


default search action
12. ACISP 2007: Townsville, Australia
- Josef Pieprzyk, Hossein Ghodosi, Ed Dawson:

Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings. Lecture Notes in Computer Science 4586, Springer 2007, ISBN 978-3-540-73457-4
Stream Ciphers
- Steve Babbage, Carlos Cid, Norbert Pramstaller, Håvard Raddum:

An Analysis of the Hermes8 Stream Ciphers. 1-10 - Sultan Al-Hinai, Ed Dawson, Matthew Henricksen, Leonie Ruth Simpson

:
On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks. 11-28 - Debojyoti Bhattacharya, Debdeep Mukhopadhyay, Dhiman Saha, Dipanwita Roy Chowdhury:

Strengthening NLS Against Crossword Puzzle Attack. 29-44
Hashing
- Jun Yajima

, Yu Sasaki, Yusuke Naito, Terutoshi Iwasaki, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta:
A New Strategy for Finding a Differential Path of SHA-1. 45-58 - Donghoon Chang, Moti Yung, Jaechul Sung, Seokhie Hong, Sangjin Lee:

Preimage Attack on the Parallel FFT-Hashing Function. 59-67 - Norbert Pramstaller, Mario Lamberger, Vincent Rijmen:

Second Preimages for Iterated Hash Functions and Their Implications on MACs. 68-81 - Olivier Billet

, Matthew J. B. Robshaw, Thomas Peyrin:
On Building Hash Functions from Multivariate Quadratic Equations. 82-95
Biometrics
- Julien Bringer, Hervé Chabanne, Malika Izabachène, David Pointcheval

, Qiang Tang, Sébastien Zimmer:
An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication. 96-106 - Jovan Dj. Golic, Madalina Baltatu:

Soft Generation of Secure Biometric Keys. 107-121
Secret Sharing
- Toshinori Araki, Satoshi Obana:

Flaws in Some Secret Sharing Schemes Against Cheating. 122-132 - Toshinori Araki:

Efficient (k, n) Threshold Secret Sharing Schemes Secure Against Cheating from n-1 Cheaters. 133-142
Cryptanalysis
- Kitae Jeong, Changhoon Lee

, Jaechul Sung, Seokhie Hong, Jongin Lim:
Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128. 143-157 - Fen Liu, Wen Ji, Lei Hu, Jintai Ding, Shuwang Lv, Andrei Pyshkin, Ralf-Philipp Weinmann:

Analysis of the SMS4 Block Cipher. 158-170 - Yongdong Wu, Feng Bao, Robert H. Deng

:
Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme. 171-183
Public Key Cryptography
- Jean-Philippe Aumasson, Matthieu Finiasz, Willi Meier, Serge Vaudenay:

TCHo: A Hardware-Oriented Trapdoor Cipher. 184-199 - Ryotaro Hayashi, Keisuke Tanaka:

Anonymity on Paillier's Trap-Door Permutation. 200-214 - Qiong Huang, Duncan S. Wong:

Generic Certificateless Key Encapsulation Mechanism. 215-229 - Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume:

Double-Size Bipartite Modular Multiplication. 230-244 - Erik Dahmen, Katsuyuki Okeya, Daniel Schepers:

Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography. 245-258 - Takeru Ishihara, Hiroshi Aono, Sadayuki Hongo, Junji Shikata:

Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM. 259-273 - James Birkett, Alexander W. Dent, Gregory Neven, Jacob C. N. Schuldt:

Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards. 274-292
Authentication
- Christophe Tartary, Huaxiong Wang:

Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication. 293-307 - Xinyi Huang, Yi Mu, Willy Susilo

, Duncan S. Wong, Wei Wu:
Certificateless Signature Revisited. 308-322 - Cheng-Kang Chu, Wen-Guey Tzeng:

Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures. 323-337 - Sylvain Pasini, Serge Vaudenay:

Hash-and-Sign with Weak Hashing Made Secure. 338-354 - Kan Yasuda:

"Sandwich" Is Indeed Secure: How to Authenticate a Message with Just One Hashing. 355-369 - Akihiro Yamamura

, Takashi Kurokawa, Junji Nakazato:
Threshold Anonymous Group Identification and Zero-Knowledge Proof. 370-384 - Mohammad Reza Reyhanitabar, Shuhong Wang, Reihaneh Safavi-Naini:

Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions. 385-399
E-Commerce
- Stefan Brands, Liesje Demuynck, Bart De Decker:

A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users. 400-415 - Ivan Damgård, Martin Geisler, Mikkel Krøigaard:

Efficient and Secure Comparison for On-Line Auctions. 416-430 - Man Ho Au, Willy Susilo

, Yi Mu:
Practical Compact E-Cash. 431-445
Security
- Suvasini Panigrahi, Amlan Kundu, Shamik Sural

, Arun K. Majumdar:
Use of Dempster-Shafer Theory and Bayesian Inferencing for Fraud Detection in Mobile Communication Networks. 446-460 - Kannan Srinathan, Prasad Raghavendra, C. Pandu Rangan:

On Proactive Perfectly Secure Message Transmission. 461-473

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














