


default search action
16. ACISP 2011: Melbourne, Australia
- Udaya Parampalli

, Philip Hawkes:
Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings. Lecture Notes in Computer Science 6812, Springer 2011, ISBN 978-3-642-22496-6
Invited Talks
- Claude Carlet:

On Known and New Differentially Uniform Functions. 1-15
Symmetric Key Cryptography
- Jiazhe Chen

, Keting Jia, Hongbo Yu, Xiaoyun Wang:
New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256. 16-33 - Meicheng Liu, Dongdai Lin, Dingyi Pei:

Results on the Immunity of Boolean Functions against Probabilistic Algebraic Attacks. 34-46 - Yusong Du, Fangguo Zhang

:
Finding More Boolean Functions with Maximum Algebraic Immunity Based on Univariate Polynomial Representation. 47-60 - Phuong Ha Nguyen, Hongjun Wu

, Huaxiong Wang:
Improving the Algorithm 2 in Multidimensional Linear Cryptanalysis. 61-74 - Sui-Guan Teo, Ali Al-Hamdan, Harry Bartlett

, Leonie Simpson
, Kenneth Koon-Ho Wong
, Ed Dawson
:
State Convergence in the Initialisation of Stream Ciphers. 75-88 - Kazuhiko Minematsu, Tomoyasu Suzaki, Maki Shigeri:

On Maximum Differential Probability of Generalized Feistel. 89-105 - Andrey Bogdanov, Kyoji Shibutani:

Double SP-Functions: Enhanced Generalized Feistel Networks - Extended Abstract. 106-119 - Meiqin Wang, Yue Sun, Nicky Mouha, Bart Preneel

:
Algebraic Techniques in Differential Cryptanalysis Revisited. 120-141
Hash Functions
- Juraj Sarinay:

Faster and Smoother - VSH Revisited. 142-156 - Hongbo Yu, Xiaoyun Wang:

Cryptanalysis of the Compression Function of SIMD. 157-171
Protocols
- Man Ho Au

, Willy Susilo
, Yi Mu:
Electronic Cash with Anonymous User Suspension. 172-188 - Tetsuya Hatano, Atsuko Miyaji

, Takashi Sato:
T-Robust Scalable Group Key Exchange Protocol with O(logn) Complexity. 189-207 - Raja Naeem Akram

, Konstantinos Markantonakis
, Keith Mayes:
Application-Binding Protocol in the User Centric Smart Card Ownership Model. 208-225
Access Control and Security
- Benjamin W. Long:

Security in Depth through Smart Space Cascades. 226-240 - Mingwu Zhang, Tsuyoshi Takagi:

GeoEnc: Geometric Area Based Keys and Policies in Functional Encryption Systems. 241-258 - Yun Zhang, Christophe Tartary, Huaxiong Wang:

An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder Theorem. 259-275 - Shashank Lagishetty, Pruthvi Reddy Sabbu, Kannan Srinathan:

DMIPS - Defensive Mechanism against IP Spoofing. 276-291
Public Key Cryptography
- Eduarda S. V. Freire, Kenneth G. Paterson:

Provably Secure Key Assignment Schemes from Factoring. 292-309 - Yamin Liu, Bao Li, Xianhui Lu, Dingding Jia:

Efficient CCA-Secure CDH Based KEM Balanced between Ciphertext and Key. 310-318 - Atsushi Fujioka, Yoshiaki Okamoto, Taiichi Saito:

Generic Construction of Strongly Secure Timed-Release Public-Key Encryption. 319-336 - Joseph K. Liu

, Cheng-Kang Chu, Jianying Zhou
:
Identity-Based Server-Aided Decryption. 337-352 - Sanjit Chatterjee, Alfred Menezes, Berkant Ustaoglu

:
A Generic Variant of NIST's KAS2 Key Agreement Protocol. 353-370 - Jia Fan, Yuliang Zheng

, Xiaohu Tang:
A Single Key Pair is Adequate for the Zheng Signcryption. 371-388 - Qiang Tang:

Towards Public Key Encryption Scheme Supporting Equality Test with Fine-Grained Authorization. 389-406
Posters
- Reza Sepahi, Ron Steinfeld, Josef Pieprzyk

:
Lattice-Based Completely Non-malleable PKE in the Standard Model (Poster). 407-411 - Craig S. Wright:

Compliance or Security, What Cost? (Poster). 412-416 - Chiaki Ohtahara, Keita Okada, Yu Sasaki, Takeshi Shimoyama:

Preimage Attacks on Full-ARIRANG (Poster). 417-422 - Bart Preneel

, Hirotaka Yoshida, Dai Watanabe:
Finding Collisions for Reduced Luffa-256 v2 (Poster). 423-427 - Praveen Gauravaram

, Lars R. Knudsen
, Nasour Bagheri
, Lei Wei:
Improved Security Analysis of Fugue-256 (Poster). 428-432 - Lei Wei, Christian Rechberger, Jian Guo

, Hongjun Wu
, Huaxiong Wang, San Ling
:
Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster). 433-438 - Keita Emura

, Atsuko Miyaji
, Mohammad Shahriar Rahman
:
Toward Dynamic Attribute-Based Signcryption (Poster). 439-443 - Christian L. F. Corniaux

, Hossein Ghodosi:
A Verifiable Distributed Oblivious Transfer Protocol. 444-450 - Kun Peng:

Impracticality of Efficient PVSS in Real Life Security Standard (Poster). 451-455 - Hongying Liu, Yukiyasu Tsunoo, Satoshi Goto:

Electromagnetic Analysis Enhancement with Signal Processing Techniques (Poster). 456-461

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














