-
Constructing Binary Matrices with Good Implementation Properties for Low-Latency Block Ciphers based on Lai-Massey Structure
Author: Li, Xiaodan; Wu, Wenling
Journal: COMPUTER JOURNAL. 2023; Vol. 66, Issue 1, pp. 160-173. DOI: 10.1093/comjnl/bxab151
-
Minimal Rare Pattern-Based Outlier Detection Approach For Uncertain Data Streams Under Monotonic Constraints
Author: Cai, Saihua; Chen, Jinfu; Chen, Haibo; Zhang, Chi; Li, Qian; Shi, Dengzhou; Lin, Wei
Journal: COMPUTER JOURNAL. 2023; Vol. 66, Issue 1, pp. 16-34. DOI: 10.1093/comjnl/bxab139
-
Hybrid Fault Diagnosis Capability Analysis of Highly Connected Graphs
Author: Wei, Yulong; Li, Rong-Hua; Yang, Weihua
Journal: COMPUTER JOURNAL. 2023; Vol. 66, Issue 1, pp. 221-228. DOI: 10.1093/comjnl/bxab156
-
A Verifiable Symmetric Searchable Encryption Scheme Based on the AVL Tree
Author: Wang, Qing; Zhang, Xi; Qin, Jing; Ma, Jixin; Huang, Xinyi
Journal: COMPUTER JOURNAL. 2023; Vol. 66, Issue 1, pp. 174-183. DOI: 10.1093/comjnl/bxab152
-
Multi-Keyword Ranked Searchable Encryption with the Wildcard Keyword for Data Sharing in Cloud Computing
Author: Liu, Jinlu; Zhao, Bo; Qin, Jing; Zhang, Xi; Ma, Jixin
Journal: COMPUTER JOURNAL. 2023; Vol. 66, Issue 1, pp. 184-196. DOI: 10.1093/comjnl/bxab153
-
The Key-Dependent Capacity in Multidimensional Linear Cryptanalysis
Author: Cao, Wenqin; Zhang, Wentao; Zhao, Xuefeng
Journal: COMPUTER JOURNAL. 2023; Vol. 66, Issue 2, pp. 269-279. DOI: 10.1093/comjnl/bxab159
-
Fault-Tolerant Strongly Hamiltonian Laceability and Hyper-Hamiltonian Laceability of Cayley Graphs Generated by Transposition Trees
Author: Xue, Shudan; Deng, Qingying; Li, Pingshan
Journal: COMPUTER JOURNAL. 2023; Vol. 66, Issue 2, pp. 384-398. DOI: 10.1093/comjnl/bxab167
-
Construction of Lightweight Authenticated Joint Arithmetic Computation for 5G IoT Networks
Author: Hsu, Chingfang; Harn, Lein; Xia, Zhe; Cui, Jianqun; Chen, Jingxue
Journal: COMPUTER JOURNAL. 2023; Vol. 66, Issue 1, pp. 208-220. DOI: 10.1093/comjnl/bxab155