


default search action
7. ACISP 2002: Melbourne, Victoria, Australia
- Lynn Margaret Batten, Jennifer Seberry:

Information Security and Privacy, 7th Australian Conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002, Proceedings. Lecture Notes in Computer Science 2384, Springer 2002, ISBN 3-540-43861-0
Key Handling
- Ingrid Biehl, Tsuyoshi Takagi:

A New Distributed Primality Test for Shared RSA Keys Using Quadratic Fields. 1-16 - Yanjiang Yang, Feng Bao, Robert H. Deng

:
Security Analysis and Improvement of the Global Key Recovery System. 17-24 - Andrew J. Clark, Ed Dawson, Joanne Fuller, Jovan Dj. Golic, Hoon-Jae Lee, William Millan, Sang-Jae Moon, Leonie Simpson

:
The LILI-II Keystream Generator. 25-39 - Hartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang:

A Secure Re-keying Scheme with Key Recovery Property. 40-55
Trust and Secret Sharing
- Marie Henderson, Robert S. Coulter, Ed Dawson, Eiji Okamoto:

Modelling Trust Structures for Public Key Infrastructures. 56-70 - Susan G. Barwick, Wen-Ai Jackson, Keith M. Martin, Peter R. Wild:

Size of Broadcast in Threshold Schemes with Disenrollment. 71-88 - Brian King:

Requirements for Group Independent Linear Threshold Secret Sharing Schemes. 89-106 - Krista Bennett, Christian Grothoff, Tzvetan Horozov, Ioana Patrascu:

Efficient Sharing of Encrypted Data. 107-120 - Josef Pieprzyk

, Xian-Mo Zhang:
Cheating Prevention in Linear Secret Sharing. 121-135
Fast Computation
- Wieland Fischer, Jean-Pierre Seifert:

Note on Fast Computation of Secret RSA Exponents. 136-143 - Leonid Reyzin, Natan Reyzin:

Better than BiBa: Short One-Time Signatures with Fast Signing and Verifying. 144-153
Cryptanalysis I
- Hongjun Wu, Feng Bao:

Cryptanalysis of Stream Cipher COS(2, 128) Mode I. 154-158 - David Soldera, Jennifer Seberry, Chengxin Qu:

The Analysis of Zheng-Seberry Scheme. 159-168 - Hongjun Wu:

Cryptanalysis of Stream Cipher Alpha1. 169-175 - James P. Hughes:

A Linear Algebraic Attack on the AAFG1 Braid Group Cryptosystem. 176-189
Elliptic Curves
- YoungJu Choie, D. Yun:

Isomorphism Classes of Hyperelliptic Curves of Genus 2 over Fq. 190-202 - Fangguo Zhang

, Shengli Liu, Kwangjo Kim:
Compact Representation of Domain Parameters of Hyperelliptic Curve Cryptosystems. 203-213 - Yvonne Hitchcock, Paul Montague:

A New Elliptic Curve Scalar Multiplication Algorithm to Resist Simple Power Analysis. 214-225
AES
- Lauren May, Matthew Henricksen, William Millan, Gary Carter, Ed Dawson:

Strengthening the Key Schedule of the AES. 226-240 - Ron Steinfeld, Joonsang Baek

, Yuliang Zheng
:
On the Necessity of Strong Assumptions for the Security of a Class of Asymmetric Encryption Schemes. 241-256
Security Management
- Matthew J. Warren

, Lynn Margaret Batten:
Security Management: An Information Systems Setting. 257-270 - Chun Ruan, Vijay Varadharajan:

Resolving Conflicts in Authorization Delegations. 271-285 - Michael Hitchens

, Vijay Varadharajan, Gregory Saunders:
Policy Administration Domains. 286-302
Authentication
- Jianying Zhou:

Maintaining the Validity of Digital Signatures in B2B Applications. 303-315 - Francesc Sebé, Josep Domingo-Ferrer:

Short 3-Secure Fingerprinting Codes for Copyright Protection. 316-327 - Mitsuru Tada:

An Order-Specified Multisignature Scheme Secure against Active Insider Attacks. 328-345 - Paul England, Marcus Peinado:

Authenticated Operation of Open Computing Devices. 346-361 - Myungsun Kim, Kwangjo Kim:

A New Identification Scheme Based on the Bilinear Diffie-Hellman Problem. 362-378
Invited Talk
- Bimal K. Roy:

A Brief Outline of Research on Correlation Immune Functions. 379-394
Oblivious Transfer
- Yi Mu, Junqi Zhang, Vijay Varadharajan:

m out of n Oblivious Transfer. 395-405
Cryptanalysis II
- Sangwoo Park, Soo Hak Sung, Seongtaek Chee, Jongin Lim:

On the Security of Reduced Versions of 3-Pass HAVAL. 406-419 - Katsuyuki Okeya, Kouichi Sakurai:

On Insecurity of the Side Channel Attack Countermeasure Using Addition-Subtraction Chains under Distinguishability between Addition and Doubling. 420-435 - Kouichi Sakurai, Tsuyoshi Takagi:

On the Security of a Modified Paillier Public-Key Primitive. 436-448
Dealing with Adversaries
- Biljana Cubaleska, Weidong Qiu, Markus Schneider:

How to Play Sherlock Holmes in the World of Mobile Agents. 449-463 - Dong-Guk Han, Hye-Young Park, Young-Ho Park, Sangjin Lee, Dong Hoon Lee, Hyungjin Yang:

A Practical Approach Defeating Blackmailing. 464-481 - Hyun-Jeong Kim, Dong Hoon Lee, Moti Yung:

Privacy against Piracy: Protecting Two-Level Revocable P-K Traitor Tracing. 482-496 - M. V. N. Ashwin Kumar, K. Srinathan, C. Pandu Rangan:

Asynchronous Perfectly Secure Computation Tolerating Generalized Adversaries. 497-512

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














