Vol. 61, No. 3, 2018 Cover Contents

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 2

Right or wrong collision rate analysis without profiling: full-automatic collision fault attack
Wang, An; Zhang, Yu; Tian, Weina; Wang, Qian; Zhang, Guoshuang; Zhu, Liehuang
Sci China Inf Sci, 2018, 61(3): 032101
Keywords: fault sensitivity analysis; right or wrong collision rate analysis; masking; collision attack
Cite as: Wang A, Zhang Y, Tian W N, et al. Right or wrong collision rate analysis without profiling: full-automatic collision fault attack. Sci China Inf Sci, 2018, 61(3): 032101, doi: 10.1007/s11432-016-0616-4

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 9

Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability
Zhang, Kai; Li, Hui; Ma, Jianfeng; Liu, Ximeng
Sci China Inf Sci, 2018, 61(3): 032102
Keywords: attribute-based encryption; multi-authority; ciphertext-policy; traceability; large universe
Cite as: Zhang K, Li H, Ma J F, et al. Efficient large-universe multi-authority ciphertext-policy attribute-based encryption with white-box traceability. Sci China Inf Sci, 2018, 61(3): 032102, doi: 10.1007/s11432-016-9019-8

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 1

Countering JPEG anti-forensics based on noise level estimation
Zeng, Hui; Yu, Jingjing; Kang, Xiangui; Lyu, Siwei
Sci China Inf Sci, 2018, 61(3): 032103
Keywords: game theory; quantization artifact; blocking artifact; JPEG forensics; anti-forensics; noise level estimation
Cite as: Zeng H, Yu J J, Kang X G, et al. Countering JPEG anti-forensics based on noise level estimation. Sci China Inf Sci, 2018, 61(3): 032103, doi: 10.1007/s11432-016-0426-1

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Three new infinite families of bent functions
Wang, Libo; Wu, Baofeng; Liu, Zhuojun; Lin, Dongdai
Sci China Inf Sci, 2018, 61(3): 032104
Keywords: bent function; Hadamard matrix; Kasami function; Gold-like function; Niho exponent
Cite as: Wang L B, Wu B F, Liu Z J, et al. Three new infinite families of bent functions. Sci China Inf Sci, 2018, 61(3): 032104, doi: 10.1007/s11432-016-0624-x

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Attacking OpenSSL ECDSA with a small amount of side-channel information
Wang, Wenbo; Fan, Shuqin
Sci China Inf Sci, 2018, 61(3): 032105
Keywords: ECDSA; OpenSSL; lattice attack; windowed non-adjacent form; hidden number problem; Flush plus Reload attack
Cite as: Wang W B, Fan S Q. Attacking OpenSSL ECDSA with a small amount of side-channel information. Sci China Inf Sci, 2018, 61(3): 032105, doi: 10.1007/s11432-016-9030-0

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 1

Impossible differential attack on Simpira v2
Zong, Rui; Dong, Xiaoyang; Wang, Xiaoyun
Sci China Inf Sci, 2018, 61(3): 032106
Keywords: Simpira-4; impossible differential attack; super S-box; the Even-Mansour construction; security claim
Cite as: Zong R, Dong X Y, Wang X Y. Impossible differential attack on Simpira v2. Sci China Inf Sci, 2018, 61(3): 032106, doi: 10.1007/s11432-016-9075-6

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 1

Bi-directional and concurrent proof of ownership for stronger storage services with de-duplication
Youn, Taek-Young; Chang, Ku-Young
Sci China Inf Sci, 2018, 61(3): 032107
Keywords: cloud storage; secure de-duplication; data out-source; proof of ownership; bi-directional and concurrent proof
Cite as: Youn T-Y, Chang K-Y. Bi-directional and concurrent proof of ownership for stronger storage services with de-duplication. Sci China Inf Sci, 2018, 61(3): 032107, doi: 10.1007/s11432-017-9116-x

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 1

Improved meet-in-the-middle attacks on reduced-round Piccolo
Liu, Ya; Cheng, Liang; Liu, Zhiqiang; Li, Wei; Wang, Qingju; Gu, Dawu
Sci China Inf Sci, 2018, 61(3): 032108
Keywords: block cipher; lightweight; Piccolo; meet-in-the-middle attack; distinguisher
Cite as: Liu Y, Cheng L, Liu Z Q, et al. Improved meet-in-the-middle attacks on reduced-round Piccolo. Sci China Inf Sci, 2018, 61(3): 032108, doi: 10.1007/s11432-016-9157-y

