang Research Paper 12 February 2019 Article: 32106
Partially known information attack on SM2 key exchange protocol Wei WeiJiazhe ChenBeibei Wang Research Paper 24 January 2019 Article: 32105
Identity-based public auditing for cloud storage systems against malicious auditors via blockchain Jingting XueChunxiang XuJianfeng Ma Research Paper 24 January 2019 Article: 32104
EFFECT: an efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid Zhitao GuanYue ZhangShui Yu Research Paper 11 January 2019 Article: 32103
Related-tweakey impossible differential attack on reduced-round Deoxys-BC-256 Rui ZongXiaoyang DongXiaoyun Wang Research Paper 31 January 2019 Article: 32102
Improved impossible differential cryptanalysis of large-block Rijndael Ya LiuYifan ShiZhiqiang Zeng Research Paper 06 July 2018 Article: 32101