default search action
17. ACISP 2012: Wollongong, NSW, Australia
- Willy Susilo, Yi Mu, Jennifer Seberry:
Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings. Lecture Notes in Computer Science 7372, Springer 2012, ISBN 978-3-642-31447-6
Fundamentals
- Kaori Tosu, Noboru Kunihiro:
Optimal Bounds for Multi-Prime Φ-Hiding Assumption. 1-14 - Atsushi Fujioka, Mark Manulis, Koutarou Suzuki, Berkant Ustaoglu:
Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchange. 15-28 - Haruna Higo, Keisuke Tanaka, Akihiro Yamada, Kenji Yasunaga:
A Game-Theoretic Perspective on Oblivious Transfer. 29-42 - Yuji Nagashima, Noboru Kunihiro:
Faster Algorithm for Solving Hard Knapsacks for Moderate Message Length. 43-56 - Peter Lory, Manuel Liedel:
Accelerating the Secure Distributed Computation of the Mean by a Chebyshev Expansion. 57-70
Cryptanalysis
- Takanori Isobe, Kyoji Shibutani:
Security Analysis of the Lightweight Block Ciphers XTEA, LED and Piccolo. 71-86 - Yu Sasaki, Sareh Emami, Deukjo Hong, Ashish Kumar:
Improved Known-Key Distinguishers on Feistel-SP Ciphers and Application to Camellia. 87-100 - Jiazhe Chen, Leibo Li:
Low Data Complexity Attack on Reduced Camellia-256. 101-114 - Xianmeng Meng, Xuexin Zheng:
Cryptanalysis of RSA with a Small Parameter. 115-123 - Jintai Ding, Yanbin Pan, Yingpu Deng:
An Algebraic Broadcast Attack against NTRU. 124-137
Message Authentication Codes and Hash Functions
- Mufeed Juma AlMashrafi, Harry Bartlett, Leonie Simpson, Ed Dawson, Kenneth Koon-Ho Wong:
Analysis of Indirect Message Injection for MAC Generation Using Stream Ciphers. 138-151 - Ewan Fleischmann, Christian Forler, Stefan Lucks, Jakob Wenzel:
Weimar-DM: A Highly Secure Double-Length Compression Function. 152-165
Public Key Cryptography
- K. Preetha Mathew, Sachin Vasant, Sridhar Venkatesan, C. Pandu Rangan:
An Efficient IND-CCA2 Secure Variant of the Niederreiter Encryption Scheme in the Standard Model. 166-179 - Kirill Morozov, Tsuyoshi Takagi:
Zero-Knowledge Protocols for the McEliece Encryption. 180-193 - Jothi Rangasamy, Douglas Stebila, Colin Boyd, Juan Manuel González Nieto, Lakshmi Kuppusamy:
Effort-Release Public-Key Encryption from Cryptographic Puzzles. 194-207 - Manh Ha Nguyen, Keisuke Tanaka, Kenji Yasunaga:
Leakage-Resilience of Stateless/Stateful Public-Key Encryption from Hash Proofs. 208-222 - Kun Peng, Matt Henricksen:
How to Fix Two RSA-Based PVSS Schemes - Exploration and Solution. 223-234
Digital Signatures
- Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong:
Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions. 235-246 - Xiao Tan, Duncan S. Wong:
Generalized First Pre-image Tractable Random Oracle Model and Signature Schemes. 247-260 - Haibo Tian, Xiaofeng Chen, Jin Li:
A Short Non-delegatable Strong Designated Verifier Signature. 261-279 - S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:
Deterministic Identity Based Signature Scheme and Its Application for Aggregate Signatures. 280-293 - Tsz Hon Yuen, Siu-Ming Yiu, Lucas Chi Kwong Hui:
Fully Leakage-Resilient Signatures with Auxiliary Inputs. 294-307
Identity-Based and Attribute-Based Cryptography
- Duong Hieu Phan, David Pointcheval, Siamak Fayyaz Shahandashti, Mario Strefler:
Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts. 308-321 - Xuhua Zhou, Xuhua Ding, Kefei Chen:
A Generic Construction of Accountable Decryption and Its Applications. 322-335 - Aijun Ge, Rui Zhang, Cheng Chen, Chuangui Ma, Zhenfeng Zhang:
Threshold Ciphertext Policy Attribute-Based Encryption with Constant Size Ciphertexts. 336-349 - Juan Manuel González Nieto, Mark Manulis, Dongdong Sun:
Fully Private Revocable Predicate Encryption. 350-363 - Jun Shao:
Anonymous ID-Based Proxy Re-Encryption. 364-375
Lattice-Based Cryptography
- Yoshinori Aono, Manindra Agrawal, Takakazu Satoh, Osamu Watanabe:
On the Optimality of Lattices for the Coppersmith Technique. 376-389 - Jie Chen, Hoon Wei Lim, San Ling, Huaxiong Wang, Khoa Nguyen:
Revocable Identity-Based Encryption from Lattices. 390-403
Lightweight Cryptography
- Axel Poschmann, Matthew J. B. Robshaw:
On Area, Time, and the Right Trade-Off. 404-418
Short Papers
- Paul Stankovski, Martin Hell, Thomas Johansson:
Analysis of Xorrotation with Application to an HC-128 Variant. 419-425 - Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini, Philip Ogunbona:
Private Fingerprint Matching. 426-433 - Kaleb Lee, Colin Boyd, Juan Manuel González Nieto:
Minimizing Information Leakage of Tree-Based RFID Authentication Protocols Using Alternate Tree-Walking. 434-441 - A. S. M. Kayes, Jun Han, Alan W. Colman:
ICAF: A Context-Aware Framework for Access Control. 442-449 - Wenpan Jing, Haixia Xu, Bao Li:
Non-malleable Instance-Dependent Commitment in the Standard Model. 450-457
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.