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

A better bound for implicit factorization problem with shared middle bits
Wang, Shixiong; Qu, Longjiang; Li, Chao; Fu, Shaojing
Sci China Inf Sci, 2018, 61(3): 032109
Keywords: RSA; implicit factorization problem; middle bits; lattice; Coppersmith's method
Cite as: Wang S X, Qu L J, Li C, et al. A better bound for implicit factorization problem with shared middle bits. Sci China Inf Sci, 2018, 61(3): 032109, doi: 10.1007/s11432-017-9176-5

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 1

Impossible meet-in-the-middle fault analysis on the LED lightweight cipher in VANETs
Li, Wei; Rijmen, Vincent; Tao, Zhi; Wang, Qingju; Chen, Hua; Liu, Yunwen; Li, Chaoyun; Liu, Ya
Sci China Inf Sci, 2018, 61(3): 032110
Keywords: VANETs; LED; lightweight cipher; impossible meet-in-the-middle; fault analysis
Cite as: Li W, Rijmen V, Tao Z, et al. Impossible meet-in-the-middle fault analysis on the LED lightweight cipher in VANETs. Sci China Inf Sci, 2018, 61(3): 032110, doi: 10.1007/s11432-017-9209-0

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 1

Similar operation template attack on RSA-CRT as a case study
Xu, Sen; Lu, Xiangjun; Zhang, Kaiyu; Li, Yang; Wang, Lei; Wang, Weijia; Gu, Haihua; Guo, Zheng; Liu, Junrong; Gu, Dawu
Sci China Inf Sci, 2018, 61(3): 032111
Keywords: side channel attack; template attack; RSA-CRT; hidden number problem; prime recovery
Cite as: Xu S, Lu X J, Zhang K Y, et al. Similar operation template attack on RSA-CRT as a case study. Sci China Inf Sci, 2018, 61(3): 032111, doi: 10.1007/s11432-017-9210-3

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Privacy-preserving large-scale systems of linear equations in outsourcing storage and computation
Li, Dongmei; Dong, Xiaolei; Cao, Zhenfu; Wang, Haijiang
Sci China Inf Sci, 2018, 61(3): 032112
Keywords: cloud computing; privacy-preserving; linear equations; encryption; security
Cite as: Li D M, Dong X L, Cao Z F, et al. Privacy-preserving large-scale systems of linear equations in outsourcing storage and computation. Sci China Inf Sci, 2018, 61(3): 032112, doi: 10.1007/s11432-017-9208-3

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

A real-time inversion attack on the GMR-2 cipher used in the satellite phones
Hu, Jiao; Li, Ruilin; Tang, Chaojing
Sci China Inf Sci, 2018, 61(3): 032113
Keywords: satellite phone; stream cipher; GMR-2; cryptanalysis; inversion attack
Cite as: Hu J, Li R L, Tang C J. A real-time inversion attack on the GMR-2 cipher used in the satellite phones. Sci China Inf Sci, 2018, 61(3): 032113, doi: 10.1007/s11432-017-9230-8

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 1

An adaptive system for detecting malicious queries in web attacks
Dong, Ying; Zhang, Yuqing; Ma, Hua; Wu, Qianru; Liu, Qixu; Wang, Kai; Wang, Wenjie
Sci China Inf Sci, 2018, 61(3): 032114
Keywords: web attack; adaptive learning; intrusion detection; anomaly detection; SVM
Cite as: Dong Y, Zhang Y Q, Ma H, et al. An adaptive system for detecting malicious queries in web attacks. Sci China Inf Sci, 2018, 61(3): 032114, doi: 10.1007/s11432-017-9288-4

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 1

Orthogonalized lattice enumeration for solving SVP
Zheng, Zhongxiang; Wang, Xiaoyun; Xu, Guangwu; Yang, Y. U.
Sci China Inf Sci, 2018, 61(3): 032115
Keywords: lattice-based; SVP; sparse representation; enumeration; BKZ
Cite as: Zheng Z X, Wang X Y, Xu G W, et al. Orthogonalized lattice enumeration for solving SVP. Sci China Inf Sci, 2018, 61(3): 032115, doi: 10.1007/s11432-017-9307-0

Special Issue on Information Security
POSITION PAPER Website SpringerLink Google Scholar Cited in SCI: 0

