Regular Papers

1. Constructing Isogenies on Extended Jacobi Quartic Curves
Xiu Xu, Wei Yu, Kunpeng Wang and Xiaoyang He

2. Leakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability Obfuscation
Wenpan Jing, Bao Li and Xianhui Lu

3. Partial bits exposure attacks on a new commitment scheme based on the Zagier polynomial
Xiaona Zhang, Li-Ping Wang and Jun Xu

4. Achieving IND-CCA Security for Functional Encryption for Inner Products
Shiwei Zhang, Yi Mu and Guomin Yang

5. Biclique Attack of Block Cipher SKINNY
Yafei Zheng and Wenling Wu

6. Secure Collaborative Outsourced k-Nearest Neighbor Classication with Multiple Owners in Cloud Environment
Hong Rong, Huimei Wang, Jian Liu and Ming Xian

7. Fully Homomorphic Encryption for Point Numbers
Seiko Arita and Shota Nakasato

8. On Fast Calculation of Addition Chains for Isogeny-Based Cryptography
Brian Koziel, Reza Azarderakhsh, David Jao and Mehran Mozaffari Kermani

9. Bounded-Retrieval Model with Keys Derived from Private Data
Konrad Durnoga, Stefan Dziembowski, Tomasz Kazana, Michal Zajac and Maciej Zdanowicz

10. A lightweight authentication and key agreement scheme for mobile satellite communication systems
Xinghua Wu, Aixin Zhang, Jianhua Li, Weiwei Zhao and Yuchen Liu

11. Impossible Differentials of SPN Ciphers
Xuan Shen, Guoqiang Liu, Bing Sun and Chao Li

12. Improved Integral and Zero-correlation Linear Cryptanalysis of CLEFIA Block Cipher
Wentan Yi, Baofeng Wu, Shaozhen Chen and Dongdai Lin

13. Cyber-Attacks on Remote State Estimation in Industrial Control System: A Game-based Framework
Cong Chen and Dongdai Lin

14. Identity-Based Blind Signature from Lattices in Standard Model
Wen Gao

15. Improved Differential Cryptanalysis of CAST-128 and CAST-256
Shaomei Wang, Tingting Cui and Meiqin Wang

16. On Constructing Parameterized Families of Pairing-Friendly Elliptic Curves with ρ = 1
Meng Zhang, Zhi Hu and Maozhi Xu

17. Multi-Bit Levelled Homomorphic Encryption via Dual Learning with Errors
Zengpeng Li, Chunguang Ma, Eduardo Morais and Gang Du

18. An Improved Analysis on Three Variants of the RSA Cryptosystem
Liqiang Peng, Lei Hu and Yao Lu

19. Revisiting the Security Proof of QUAD Stream Cipher: Some Corrections and Tighter Bounds
Goutam Paul and Abhiroop Sanyal

20. SPF: A New Family of Efficient Format-Preserving Encryption Algorithms
Donghoon Chang, Mohona Ghosh, Kishan Chand Gupta, Arpan Jati, Abhishek Kumar, Dukjae Moon, Indranil Ghosh Ray and Somitra Kumar Sanadhya

21. Video Steganalysis Based on Centralized Error Detection in Spatial Domain
Yu Wang, Yun Cao and Xianfeng Zhao

22. Provably Secure Fair Mutual Private Set Intersection Cardinality Utilizing Bloom Filter
Sumit Kumar Debnath and Ratna Dutta

23. Cryptanalysis of a homomorphic encryption over integers
Jingguo Bi, Jiayang Liu and Xiaoyun Wang

24. Log your car: Reliable maintenance services record
Hafizah Mansor, Konstantinos Markantonakis, Raja Naeem Akram, Keith Mayes and Iakovos Gurulian.

25. On Privacy-Preserving Biometric Authentication
Aysajan Abidin

26. How to Make the Cramer-Shoup Cryptosystem Secure Against Linear Related-Key Attacks
Baodong Qin, Shuai Han, Yu Chen, Shengli Liu and Zhuo Wei

27. One-Round Cross-Domain Group Key Exchange Protocol in the Standard Model
Xiao Lan, Jing Xu, Hui Guo and Zhenfeng Zhang

28. Key Predistribution Schemes Using Bent functions in Distributed Sensor Networks
Deepak Kumar Dalai and Pinaki Sarkar

29. Cryptanalysis of A Non-Commuting Cryptography Class Based on Matrix Power Function
Jinhui Liu, Huanguo Zhang and Jianwei Jia

30. A Coding Solution to Resiliency against Limited View Algebraic Tampering
Fuchun Lin, Rei Safavi-Naini and Pengwei Wang

31. Transposition of AES Key Schedule
Jialin Huang, Hailun Yan and Xuejia Lai

32. Evaluating Entropy for TRNGs: Fast, Robust and Provably Secure
Maciej Skorski


Short Papers

33. Improvement and Application of SM2 and SM4 Hybrid Encryption Algorithm
Jianlong Liu, Yulan Zhao, Wengang Jia and Yaokuo Wang

34. Block Transformations of Paired Measures on Bit Vectors for Symmetric Clusters
Jeffrey Zheng

35. Secure Searchable Public Key Encryption Scheme against Insider Keyword Guessing Attack from Indistinguishability Obfuscation
Lixue Sun, Chunxiang Xu, Yuan Zhang, Mingwu Zhang and Run Xie

36. Sphere Decoding Algorithm Based on Improved Radius Selection
Na Zhou and Ping Wang

37. A deterministic approach for finding cube variables for cube attack
Dibyendu Roy and Sourav Mukhopadhyay

38. Related-Key Chosen IV Attack on stream cipher Espresso
Mingxing Wang, Ming Li and Dongdai Lin

39. The Lightest 4x4 MDS Matrices over GL(4, F2)
Ting Li, Jian Bai, Yao Sun, Dingkang Wang and Dongdai Lin

40. Adaptive Security of Broadcast Encryption, Revisited
Bingxin Zhu, Puwen Wei and Mingqiang Wang

41. An Empirical Study of Insecure Communication in Android Apps
Yueheng Zhang, Junliang Shu, Yuanyuan Zhang, Juanru Li, Qing Wang and Dawu Gu