


default search action
9. ACISP 2004: Sydney, Australia
- Huaxiong Wang, Josef Pieprzyk, Vijay Varadharajan:

Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings. Lecture Notes in Computer Science 3108, Springer 2004, ISBN 3-540-22379-7
Broadcast Encryption and Traitor Tracing
- Shaoquan Jiang, Guang Gong:

Multi-service Oriented Broadcast Encryption. 1-11 - Tomoyuki Asano:

Secure and Insecure Modifications of the Subset Difference Broadcast Encryption Scheme. 12-23 - Vu Dong Tô, Reihaneh Safavi-Naini:

Linear Code Implies Public-Key Traitor Tracing with Revocation. 24-35 - Chong Hee Kim, Yong Ho Hwang, Pil Joong Lee:

TTS without Revocation Capability Secure Against CCA2. 36-49
Private Information Retrieval and Oblivious Transfer
- Yan-Cheng Chang:

Single Database Private Information Retrieval with Logarithmic Communication. 50-61 - Goichiro Hanaoka, Hideki Imai, Jörn Müller-Quade, Anderson C. A. Nascimento

, Akira Otsuka, Andreas J. Winter
:
Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions. 62-73
Trust and Secret Sharing
- Gildas Avoine, Serge Vaudenay:

Optimistic Fair Exchange Based on Publicly Verifiable Secret Sharing. 74-85 - Marcus Peinado, Yuqun Chen, Paul England, John Manferdelli:

NGSCB: A Trusted Open System. 86-97
Cryptanalysis (I)
- Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle:

The Biryukov-Demirci Attack on Reduced-Round Versions of IDEA and MESH Ciphers. 98-109 - YongSup Shin, Jongsung Kim, Guil Kim, Seokhie Hong, Sangjin Lee:

Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2. 110-122 - Jongsung Kim, Guil Kim, Seokhie Hong, Sangjin Lee, Dowon Hong

:
The Related-Key Rectangle Attack - Application to SHACAL-1. 123-136 - Youngdai Ko, Changhoon Lee

, Seokhie Hong, Sangjin Lee:
Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1. 137-148 - Michael J. Jacobson Jr.:

The Security of Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders. 149-156
Cryptanalysis (II)
- Feng Bao:

Analysis of a Conference Scheme Under Active and Passive Attacks. 157-163 - Zhiguo Wan, Shuhong Wang:

Cryptanalysis of Two Password-Authenticated Key Exchange Protocols. 164-175 - Feng Bao, Guilin Wang, Jianying Zhou, Huafei Zhu:

Analysis and Improvement of Micali's Fair Contract Signing Protocol. 176-187
Digital Signatures (I)
- Serge Vaudenay:

Digital Signature Schemes with Domain Parameters: Yet Another Parameter Issue in ECDSA. 188-199 - Dae Hyun Yum, Pil Joong Lee:

Generic Construction of Certificateless Signature. 200-211
Cryptosystems (I)
- Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee, Kouichi Sakurai:

Pseudorandomness of SPN-Type Transformations. 212-223 - Tetsu Iwata, Kaoru Kurosawa:

How to Re-use Round Function in Super-Pseudorandom Permutation. 224-235 - Kaoru Kurosawa, Toshihiko Matsuo:

How to Remove MAC from DHIES. 236-247 - Bruno Crispo, Bogdan C. Popescu, Andrew S. Tanenbaum

:
Symmetric Key Authentication Services Revisited. 248-261
Fast Computation
- Brian King, Ben Rubin:

Improvements to the Point Halving Algorithm. 262-276 - Bo-Yin Yang, Jiun-Ming Chen:

Theoretical Analysis of XL over Small Fields. 277-288 - Chae Hoon Lim:

A New Method for Securing Elliptic Scalar Multiplication Against Side-Channel Attacks. 289-300
Mobile Agents Security
- Ming Yao, Matthew Henricksen, Greg Maitland, Ernest Foo, Ed Dawson:

A Mobile Agent System Providing Offer Privacy. 301-312
Digital Signatures (II)
- Willy Susilo

, Fangguo Zhang
, Yi Mu:
Identity-Based Strong Designated Verifier Signature Schemes. 313-324 - Joseph K. Liu, Victor K. Wei, Duncan S. Wong:

Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract). 325-335 - Toru Nakanishi, Yuji Sugiyama:

A Group Signature Scheme with Efficient Membership Revocation for Reasonable Groups. 336-347 - Zhenjie Huang

, Yumin Wang:
Convertible Nominative Signatures. 348-357
Protocols
- Yiu Shing Terry Tin, Harikrishna Vasanta, Colin Boyd, Juan Manuel González Nieto:

Protocols with Security Proofs for Mobile Applications. 358-369 - Steven D. Galbraith, Herbie J. Hopkins, Igor E. Shparlinski

:
Secure Bilinear Diffie-Hellman Bits. 370-378 - SungJun Min, Go Yamamoto, Kwangjo Kim:

Weak Property of Malleability in NTRUSign. 379-390
Security Management
- Arjen K. Lenstra, Tim Voss:

Information Security Risk Assessment, Aggregation, and Mitigation. 391-401
Access Control and Authorisation
- Chun Ruan, Vijay Varadharajan:

A Weighted Graph Approach to Authorization Delegation and Conflict Resolution. 402-413 - Xibin Zhao, Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun:

Authorization Mechanisms for Virtual Organizations in Distributed Computing Systems. 414-426
Cryptanalysis (II)
- Luke McAven, Reihaneh Safavi-Naini, Moti Yung:

Unconditionally Secure Encryption Under Strong Attacks. 427-439 - Erik Anderson, Cheryl L. Beaver, Timothy Draelos, Richard Schroeppel, Mark Torgerson:

ManTiCore: Encryption with Joint Cipher-State Authentication. 440-453
Cryptanalysis (III)
- Dong-Guk Han, Jongin Lim, Kouichi Sakurai:

On Security of XTR Public Key Cryptosystems Against Side Channel Attacks. 454-465 - Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume:

On the Exact Flexibility of the Flexible Countermeasure Against Side Channel Attacks. 466-477 - Christophe Giraud

, Erik Woodward Knudsen:
Fault Attacks on Signature Schemes. 478-491

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