A systematic framework to under stand central bank digital currency
Yao, Qian
Sci China Inf Sci, 2018, 61(3): 033101
Keywords: digital fiat currency; credit-based currency; crypto-currency; algorithm-based currency; smart currency; central bank digital currency
Cite as: Yao Q. A systematic framework to under stand central bank digital currency. Sci China Inf Sci, 2018, 61(3): 033101, doi: 10.1007/s11432-017-9294-5

Special Issue on Information Security
HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 1

Construction of rotation symmetric bent functions with maximum algebraic degree
Zhang, Wenying; Han, Guoyong
Sci China Inf Sci, 2018, 61(3): 038101
Keywords: Cryptography; Boolean function; Bent function; Rotation symmetric function; Algebraic degree
Cite as: Zhang W Y, Han G Y. Construction of rotation symmetric bent functions with maximum algebraic degree. Sci China Inf Sci, 2018, 61(3): 038101, doi: 10.1007/s11432-017-9123-2

Special Issue on Information Security
HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 1

Several classes of negabent functions over finite fields
Wu, Gaofei; Li, Nian; Zhang, Yuqing; Liu, Xuefeng
Sci China Inf Sci, 2018, 61(3): 038102
Keywords: Finite field; Negabent function; Nega-Hadamard transform; Bent function; Kloosterman sum; Niho exponent
Cite as: Wu G F, Li N, Zhang Y Q, et al. Several classes of negabent functions over finite fields. Sci China Inf Sci, 2018, 61(3): 038102, doi: 10.1007/s11432-017-9096-0

Special Issue on Information Security
HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 1

Improved automatic search of impossible differentials for camellia with FL/FL-1 layers
Ding, Yaoling; Wang, Xiaoyun; Wang, Ning; Wang, Wei
Sci China Inf Sci, 2018, 61(3): 038103
Keywords: automatic search; impossible differentials; Camellia; weak key
Cite as: Ding Y L, Wang X Y, Wang N, et al. Improved automatic search of impossible differentials for camellia with FL/FL-1 layers. Sci China Inf Sci, 2018, 61(3): 038103, doi: 10.1007/s11432-016-9104-3

Special Issue on Information Security
HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

More permutation polynomials with differential uniformity six
Tu, Ziran; Zeng, Xiangyong; Zhang, Zhiyong
Sci China Inf Sci, 2018, 61(3): 038104
Keywords: permutation; differential uniformity; algebraic degree; differential attack; nonlinearity
Cite as: Tu Z R, Zeng X Y, Zhang Z Y. More permutation polynomials with differential uniformity six. Sci China Inf Sci, 2018, 61(3): 038104, doi: 10.1007/s11432-017-9118-5

Special Issue on Information Security
HIGHLIGHT Website SpringerLink Google Scholar Cited in SCI: 1

Improved cryptanalysis of step-reduced SM3
Shen, Yanzhao; Bai, Dongxia; Yu, Hongbo
Sci China Inf Sci, 2018, 61(3): 038105
Keywords: SM3; preimage attack; boomerang attack; differential meet-in-the-middle; hash function
Cite as: Shen Y Z, Bai D X, Yu H B. Improved cryptanalysis of step-reduced SM3. Sci China Inf Sci, 2018, 61(3): 038105, doi: 10.1007/s11432-017-9119-6

Special Issue on Information Security
HIGHLIGHT Website SpringerLink Google Scholar Supplementary Cited in SCI: 6

Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation
Sun, Lixue; Xu, Chunxiang; Zhang, Mingwu; Chen, Kefei; Li, Hongwei
Sci China Inf Sci, 2018, 61(3): 038106
Keywords: Public key encryption with keyword search; Insider keyword guessing attack; Indistinguishability obfuscation; Cloud storage; Signcryption
Cite as: Sun L X, Xu C X, Zhang M W, et al. Secure searchable public key encryption against insider keyword guessing attacks from indistinguishability obfuscation. Sci China Inf Sci, 2018, 61(3): 038106, doi: 10.1007/s11432-017-9124-0

Special Issue on Information Security
LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 2

Secure and efficient k-nearest neighbor query for location-based services in outsourced environments
Wu, Haiqin; Wang, Liangmin; Jiang, Tao
Sci China Inf Sci, 2018, 61(3): 039101
Keywords: data outsourcing; location privacy; k nearest neighbor query; query efficiency; Hilbert curve
Cite as: Wu H Q, Wang L M, Jiang T. Secure and efficient k-nearest neighbor query for location-based services in outsourced environments. Sci China Inf Sci, 2018, 61(3): 039101, doi: 10.1007/s11432-017-9090-6

