


default search action
11. ACISP 2006: Melbourne, Australia
- Lynn Margaret Batten, Reihaneh Safavi-Naini:

Information Security and Privacy, 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings. Lecture Notes in Computer Science 4058, Springer 2006, ISBN 3-540-35458-1
Stream Ciphers
- Sultan Al-Hinai, Lynn Margaret Batten, Bernard D. Colbert, Kenneth Koon-Ho Wong

:
Algebraic Attacks on Clock-Controlled Stream Ciphers. 1-16 - Jacques J. A. Fournier, Michael Tunstall

:
Cache Based Power Analysis Attacks on AES. 17-28 - Joo Yeon Cho, Josef Pieprzyk

:
Distinguishing Attack on SOBER-128 with Linear Masking. 29-39 - An Braeken

, Joseph Lano, Bart Preneel:
Evaluating the Resistance of Stream Ciphers with Linear Feedback Against Fast Algebraic Attacks. 40-51
Symmetric Key Ciphers
- Matthew Henricksen, Ed Dawson

:
Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond. 52-63 - Leonie Ruth Simpson

, Matthew Henricksen:
Improved Cryptanalysis of MAG. 64-75 - Nicolas T. Courtois, Blandine Debraize, Eric Garrido:

On Exact Algebraic [Non-]Immunity of S-Boxes Based on Power Functions. 76-86
Network Security
- Anantharaman Lakshminarayanan, Tong-Lee Lim:

Augmented Certificate Revocation Lists. 87-98 - Shidi Xu, Yi Mu, Willy Susilo

:
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security. 99-110 - Anh-Quynh Nguyen, Yoshiyasu Takefuji

:
Towards an Invisible Honeypot Monitoring System. 111-122
Cryptographic Applications
- Kazuto Ogawa, Goichiro Hanaoka, Hideki Imai:

Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service. 123-135 - André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi:

Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages. 136-147 - Huafei Zhu, Feng Bao:

More on Stand-Alone and Setup-Free Verifiably Committed Signatures. 148-158
Secure Implementation
- Hung-Min Sun, Yue-Hsun Lin, Ming-Fung Wu:

API Monitoring System for Defeating Worms and Exploits in MS-Windows System. 159-170 - Yu Yu, Jussipekka Leiwo, A. Benjamin Premkumar:

Hiding Circuit Topology from Unbounded Reverse Engineers. 171-182 - John W. Holford, William J. Caelli:

The Role of the Self-Defending Object Concept in Developing Distributed Security-Aware Applications. 183-194
Signatures
- Shanshan Duan, Zhenfu Cao

:
Efficient and Provably Secure Multi-receiver Identity-Based Signcryption. 195-206 - Kenneth G. Paterson, Jacob C. N. Schuldt:

Efficient Identity-Based Signatures Secure in the Standard Model. 207-222 - Man Ho Au

, Willy Susilo
, Siu-Ming Yiu:
Event-Oriented k-Times Revocable-iff-Linked Group Signatures. 223-234 - Bessie C. Hu, Duncan S. Wong, Zhenfeng Zhang, Xiaotie Deng:

Key Replacement Attack Against a Generic Construction of Certificateless Signature. 235-246
Theory
- Kun Peng, Colin Boyd, Ed Dawson

, Eiji Okamoto:
A Novel Range Test. 247-258 - Shaoquan Jiang:

Efficient Primitives from Exponentiation in Zp. 259-270 - Ryotaro Hayashi, Keisuke Tanaka:

PA in the Two-Key Setting and a Generic Conversion for Encryption with Anonymity. 271-282 - Raphael Overbeck:

Statistical Decoding Revisited. 283-294
Invited Talk
- Mike Burmester, Tri Van Le, Breno de Medeiros:

Towards Provable Security for Ubiquitous Applications. 295-312
Security Applications
- Huafei Zhu, Feng Bao:

Oblivious Scalar-Product Protocols. 313-323 - Ebaa Fayyoumi

, B. John Oommen
:
On Optimizing the k-Ward Micro-aggregation Technique for Secure Statistical Databases. 324-335
Provable Security
- Eike Kiltz

, David Galindo
:
Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles. 336-347 - Takashi Kitagawa, Peng Yang, Goichiro Hanaoka, Rui Zhang, Hajime Watanabe, Kanta Matsuura

, Hideki Imai:
Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT. 348-359 - Masayuki Abe, Yang Cui, Hideki Imai, Kaoru Kurosawa:

Tag-KEM from Set Partial Domain One-Way Permutations. 360-370
Protocols
- Colin Boyd, Kim-Kwang Raymond Choo

, Anish Mathuria:
An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys. 371-382 - Isaac Agudo

, Javier López
, José A. Montenegro:
Graphical Representation of Authorization Policies for Weighted Credentials. 383-394 - Yin Yin, Bao Li:

Secure Cross-Realm C2C-PAKE Protocol. 395-406
Hashing and Message Authentication
- Praveen Gauravaram

, William Millan, Ed Dawson
, Kapali Viswanathan:
Constructing Secure Hash Functions by Enhancing Merkle-Damgård Construction. 407-420 - Changhoon Lee

, Jongsung Kim, Jaechul Sung
, Seokhie Hong, Sangjin Lee:
Forgery and Key Recovery Attacks on PMAC and Mitchell's TMAC Variant. 421-431 - Katsuyuki Okeya:

Side Channel Attacks Against HMACs Based on Block-Cipher Based Hash Functions. 432-443

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














