


default search action
22. ACISP 2017: Auckland, New Zealand
- Josef Pieprzyk, Suriadi Suriadi:
Information Security and Privacy - 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part I. Lecture Notes in Computer Science 10342, Springer 2017, ISBN 978-3-319-60054-3
Public Key Encryption
- Puwen Wei, Wei Wang, Bingxin Zhu, Siu-Ming Yiu:
Tightly-Secure Encryption in the Multi-user, Multi-challenge Setting with Improved Efficiency. 3-22 - Shiwei Zhang, Yi Mu, Guomin Yang
, Xiaofen Wang:
Hierarchical Functional Encryption for Linear Transformations. 23-43 - Shuai Han, Shengli Liu:
KDM-Secure Public-Key Encryption from Constant-Noise LPN. 44-64 - Ahto Buldas
, Matthias Geihs, Johannes Buchmann:
Long-Term Secure Commitments via Extractable-Binding Commitments. 65-81
Attribute-Based Encryption
- Katsuyuki Takashima:
New Proof Techniques for DLIN-Based Adaptively Secure Attribute-Based Encryption. 85-105 - Hui Cui
, Robert H. Deng
, Joseph K. Liu, Yingjiu Li:
Attribute-Based Encryption with Expressive and Authorized Keyword Search. 106-126 - Yanjiang Yang, Joseph K. Liu, Zhuo Wei, Xinyi Huang:
Towards Revocable Fine-Grained Encryption of Cloud Data: Reducing Trust upon Cloud. 127-144
Identity-Based Encryption
- Shengmin Xu, Guomin Yang
, Yi Mu, Willy Susilo
:
Mergeable and Revocable Identity-Based Encryption. 147-167 - Tong Wu
, Sha Ma, Yi Mu, Shengke Zeng:
ID-Based Encryption with Equality Test Against Insider Attack. 168-183 - Atsushi Takayasu, Yohei Watanabe:
Lattice-Based Revocable Identity-Based Encryption with Bounded Decryption Key Exposure Resistance. 184-204
Searchable Encryption
- Peng Xu, Shuai Liang, Wei Wang, Willy Susilo
, Qianhong Wu, Hai Jin:
Dynamic Searchable Symmetric Encryption with Physical Deletion and Small Leakage. 207-226 - Shabnam Kasra Kermanshahi
, Joseph K. Liu, Ron Steinfeld:
Multi-user Cloud-Based Secure Keyword Search. 227-247 - Hong Zhu
, Zhuolin Mei, Bing Wu, Hongbo Li, Zongmin Cui:
Fuzzy Keyword Search and Access Control over Ciphertexts in Cloud Computing. 248-265 - Shujie Cui, Muhammad Rizwan Asghar
, Steven D. Galbraith
, Giovanni Russello:
Secure and Practical Searchable Encryption: A Position Paper. 266-281
Cryptanalysis
- Hassan Qahur Al Mahri, Leonie Simpson
, Harry Bartlett
, Ed Dawson
, Kenneth Koon-Ho Wong
:
Fault Attacks on XEX Mode with Application to Certain Authenticated Encryption Modes. 285-305 - Gildas Avoine, Xavier Carpent
, Barbara Kordy, Florent Tardif:
How to Handle Rainbow Tables with External Memory. 306-323 - Mengce Zheng
, Noboru Kunihiro
, Honggang Hu:
Improved Factoring Attacks on Multi-prime RSA with Small Prime Difference. 324-342 - Suvradip Chakraborty, Goutam Paul, C. Pandu Rangan:
Efficient Compilers for After-the-Fact Leakage: From CPA to CCA-2 Secure PKE to AKE. 343-362 - Yuki Funabiki, Yosuke Todo
, Takanori Isobe, Masakatu Morii:
Improved Integral Attack on HIGHT. 363-383 - Ivan Tjuawinata, Tao Huang, Hongjun Wu
:
Cryptanalysis of Simpira v2. 384-401 - Tingting Cui, Ling Sun, Huaifeng Chen, Meiqin Wang:
Statistical Integral Distinguisher with Multi-structure and Its Application on AES. 402-420 - Yuhei Watanabe
, Takanori Isobe, Masakatu Morii:
Conditional Differential Cryptanalysis for Kreyvium. 421-434
Digital Signatures
- Michael Till Beck, Jan Camenisch, David Derler
, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
:
Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures. 437-452 - Xiao Zhang, Shengli Liu, Dawu Gu:
Tightly-Secure Signatures from the Decisional Composite Residuosity Assumption. 453-468

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.