Special Issue on Information Security
LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Efficient flush-reload cache attack on scalar multiplication based signature algorithm
Zhou, Ping; Wang, Tao; Lou, Xiaoxuan; Zhao, Xinjie; Zhang, Fan; Guo, Shize
Sci China Inf Sci, 2018, 61(3): 039102
Keywords: side channel attack; cache timing attack; ECDSA; flush-reload attack; public-key cryptography
Cite as: Zhou P, Wang T, Lou X X, et al. Efficient flush-reload cache attack on scalar multiplication based signature algorithm. Sci China Inf Sci, 2018, 61(3): 039102, doi: 10.1007/s11432-017-9108-3

Special Issue on Information Security
LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 1

Protecting white-box cryptographic implementations with obfuscated round boundaries
Xu, Tao; Wu, Chuankun; Liu, Feng; Zhao, Ruoxin
Sci China Inf Sci, 2018, 61(3): 039103
Keywords: white-box cryptography; block cipher; obfuscated round boundaries; malware; space hardness; code lifting
Cite as: Xu T, Wu C K, Liu F, et al. Protecting white-box cryptographic implementations with obfuscated round boundaries. Sci China Inf Sci, 2018, 61(3): 039103, doi: 10.1007/s11432-016-9171-6

Special Issue on Information Security
LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 2

Efficient and secure outsourcing of bilinear pairings with single server
Dong, Min; Ren, Yanli
Sci China Inf Sci, 2018, 61(3): 039104
Keywords: Cloud computing; Bilinear pairings; Outsourcing computation; Verifiable; Single server
Cite as: Dong M, Ren Y L. Efficient and secure outsourcing of bilinear pairings with single server. Sci China Inf Sci, 2018, 61(3): 039104, doi: 10.1007/s11432-017-9161-2

Special Issue on Information Security
LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Verifiable random functions with Boolean function constraints
Wang, Qianwen; Feng, Rongquan; Zhu, Yan
Sci China Inf Sci, 2018, 61(3): 039105
Keywords: Conditionally Verifiable Random Function; Verifiable Random Function; Access Constraints; full-DNF; Provable Security
Cite as: Wang Q W, Feng R Q, Zhu Y. Verifiable random functions with Boolean function constraints. Sci China Inf Sci, 2018, 61(3): 039105, doi: 10.1007/s11432-017-9228-6

Special Issue on Information Security
LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 2

Optimal model search for hardware-trojan-based bit-level fault attacks on block ciphers
Zhao, Xinjie; Zhang, Fan; Guo, Shize; Gong, Zheng
Sci China Inf Sci, 2018, 61(3): 039106
Keywords: optimal fault model; hardware trojan horse; fault injection; algebraic fault analysis; block cipher
Cite as: Zhao X J, Zhang F, Guo S Z, et al. Optimal model search for hardware-trojan-based bit-level fault attacks on block ciphers. Sci China Inf Sci, 2018, 61(3): 039106, doi: 10.1007/s11432-017-9179-4

Vol. 62, No. 3, 2019 Cover Contents

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Improved impossible differential cryptanalysis of large-block Rijndael
Liu, Ya; Shi, Yifan; Gu, Dawu; Dai, Bo; Zhao, Fengyu; Li, Wei; Liu, Zhiqiang; Zeng, Zhiqiang
Sci China Inf Sci, 2019, 62(3): 032101
Keywords: block cipher; Rijndael; precomputation tables; impossible differentials; multiple impossible differential attacks
Cite as: Liu Y, Shi Y F, Gu D W, et al. Improved impossible differential cryptanalysis of large-block Rijndael. Sci China Inf Sci, 2019, 62(3): 032101, doi: 10.1007/s11432-017-9365-4

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Related-tweakey impossible differential attack on reduced-round Deoxys-BC-256
Zong, Rui; Dong, Xiaoyang; Wang, Xiaoyun
Sci China Inf Sci, 2019, 62(3): 032102
Keywords: related-tweakey impossible differential attack; tweakable block cipher; Deoxys-BC-256; tweakey schedule; MILP
Cite as: Zong R, Dong X Y, Wang X Y. Related-tweakey impossible differential attack on reduced-round Deoxys-BC-256. Sci China Inf Sci, 2019, 62(3): 032102, doi: 10.1007/s11432-017-9382-2

