


default search action
17. ACISP 2012: Wollongong, NSW, Australia
- Willy Susilo

, Yi Mu, Jennifer Seberry:
Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings. Lecture Notes in Computer Science 7372, Springer 2012, ISBN 978-3-642-31447-6
Fundamentals
- Kaori Tosu, Noboru Kunihiro

:
Optimal Bounds for Multi-Prime Φ-Hiding Assumption. 1-14 - Atsushi Fujioka, Mark Manulis

, Koutarou Suzuki, Berkant Ustaoglu
:
Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchange. 15-28 - Haruna Higo, Keisuke Tanaka, Akihiro Yamada, Kenji Yasunaga:

A Game-Theoretic Perspective on Oblivious Transfer. 29-42 - Yuji Nagashima, Noboru Kunihiro

:
Faster Algorithm for Solving Hard Knapsacks for Moderate Message Length. 43-56 - Peter Lory, Manuel Liedel:

Accelerating the Secure Distributed Computation of the Mean by a Chebyshev Expansion. 57-70
Cryptanalysis
- Takanori Isobe, Kyoji Shibutani:

Security Analysis of the Lightweight Block Ciphers XTEA, LED and Piccolo. 71-86 - Yu Sasaki, Sareh Emami, Deukjo Hong, Ashish Kumar:

Improved Known-Key Distinguishers on Feistel-SP Ciphers and Application to Camellia. 87-100 - Jiazhe Chen

, Leibo Li:
Low Data Complexity Attack on Reduced Camellia-256. 101-114 - Xianmeng Meng, Xuexin Zheng:

Cryptanalysis of RSA with a Small Parameter. 115-123 - Jintai Ding

, Yanbin Pan, Yingpu Deng:
An Algebraic Broadcast Attack against NTRU. 124-137
Message Authentication Codes and Hash Functions
- Mufeed Juma AlMashrafi, Harry Bartlett

, Leonie Simpson
, Ed Dawson
, Kenneth Koon-Ho Wong
:
Analysis of Indirect Message Injection for MAC Generation Using Stream Ciphers. 138-151 - Ewan Fleischmann, Christian Forler, Stefan Lucks, Jakob Wenzel:

Weimar-DM: A Highly Secure Double-Length Compression Function. 152-165
Public Key Cryptography
- K. Preetha Mathew, Sachin Vasant, Sridhar Venkatesan, C. Pandu Rangan:

An Efficient IND-CCA2 Secure Variant of the Niederreiter Encryption Scheme in the Standard Model. 166-179 - Kirill Morozov, Tsuyoshi Takagi:

Zero-Knowledge Protocols for the McEliece Encryption. 180-193 - Jothi Rangasamy

, Douglas Stebila
, Colin Boyd, Juan Manuel González Nieto, Lakshmi Kuppusamy
:
Effort-Release Public-Key Encryption from Cryptographic Puzzles. 194-207 - Manh Ha Nguyen, Keisuke Tanaka, Kenji Yasunaga:

Leakage-Resilience of Stateless/Stateful Public-Key Encryption from Hash Proofs. 208-222 - Kun Peng, Matt Henricksen:

How to Fix Two RSA-Based PVSS Schemes - Exploration and Solution. 223-234
Digital Signatures
- Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong:

Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions. 235-246 - Xiao Tan

, Duncan S. Wong:
Generalized First Pre-image Tractable Random Oracle Model and Signature Schemes. 247-260 - Haibo Tian, Xiaofeng Chen, Jin Li:

A Short Non-delegatable Strong Designated Verifier Signature. 261-279 - S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan:

Deterministic Identity Based Signature Scheme and Its Application for Aggregate Signatures. 280-293 - Tsz Hon Yuen

, Siu-Ming Yiu, Lucas Chi Kwong Hui:
Fully Leakage-Resilient Signatures with Auxiliary Inputs. 294-307
Identity-Based and Attribute-Based Cryptography
- Duong Hieu Phan

, David Pointcheval
, Siamak Fayyaz Shahandashti
, Mario Strefler:
Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts. 308-321 - Xuhua Zhou, Xuhua Ding

, Kefei Chen:
A Generic Construction of Accountable Decryption and Its Applications. 322-335 - Aijun Ge

, Rui Zhang, Cheng Chen, Chuangui Ma, Zhenfeng Zhang:
Threshold Ciphertext Policy Attribute-Based Encryption with Constant Size Ciphertexts. 336-349 - Juan Manuel González Nieto, Mark Manulis

, Dongdong Sun:
Fully Private Revocable Predicate Encryption. 350-363 - Jun Shao:

Anonymous ID-Based Proxy Re-Encryption. 364-375
Lattice-Based Cryptography
- Yoshinori Aono, Manindra Agrawal, Takakazu Satoh, Osamu Watanabe

:
On the Optimality of Lattices for the Coppersmith Technique. 376-389 - Jie Chen, Hoon Wei Lim, San Ling

, Huaxiong Wang, Khoa Nguyen
:
Revocable Identity-Based Encryption from Lattices. 390-403
Lightweight Cryptography
- Axel Poschmann, Matthew J. B. Robshaw:

On Area, Time, and the Right Trade-Off. 404-418
Short Papers
- Paul Stankovski

, Martin Hell
, Thomas Johansson:
Analysis of Xorrotation with Application to an HC-128 Variant. 419-425 - Siamak Fayyaz Shahandashti

, Reihaneh Safavi-Naini, Philip Ogunbona
:
Private Fingerprint Matching. 426-433 - Kaleb Lee, Colin Boyd, Juan Manuel González Nieto:

Minimizing Information Leakage of Tree-Based RFID Authentication Protocols Using Alternate Tree-Walking. 434-441 - A. S. M. Kayes

, Jun Han, Alan W. Colman
:
ICAF: A Context-Aware Framework for Access Control. 442-449 - Wenpan Jing, Haixia Xu, Bao Li:

Non-malleable Instance-Dependent Commitment in the Standard Model. 450-457

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














