


default search action
27th ACISP 2022: Wollongong, NSW, Australia
- Khoa Nguyen

, Guomin Yang
, Fuchun Guo
, Willy Susilo
:
Information Security and Privacy - 27th Australasian Conference, ACISP 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings. Lecture Notes in Computer Science 13494, Springer 2022, ISBN 978-3-031-22300-6
Symmetric-Key Cryptography
- Jian Guo, Ling Song, Haoyang Wang

:
Key Structures: Improved Related-Key Boomerang Attack Against the Full AES-256. 3-23 - Lorenzo Grassi

, Christian Rechberger:
Truncated Differential Properties of the Diagonal Set of Inputs for 5-Round AES. 24-45 - Shotaro Miyashita, Ryoma Ito

, Atsuko Miyaji
:
PNB-Focused Differential Cryptanalysis of ChaCha Stream Cipher. 46-66 - Yuhan Zhang, Wenling Wu, Lei Zhang:

Improved Differential Attack on Round-Reduced LEA. 67-84 - Subodh Bijwe, Amit Kumar Chauhan, Somitra Kumar Sanadhya:

Implementing Grover Oracle for Lightweight Block Ciphers Under Depth Constraints. 85-105 - Yongxia Mao, Wenling Wu, Bolin Wang, Li Zhang:

Improved Division Property for Ciphers with Complex Linear Layers. 106-124 - Alexandre Adomnicai, Kazuhiko Minematsu, Maki Shigeri:

Fast Skinny-128 SIMD Implementations for Sequential Modes of Operation. 125-144
Public-Key Cryptanalysis
- Jinzheng Cao

, Yanbin Pan, Qingfeng Cheng
, Xinghua Li:
Handle the Traces: Revisiting the Attack on ECDSA with EHNP. 147-167 - Lei Bi, Xianhui Lu, Junjie Luo, Kunpeng Wang:

Hybrid Dual and Meet-LWE Attack. 168-188 - Wenshuo Guo, Fangwei Fu:

Cryptanalysis and Repair of a Gabidulin Code Based Cryptosystem from ACISP 2018. 189-205
Public-Key Cryptography
- Yusaku Maeda, Koji Nuida

:
Chosen Ciphertext Secure Keyed Two-Level Homomorphic Encryption. 209-228 - Yumei Li

, Mingwu Zhang, Futai Zhang:
Structure-Preserving Linearly Homomorphic Signature with Designated Combiner for Subspace. 229-243 - Angelique Faye Loe, Liam Medley

, Christian O'Connell, Elizabeth A. Quaglia
:
TIDE: A Novel Approach to Constructing Timed-Release Encryption. 244-264 - Shimin Pan

, Kwan Yin Chan
, Handong Cui
, Tsz Hon Yuen:
Multi-signatures for ECDSA and Its Applications in Blockchain. 265-285
Post-quantum Cryptography
- Shi Bai, Austin Beard, Floyd Johnson, Sulani K. B. Vidhanalage, Tran Ngo:

Fiat-Shamir Signatures Based on Module-NTRU. 289-308 - Kittiphon Phalakarn

, Vorapong Suppakitpaisarn, M. Anwar Hasan:
Speeding-Up Parallel Computation of Large Smooth-Degree Isogeny Using Precedence-Constrained Scheduling. 309-331 - Xiaohui Ding, Muhammed F. Esgin, Amin Sakzad, Ron Steinfeld:

An Injectivity Analysis of Crystals-Kyber and Implications on Quantum Security. 332-351
Cryptographic Protocols
- Kristian Gjøsteen

, Thomas Haines, Johannes Müller
, Peter B. Rønne
, Tjerand Silde
:
Verifiable Decryption in the Head. 355-374 - Handong Zhang, Puwen Wei, Haiyang Xue

, Yi Deng, Jinsong Li, Wei Wang, Guoxiao Liu:
Resumable Zero-Knowledge for Circuits from Symmetric Key Primitives. 375-398 - Donghoon Chang, Surabhi Garg

, Munawar Hasan, Sweta Mishra
:
On Security of Fuzzy Commitment Scheme for Biometric Authentication. 399-419 - Mayank Raikwar

, Danilo Gligoroski
:
SoK: Decentralized Randomness Beacon Protocols. 420-446
Blockchain
- Xiaofei Wu, Hao Wang, Chunpeng Ge, Lu Zhou, Qiong Huang, Lanju Kong, Lizhen Cui, Zhe Liu:

CCOM: Cost-Efficient and Collusion-Resistant Oracle Mechanism for Smart Contracts. 449-468 - Shenwei Chen, Zhen Liu, Yu Long, Dawu Gu:

DeChain: A Blockchain Framework Enhancing Decentralization via Sharding. 469-488 - Arash Mirzaei, Amin Sakzad, Jiangshan Yu

, Ron Steinfeld:
Garrison: A Novel Watchtower Scheme for Bitcoin. 489-508 - Chen Zhao, Jianing Ding, Zhenzhen Li, Zhen Li, Gang Xiong

, Gaopeng Gou:
Shoot Before You Escape: Dynamic Behavior Monitor of Bitcoin Users via Bi-Temporal Network Analytics. 509-528

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














