default search action
7. ACISP 2002: Melbourne, Victoria, Australia
- Lynn Margaret Batten, Jennifer Seberry:
Information Security and Privacy, 7th Australian Conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002, Proceedings. Lecture Notes in Computer Science 2384, Springer 2002, ISBN 3-540-43861-0
Key Handling
- Ingrid Biehl, Tsuyoshi Takagi:
A New Distributed Primality Test for Shared RSA Keys Using Quadratic Fields. 1-16 - Yanjiang Yang, Feng Bao, Robert H. Deng:
Security Analysis and Improvement of the Global Key Recovery System. 17-24 - Andrew J. Clark, Ed Dawson, Joanne Fuller, Jovan Dj. Golic, Hoon-Jae Lee, William Millan, Sang-Jae Moon, Leonie Simpson:
The LILI-II Keystream Generator. 25-39 - Hartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang:
A Secure Re-keying Scheme with Key Recovery Property. 40-55
Trust and Secret Sharing
- Marie Henderson, Robert S. Coulter, Ed Dawson, Eiji Okamoto:
Modelling Trust Structures for Public Key Infrastructures. 56-70 - Susan G. Barwick, Wen-Ai Jackson, Keith M. Martin, Peter R. Wild:
Size of Broadcast in Threshold Schemes with Disenrollment. 71-88 - Brian King:
Requirements for Group Independent Linear Threshold Secret Sharing Schemes. 89-106 - Krista Bennett, Christian Grothoff, Tzvetan Horozov, Ioana Patrascu:
Efficient Sharing of Encrypted Data. 107-120 - Josef Pieprzyk, Xian-Mo Zhang:
Cheating Prevention in Linear Secret Sharing. 121-135
Fast Computation
- Wieland Fischer, Jean-Pierre Seifert:
Note on Fast Computation of Secret RSA Exponents. 136-143 - Leonid Reyzin, Natan Reyzin:
Better than BiBa: Short One-Time Signatures with Fast Signing and Verifying. 144-153
Cryptanalysis I
- Hongjun Wu, Feng Bao:
Cryptanalysis of Stream Cipher COS(2, 128) Mode I. 154-158 - David Soldera, Jennifer Seberry, Chengxin Qu:
The Analysis of Zheng-Seberry Scheme. 159-168 - Hongjun Wu:
Cryptanalysis of Stream Cipher Alpha1. 169-175 - James P. Hughes:
A Linear Algebraic Attack on the AAFG1 Braid Group Cryptosystem. 176-189
Elliptic Curves
- YoungJu Choie, D. Yun:
Isomorphism Classes of Hyperelliptic Curves of Genus 2 over Fq. 190-202 - Fangguo Zhang, Shengli Liu, Kwangjo Kim:
Compact Representation of Domain Parameters of Hyperelliptic Curve Cryptosystems. 203-213 - Yvonne Hitchcock, Paul Montague:
A New Elliptic Curve Scalar Multiplication Algorithm to Resist Simple Power Analysis. 214-225
AES
- Lauren May, Matthew Henricksen, William Millan, Gary Carter, Ed Dawson:
Strengthening the Key Schedule of the AES. 226-240 - Ron Steinfeld, Joonsang Baek, Yuliang Zheng:
On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes. 241-256
Security Management
- Matthew J. Warren, Lynn Margaret Batten:
Security Management: An Information Systems Setting. 257-270 - Chun Ruan, Vijay Varadharajan:
Resolving Conflicts in Authorization Delegations. 271-285 - Michael Hitchens, Vijay Varadharajan, Gregory Saunders:
Policy Administration Domains. 286-302
Authentication
- Jianying Zhou:
Maintaining the Validity of Digital Signatures in B2B Applications. 303-315 - Francesc Sebé, Josep Domingo-Ferrer:
Short 3-Secure Fingerprinting Codes for Copyright Protection. 316-327 - Mitsuru Tada:
An Order-Specified Multisignature Scheme Secure against Active Insider Attacks. 328-345 - Paul England, Marcus Peinado:
Authenticated Operation of Open Computing Devices. 346-361 - Myungsun Kim, Kwangjo Kim:
A New Identification Scheme Based on the Bilinear Diffie-Hellman Problem. 362-378
Invited Talk
- Bimal K. Roy:
A Brief Outline of Research on Correlation Immune Functions. 379-394
Oblivious Transfer
- Yi Mu, Junqi Zhang, Vijay Varadharajan:
m out of n Oblivious Transfer. 395-405
Cryptanalysis II
- Sangwoo Park, Soo Hak Sung, Seongtaek Chee, Jongin Lim:
On the Security of Reduced Versions of 3-Pass HAVAL. 406-419 - Katsuyuki Okeya, Kouichi Sakurai:
On Insecurity of the Side Channel Attack Countermeasure Using Addition-Subtraction Chains under Distinguishability between Addition and Doubling. 420-435 - Kouichi Sakurai, Tsuyoshi Takagi:
On the Security of a Modified Paillier Public-Key Primitive. 436-448
Dealing with Adversaries
- Biljana Cubaleska, Weidong Qiu, Markus Schneider:
How to Play Sherlock Holmes in the World of Mobile Agents. 449-463 - Dong-Guk Han, Hye-Young Park, Young-Ho Park, Sangjin Lee, Dong Hoon Lee, Hyungjin Yang:
A Practical Approach Defeating Blackmailing. 464-481 - Hyun-Jeong Kim, Dong Hoon Lee, Moti Yung:
Privacy against Piracy: Protecting Two-Level Revocable P-K Traitor Tracing. 482-496 - M. V. N. Ashwin Kumar, K. Srinathan, C. Pandu Rangan:
Asynchronous Perfectly Secure Computation Tolerating Generalized Adversaries. 497-512
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.