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 6

EFFECT: an efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid
Guan, Zhitao; Zhang, Yue; Zhu, Liehuang; Wu, Longfei; Yu, Shui
Sci China Inf Sci, 2019, 62(3): 032103
Keywords: privacy-preserving; authentication; batch verification; smart grid
Cite as: Guan Z T, Zhang Y, Zhu L H, et al. EFFECT: an efficient flexible privacy-preserving data aggregation scheme with authentication in smart grid. Sci China Inf Sci, 2019, 62(3): 032103, doi: 10.1007/s11432-018-9451-y

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 2

Identity-based public auditing for cloud storage systems against malicious auditors via blockchain
Xue, Jingting; Xu, Chunxiang; Zhao, Jining; Ma, Jianfeng
Sci China Inf Sci, 2019, 62(3): 032104
Keywords: cloud storage; public integrity auditing; identity-based cryptography; blockchain; security analysis
Cite as: Xue J T, Xu C X, Zhao J N, et al. Identity-based public auditing for cloud storage systems against malicious auditors via blockchain. Sci China Inf Sci, 2019, 62(3): 032104, doi: 10.1007/s11432-018-9462-0

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Partially known information attack on SM2 key exchange protocol
Wei, Wei; Chen, Jiazhe; Li, Dan; Wang, Beibei
Sci China Inf Sci, 2019, 62(3): 032105
Keywords: SM2 key exchange protocol; cryptanalysis; information leakage; lattice attack; extended hidden number problem
Cite as: Wei W, Chen J Z, Li D, et al. Partially known information attack on SM2 key exchange protocol. Sci China Inf Sci, 2019, 62(3): 032105, doi: 10.1007/s11432-018-9515-9

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

CATH: an effective method for detecting denial-of-service attacks in software defined networks
Guo, Yi; Miao, Fu; Zhang, Liancheng; Wang, Yu
Sci China Inf Sci, 2019, 62(3): 032106
Keywords: DoS attacks; software defined network; flow features; cusp model; equilibrium surface
Cite as: Guo Y, Miao F, Zhang L C, et al. CATH: an effective method for detecting denial-of-service attacks in software defined networks. Sci China Inf Sci, 2019, 62(3): 032106, doi: 10.1007/s11432-017-9439-7

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

A new discrete Fourier transform randomness test
Chen, Meihui; Chen, Hua; Fan, Limin; Zhu, Shaofeng; Xi, Wei; Feng, Dengguo
Sci China Inf Sci, 2019, 62(3): 032107
Keywords: statistical randomness test; discrete Fourier transform test; NIST SP800-22; two-level test; chi-square distribution
Cite as: Chen M H, Chen H, Fan L M, et al. A new discrete Fourier transform randomness test. Sci China Inf Sci, 2019, 62(3): 032107, doi: 10.1007/s11432-018-9489-x

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

New observation on the key schedule of RECTANGLE
Yan, Hailun; Luo, Yiyuan; Chen, Mo; Lai, Xuejia
Sci China Inf Sci, 2019, 62(3): 032108
Keywords: lightweight block cipher; RECTANGLE; key schedule; round function; diffusion
Cite as: Yan H L, Luo Y Y, Chen M, et al. New observation on the key schedule of RECTANGLE. Sci China Inf Sci, 2019, 62(3): 032108, doi: 10.1007/s11432-018-9527-8

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

A regulated digital currency
Wu, Yanbing; Fan, Haining; Wang, Xiaoyun; Zou, Guangnan
Sci China Inf Sci, 2019, 62(3): 032109
Keywords: Blockchain; Bitcoin; anonymous; digital currency; regulated; proof-of-work
Cite as: Wu Y B, Fan H N, Wang X Y, et al. A regulated digital currency. Sci China Inf Sci, 2019, 62(3): 032109, doi: 10.1007/s11432-018-9611-3

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Keywords: zero-knowledge; concurrent zero-knowledge; resettable zero-knowledge; concurrent secure computation; computational complexity
Cite as: Yan Z B, Deng Y. A novel approach to public-coin concurrent zero-knowledge and applications on resettable security. Sci China Inf Sci, 2019, 62(3): 032110, doi: 10.1007/s11432-018-9627-x

