Cover attacks for elliptic curves with cofactor two Song TianBao LiWei Yu OriginalPaper 20 January 2018 Pages: 2451 - 2468
Nonlinear diffusion layers Yunwen LiuVincent RijmenGregor Leander OriginalPaper 20 January 2018 Pages: 2469 - 2484
On self-dual negacirculant codes of index two and four Minjia ShiLiqin QianPatrick Solé OriginalPaper 22 January 2018 Pages: 2485 - 2494
Reusable fuzzy extractor from the decisional Diffie–Hellman assumption Yunhua WenShengli LiuShuai Han OriginalPaper 25 January 2018 Pages: 2495 - 2512
Three-weight ternary linear codes from a family of cyclic difference sets Zhengchun Zhou OriginalPaper 27 January 2018 Pages: 2513 - 2523
Practical witness encryption for algebraic languages or how to encrypt under Groth–Sahai proofs David DerlerDaniel Slamanig OriginalPaper 02 February 2018 Pages: 2525 - 2547
How to build time-lock encryption Jia LiuTibor JagerBogdan Warinschi OriginalPaper Open access 03 February 2018 Pages: 2549 - 2586
A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system Chunpeng GeWilly SusiloYunqing Shi OriginalPaper 05 February 2018 Pages: 2587 - 2603
Euclidean and Hermitian LCD MDS codes Claude CarletSihem MesnagerYanfeng Qi OriginalPaper 05 February 2018 Pages: 2605 - 2618
On explicit minimum weight bases for extended cyclic codes related to Gold functions I. Yu. MogilnykhF. I. Solov’eva OriginalPaper 17 February 2018 Pages: 2619 - 2627
Covering arrays of strength three from extended permutation vectors Jose Torres-JimenezIdelfonso Izquierdo-Marquez OriginalPaper 20 February 2018 Pages: 2629 - 2643
Multiset combinatorial batch codes Hui ZhangEitan YaakobiNatalia Silberstein OriginalPaper 23 February 2018 Pages: 2645 - 2660
Lexicodes over finite principal ideal rings Jared AntrobusHeide Gluesing-Luerssen OriginalPaper 23 February 2018 Pages: 2661 - 2676