


default search action
14. ACISP 2009: Brisbane, Australia
- Colin Boyd, Juan Manuel González Nieto:

Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings. Lecture Notes in Computer Science 5594, Springer 2009, ISBN 978-3-642-02619-5
Invited Lecture
- Basie von Solms:

Is the Information Security King Naked?. 1-7
Network Security
- Christian Seifert, Vipul Delwadia, Peter Komisarczuk, David Stirling, Ian Welch:

Measurement Study on Malicious Web Servers in the .nz Domain. 8-25 - Dang Vinh Pham, Dogan Kesdogan:

A Combinatorial Approach for an Anonymity Metric. 26-43 - Irfan Ahmed

, Kyung-suk Lhee, Hyunjung Shin, Manpyo Hong:
On Improving the Accuracy and Performance of Content-Based File Type Identification. 44-59
Symmetric Key Encryption
- Ewan Fleischmann, Michael Gorski, Stefan Lucks:

Attacking 9 and 10 Rounds of AES-256. 60-72 - Jiali Choy, Guanhan Chew, Khoongming Khoo, Huihui Yap:

Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure. 73-89 - Onur Özen, Kerem Varici, Cihangir Tezcan

, Çelebi Kocair:
Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT. 90-107 - Leonie Simpson

, Matthew Henricksen, Wun-She Yap
:
Improved Cryptanalysis of the Common Scrambling Algorithm Stream Cipher. 108-121 - Serdar Boztas

, Simon J. Puglisi, Andrew Turpin:
Testing Stream Ciphers by Finding the Longest Substring of a Given Density. 122-133 - Atsuko Miyaji

, Masahiro Sukegawa:
New Correlations of RC4 PRGA Using Nonzero-Bit Differences. 134-152
Hash Functions
- Mohammad Reza Reyhanitabar, Willy Susilo

, Yi Mu:
Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders. 153-170 - Mridul Nandi

:
Characterizing Padding Rules of MD Hash Functions Preserving Collision Security. 171-184 - Hongbo Yu, Xiaoyun Wang:

Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256. 185-201 - Jean-Philippe Aumasson, Eric Brier, Willi Meier, María Naya-Plasencia, Thomas Peyrin:

Inside the Hypercube. 202-213 - Yu Sasaki, Kazumaro Aoki:

Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others. 214-231 - Akira Numayama, Keisuke Tanaka:

On the Weak Ideal Compression Functions. 232-248
Invited Lecture
- L. Jean Camp:

Hardening the Network from the Friend Within. 249
Public Key Cryptography
- Peter Lory:

Reducing the Complexity in the Distributed Computation of Private RSA Keys. 250-263 - Ahto Buldas

, Aivo Jürgenson, Margus Niitsoo:
Efficiency Bounds for Adversary Constructions in Black-Box Reductions. 264-275 - Kenneth G. Paterson, Sriramkrishnan Srinivasan:

Building Key-Private Public-Key Encryption Schemes. 276-292 - Harunaga Hiwatari, Keisuke Tanaka, Tomoyuki Asano, Koichi Sakumoto:

Multi-recipient Public-Key Encryption from Simulators in Security Proofs. 293-308 - Jeongdae Hong, Jinil Kim, Jihye Kim

, Matthew K. Franklin, Kunsoo Park:
Fair Threshold Decryption with Semi-Trusted Third Parties. 309-326 - Cheng-Kang Chu, Jian Weng

, Sherman S. M. Chow
, Jianying Zhou
, Robert H. Deng
:
Conditional Proxy Broadcast Re-Encryption. 327-342 - Toshihide Matsuda, Ryo Nishimaki, Akira Numayama, Keisuke Tanaka:

Security on Hybrid Encryption with the Tag-KEM/DEM Framework. 343-359
Protocols
- Jiang Wu, Douglas R. Stinson:

A Highly Scalable RFID Authentication Protocol. 360-376 - Kai-Yuen Cheong, Takeshi Koshiba

, Shohei Nishiyama:
Strengthening the Security of Distributed Oblivious Transfer. 377-388 - Douglas Stebila

, Berkant Ustaoglu
:
Towards Denial-of-Service-Resilient Key Agreement Protocols. 389-406 - Douglas Wikström:

A Commitment-Consistent Proof of a Shuffle. 407-421
Implementation
- Nadia El Mrabet, Christophe Nègre:

Finite Field Multiplication Combining AMNS and DFT Approach for Pairing Cryptography. 422-436 - Michael Tunstall

:
Random Order m-ary Exponentiation. 437-451 - Hüseyin Hisil

, Kenneth Koon-Ho Wong
, Gary Carter, Ed Dawson
:
Jacobi Quartic Curves Revisited. 452-468

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