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Automatic search method for multiple differentials and its application on MANTIS
Chen, Shiyao; Liu, Ru; Cui, Tingting; Wang, Meiqin
Sci China Inf Sci, 2019, 62(3): 032111
Keywords: multiple differential cryptanalysis; structure attack; automatic search; MANTIS; MILP
Cite as: Chen S Y, Liu R, Cui T T, et al. Automatic search method for multiple differentials and its application on MANTIS. Sci China Inf Sci, 2019, 62(3): 032111, doi: 10.1007/s11432-018-9658-0

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Pseudo random oracle of Merkle-Damgard hash functions revisited
Ammour, Kamel; Wang, Lei; Gu, Dawu
Sci China Inf Sci, 2019, 62(3): 032112
Keywords: Merkle-Damgard; random oracle; indifferentiability; prefix free; length extension attack
Cite as: Ammour K, Wang L, Gu D W. Pseudo random oracle of Merkle-Damgard hash functions revisited. Sci China Inf Sci, 2019, 62(3): 032112, doi: 10.1007/s11432-018-9568-2

Special Issue on Information Security
RESEARCH PAPER Website SpringerLink Google Scholar Cited in SCI: 0

Universally composable secure geographic area verification without pre-shared secret
Zhang, Junwei; Lu, Ning; Ma, Jianfeng; Yang, Chao
Sci China Inf Sci, 2019, 62(3): 032113
Keywords: geographic area verification; pre-shared secret-free; composition security; colluding attacks; provable security
Cite as: Zhang J W, Lu N, Ma J F, et al. Universally composable secure geographic area verification without pre-shared secret. Sci China Inf Sci, 2019, 62(3): 032113, doi: 10.1007/s11432-018-9738-2

Special Issue on Information Security
LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

A more compact multi-id identity-based FHE scheme in the standard model and its applications
Wang, Xueqing; Wang, Biao; Liang, Bei; Xue, Rui
Sci China Inf Sci, 2019, 62(3): 039101
Keywords: IBE; MIBFHE; DLWE; Single-Hop; Fully-Dynamic
Cite as: Wang X Q, Wang B, Liang B, et al. A more compact multi-id identity-based FHE scheme in the standard model and its applications. Sci China Inf Sci, 2019, 62(3): 039101, doi: 10.1007/s11432-017-9412-3

Special Issue on Information Security
LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

A revised CVSS-based system to improve the dispersion of vulnerability risk scores
Wu, Chensi; Wen, Tao; Zhang, Yuqing
Sci China Inf Sci, 2019, 62(3): 039102
Keywords: CVSS; Vulnerability; Vulnerability Assessment; Dispersion; VRSS; PCA
Cite as: Wu C S, Wen T, Zhang Y Q. A revised CVSS-based system to improve the dispersion of vulnerability risk scores. Sci China Inf Sci, 2019, 62(3): 039102, doi: 10.1007/s11432-017-9445-4

Special Issue on Information Security
LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

A rejection sampling algorithm for off-centered discrete Gaussian distributions over the integers
Du, Yusong; Wei, Baodian; Zhang, Huang
Sci China Inf Sci, 2019, 62(3): 039103
Keywords: lattice-based cryptography; discrete Gaussian sampling; rejection sampling; discrete Gaussian distributions over integers; binary discrete Gaussian distribution
Cite as: Du Y S, Wei B D, Zhang H. A rejection sampling algorithm for off-centered discrete Gaussian distributions over the integers. Sci China Inf Sci, 2019, 62(3): 039103, doi: 10.1007/s11432-017-9409-7

Special Issue on Information Security
LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 1

Some characteristics of logistic map over the finite field
Yang, Bo; Liao, Xiaofeng
Sci China Inf Sci, 2019, 62(3): 039104
Keywords: Chaos; Logistic map; period analysis; finite field; Galois ring
Cite as: Yang B, Liao X F. Some characteristics of logistic map over the finite field. Sci China Inf Sci, 2019, 62(3): 039104, doi: 10.1007/s11432-017-9438-8

Special Issue on Information Security
LETTER Website SpringerLink Google Scholar Cited in SCI: 0

