Optimal model search for hardware-trojan-based bit-level fault attacks on block ciphers Xinjie ZhaoFan ZhangZheng Gong Letter 05 January 2018 Article: 039106
Verifiable random functions with Boolean function constraints Qianwen WangRongquan FengYan Zhu Letter 11 January 2018 Article: 039105
Efficient and secure outsourcing of bilinear pairings with single server Min DongYanli Ren Letter 13 September 2017 Article: 039104
Protecting white-box cryptographic implementations with obfuscated round boundaries Tao XuChuankun WuRuoxin Zhao Letter 25 August 2017 Article: 039103
Efficient flush-reload cache attack on scalar multiplication based signature algorithm Ping ZhouTao WangShize Guo Letter 16 August 2018 Article: 039102
Secure and efficient k-nearest neighbor query for location-based services in outsourced environments Haiqin WuLiangmin WangTao Jiang Letter 30 June 2017 Article: 039101
Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation Lixue SunChunxiang XuHongwei Li Highlight 23 August 2017 Article: 038106
Improved cryptanalysis of step-reduced SM3 Yanzhao ShenDongxia BaiHongbo Yu Highlight 23 August 2017 Article: 038105
More permutation polynomials with differential uniformity six Ziran TuXiangyong ZengZhiyong Zhang Highlight 25 August 2017 Article: 038104
Improved automatic search of impossible differentials for camellia with FL/FL −1 layers Yaoling DingXiaoyun WangWei Wang Highlight 23 August 2017 Article: 038103
Several classes of negabent functions over finite fields Gaofei WuNian LiXuefeng Liu Highlight 25 August 2017 Article: 038102
Construction of rotation symmetric bent functions with maximum algebraic degree Wenying ZhangGuoyong Han Highlight 16 August 2017 Article: 038101
A systematic framework to understand central bank digital currency Qian Yao Position Paper 03 January 2018 Article: 033101
Orthogonalized lattice enumeration for solving SVP Zhongxiang ZhengXiaoyun WangYang Yu Research Paper 17 January 2018 Article: 032115
An adaptive system for detecting malicious queries in web attacks Ying DongYuqing ZhangWenjie Wang Research Paper 02 February 2018 Article: 032114
A real-time inversion attack on the GMR-2 cipher used in the satellite phones Jiao HuRuilin LiChaojing Tang Research Paper 01 February 2018 Article: 032113
Privacy-preserving large-scale systems of linear equations in outsourcing storage and computation Dongmei LiXiaolei DongHaijiang Wang Research Paper 02 February 2018 Article: 032112
Similar operation template attack on RSA-CRT as a case study Sen XuXiangjun LuDawu Gu Research Paper 18 January 2018 Article: 032111
Impossible meet-in-the-middle fault analysis on the LED lightweight cipher in VANETs Wei LiVincent RijmenYa Liu Research Paper 12 January 2018 Article: 032110
A better bound for implicit factorization problem with shared middle bits Shixiong WangLongjiang QuShaojing Fu Research Paper 26 October 2017 Article: 032109
Improved meet-in-the-middle attacks on reduced-round Piccolo Ya LiuLiang ChengDawu Gu Research Paper 20 November 2017 Article: 032108
Bi-directional and concurrent proof of ownership for stronger storage services with de-duplication Taek-Young YounKu-Young Chang Research Paper 13 November 2017 Article: 032107
Impossible differential attack on Simpira v2 Rui ZongXiaoyang DongXiaoyun Wang Research Paper 30 August 2017 Article: 032106
Attacking OpenSSL ECDSA with a small amount of side-channel information Wenbo WangShuqin Fan Research Paper 30 August 2017 Article: 032105
Three new infinite families of bent functions Libo WangBaofeng WuDongdai Lin Research Paper 25 August 2017 Article: 032104
Countering JPEG anti-forensics based on noise level estimation Hui ZengJingjing YuSiwei Lyu Research Paper 14 August 2017 Article: 032103
Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability Kai ZhangHui LiXimeng Liu Research Paper 29 June 2017 Article: 032102
Right or wrong collision rate analysis without profiling: full-automatic collision fault attack An WangYu ZhangLiehuang Zhu Research Paper 22 May 2017 Article: 032101