


default search action
8. ACISP 2003: Wollongong, Australia
- Reihaneh Safavi-Naini, Jennifer Seberry:

Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings. Lecture Notes in Computer Science 2727, Springer 2003, ISBN 3-540-40515-1
Privacy and Anonymity
- Laurence Bull, David McG. Squire

, Jan Newmarch, Yuliang Zheng
:
Grouping Verifiable Content for Selective Disclosure. 1-12 - Shigeki Kitazawa, Masakazu Soshi, Atsuko Miyaji

:
Evaluation of Anonymity of Practical Anonymous Communication Networks. 13-26 - Pino Persiano, Ivan Visconti

:
An Anonymous Credential System and a Privacy-Aware PKI. 27-38 - Masayuki Abe, Hideki Imai:

Flaws in Some Robust Optimistic Mix-Nets. 39-50
Invited Talk (I)
- Andrew M. Odlyzko:

The Unsolvable Privacy Problem and Its Implications for Security Technologies. 51-54
Elliptic Curves
- Yvonne Hitchcock, Paul Montague, Gary Carter, Ed Dawson

:
The Security of Fixed versus Random Elliptic Curves in Cryptography. 55-66 - Dong-Guk Han, Nam Su Chang, Seok Won Jung, Young-Ho Park

, Chang Han Kim, Heuisu Ryu:
Cryptanalysis of the Full Version Randomized Addition-Subtraction Chains. 67-78 - André Weimerskirch, Douglas Stebila

, Sheueling Chang Shantz:
Generic GF(2) Arithmetic in Software and Its Application to ECC. 79-92 - Seigo Arita:

An Addition Algorithm in Jacobian of C34 Curve. 93-105
Cryptanalysis (I)
- Sung-Ming Yen:

Amplified Differential Power Cryptanalysis on Rijndael Implementations with Exponentially Fewer Power Traces. 106-117 - Chien-Ning Chen, Sung-Ming Yen:

Differential Fault Analysis on AES Key Schedule and Some Coutnermeasures. 118-129 - Tetsu Iwata, Tohru Yagi, Kaoru Kurosawa:

On the Pseudorandomness of KASUMI Type Permutations. 130-141 - Masahiko Takenaka, Takeshi Shimoyama, Takeshi Koshiba

:
Theoretical Analysis of chi2 Attack on RC6. 142-153
Mobile and Network Security
- Libin Wang, Kefei Chen:

A Typed Theory for Access Control and Information Flow Control in Mobile Systems. 154-165 - Yiu Shing Terry Tin, Colin Boyd, Juan Manuel González Nieto:

Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach. 166-179 - Jabeom Gu

, Sehyun Park, Ohyoung Song, Jaeil Lee, Jaehoon Nah, Sung Won Sohn:
Mobile PKI: A PKI-Based Authentication Framework for the Next Generation Mobile Communications. 180-191 - Arvind Narayanan, C. Pandu Rangan, Kwangjo Kim:

Practical Pay TV Schemes. 192-203 - Ha Yoon Song, Han-gyoo Kim:

Cooperative Routers against DoS Attacks. 204-213 - Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao

:
Detecting Distributed Denial of Service Attacks by Sharing Distributed Beliefs. 214-225 - Abhishek Singh, Ola Nordström, Chenghuai Lu, André L. M. dos Santos:

Malicious ICMP Tunneling: Defense against the Vulnerability. 226-235 - Sébastien Canard, Jacques Traoré:

On Fair E-cash Systems Based on Group Signature Schemes. 237-248
Invited Talk (II)
- Andreas Pashalidis, Chris J. Mitchell

:
A Taxonomy of Single Sign-On Systems. 249-264
Cryptanalysis (II)
- Jaechul Sung

, Deukjo Hong, Sangjin Lee:
Key Recovery Attacks on the RMAC, TMAC, and IACBC. 265-273 - Daewan Han, Jin Hong

, Jae Woo Han, Daesung Kwon:
Key Recovery Attacks on NTRU without Ciphertext Validation Routine. 274-284 - Sung-Ming Yen, Sang-Jae Moon, JaeCheol Ha:

Permanent Fault Attack on the Parameters of RSA with CRT. 285-296 - Adam L. Young, Moti Yung:

Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts. 297-311
Signature
- Fangguo Zhang

, Kwangjo Kim:
Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings. 312-323 - Jung Yeon Hwang, Hyun-Jeong Kim, Dong Hoon Lee, Jong In Lim:

Digital Signature Schemes with Restriction on Signing Capability. 324-335 - Kei Kawauchi, Mitsuru Tada:

On the Extract Security of Multi-signature Schemes Based on RSA. 336-349
Cryptosystems (I)
- Ivan Damgård, Mads Jurik:

A Length-Flexible Threshold Cryptosystem with Applications. 350-364 - Goichiro Hanaoka, Kazuto Ogawa, Itsuro Murota, Go Ohtake, Keigo Majima, Kimiyuki Oyamada, Seiichi Gohshi, Seiichi Namba, Hideki Imai:

Separating Encryption and Key Issuance in Digital Rights Management Systems. 365-376 - Yong Ho Hwang, Chong Hee Kim, Pil Joong Lee:

An Efficient Revocation Scheme with Minimal Message Length for Stateless Receivers. 377-386 - Josef Pieprzyk

, David Pointcheval
:
Josef Pieprzyk, David Pointcheval. 387-401
Invited Talk (III)
- Li Gong:

Is Cross-Platform Security Possible? 402
Cryptosystems (II)
- Jason Reid, Ian Cheong, Matthew Henricksen, Jason Smith:

A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems. 403-415 - Feng Bao:

Cryptanalysis of a New Cellular Automata Cryptosystem. 416-427 - Chik How Tan, Xun Yi, Chee Kheong Siew:

A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers. 428-442 - Ali A. Kanso

:
Clock-Controlled Shrinking Generator of Feedback Shift Registers. 443-451
Key Management
- Yong Ho Hwang, Dae Hyun Yum, Pil Joong Lee:

EPA: An Efficient Password-Based Protocal for Authenticated Key Exchange. 452-463 - Vanesa Daza

, Javier Herranz
, Germán Sáez:
Constructing General Dynamic Group Key Distribution Schemes with Decentralized User Join. 464-475 - Taekyoung Kwon:

Robust Software Tokens - Yet Another Method for Securing User's Digital Identity. 476-487
Theory and Hash Functions
- Hwankoo Kim

, Sang-Jae Moon:
Public-Key Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders. 488-497 - Khoongming Khoo, Guang Gong:

New Constructions for Resilient and Highly Nonlinear Boolean Functions. 498-509 - Toshihiko Matsuo, Kaoru Kurosawa:

On Parallel Hash Functions Based on Block-Cipher. 510-521 - Swee-Huay Heng, Kaoru Kurosawa:

Square Hash with a Small Key Size. 522-531

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