Side channel attack of multiplication in GF(q)-application to secure RSA-CRT
Xu, Sen; Wang, Weija; Lu, Xiangjun; Guo, Zheng; Liu, Junrong; Gu, Dawu
Sci China Inf Sci, 2019, 62(3): 039105
Keywords: Side channel attack; Template attack; RSA-CRT; Hidden number problem; Secure implementation
Cite as: Xu S, Wang W J, Lu X J, et al. Side channel attack of multiplication in GF(q)-application to secure RSA-CRT. Sci China Inf Sci, 2019, 62(3): 039105, doi: 10.1007/s11432-018-9488-2

Special Issue on Information Security
LETTER Website SpringerLink Google Scholar Cited in SCI: 0

UMBRELLA: user demand privacy preserving framework based on association rules and differential privacy in social networks
Yan, Chunliu; Ni, Ziyi; Cao, Bin; Lu, Rongxing; Wu, Shaohua; Zhang, Qinyu
Sci China Inf Sci, 2019, 62(3): 039106
Keywords: demand privacy; privacy-preserving; differential privacy; association rules; QoS
Cite as: Yan C L, Ni Z Y, Cao B, et al. UMBRELLA: user demand privacy preserving framework based on association rules and differential privacy in social networks. Sci China Inf Sci, 2019, 62(3): 039106, doi: 10.1007/s11432-018-9483-x

Special Issue on Information Security
LETTER Website SpringerLink Google Scholar Cited in SCI: 1

Finding the best answer: measuring the optimization of public and authoritative DNS
Zhang, Jia; Duan, Haixin; Jiang, Jian; Liang, Jinjin; Wu, Jianping
Sci China Inf Sci, 2019, 62(3): 039107
Keywords: DNS Measurement; DNS Resolution Accuracy; DNS Schedule; ECS; Anycast CDN
Cite as: Zhang J, Duan H X, Jiang J, et al. Finding the best answer: measuring the optimization of public and authoritative DNS. Sci China Inf Sci, 2019, 62(3): 039107, doi: 10.1007/s11432-017-9370-2

Special Issue on Information Security
LETTER Website SpringerLink Google Scholar Cited in SCI: 1

High-efficient generation algorithm for large random active shield
Xin, Ruishan; Yuan, Yidong; He, Jiaji; Li, Yuehui; Zhao, Yiqiang
Sci China Inf Sci, 2019, 62(3): 039108
Keywords: invasive attacks; active shield; random Hamiltonian path; dynamic programming algorithm; divide-and-conquer algorithm
Cite as: Xin R S, Yuan Y D, He J J, et al. High-efficient generation algorithm for large random active shield. Sci China Inf Sci, 2019, 62(3): 039108, doi: 10.1007/s11432-018-9474-3

Special Issue on Information Security
LETTER Website SpringerLink Google Scholar Cited in SCI: 0

Real-time state recovery attack against MORUS in nonce-misuse setting
Shi, Tairong; Guan, Jie
Sci China Inf Sci, 2019, 62(3): 039109
Keywords: CAESAR competition; MORUS; Nonce-reuse; state recovery; forgery attack
Cite as: Shi T R, Guan J. Real-time state recovery attack against MORUS in nonce-misuse setting. Sci China Inf Sci, 2019, 62(3): 039109, doi: 10.1007/s11432-017-9457-x

Special Issue on Information Security
LETTER Website SpringerLink Google Scholar Supplementary Cited in SCI: 0

Decomposition of nonlinear feedback shift registers based on Boolean networks
Zhong, Jianghua; Lin, Dongdai
Sci China Inf Sci, 2019, 62(3): 039110
Keywords: Boolean networks; semi-tensor product; Boolean functions; shift registers; stream ciphers
Cite as: Zhong J H, Lin D D. Decomposition of nonlinear feedback shift registers based on Boolean networks. Sci China Inf Sci, 2019, 62(3): 039110, doi: 10.1007/s11432-017-9460-4

Special Issue on Information Security
LETTER Website SpringerLink Google Scholar Cited in SCI: 0

Secure key-aggregation authorized searchable encryption
Wang, Haijiang; Dong, Xiaolei; Cao, Zhenfu; Li, Dongmei; Cao, Nanyuan
Sci China Inf Sci, 2019, 62(3): 039111
Keywords: Searchable Encryption; Access Control; Key-Aggregation; Trapdoor privacy ; Data sharing
Cite as: Wang H J, Dong X L, Cao Z F, et al. Secure key-aggregation authorized searchable encryption. Sci China Inf Sci, 2019, 62(3): 039111, doi: 10.1007/s11432-017-9508-3