


default search action
15. ACISP 2010: Sydney, Australia
- Ron Steinfeld, Philip Hawkes:

Information Security and Privacy - 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings. Lecture Notes in Computer Science 6168, Springer 2010, ISBN 978-3-642-14080-8
Symmetric Key Encryption
- Ruilin Li, Bing Sun, Chao Li, Longjiang Qu:

Cryptanalysis of a Generalized Unbalanced Feistel Network Structure. 1-18 - Kenneth Koon-Ho Wong

, Gregory V. Bard:
Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Systems. 19-36 - Phuong Ha Nguyen, Lei Wei, Huaxiong Wang, San Ling

:
On Multidimensional Linear Cryptanalysis. 37-52 - Matthew Henricksen, Wun-She Yap

, Chee Hoo Yian, Shinsaku Kiyomoto, Toshiaki Tanaka:
Side-Channel Analysis of the K2 Stream Cipher. 53-73 - Jonathan Etrog, Matthew J. B. Robshaw:

On Unbiased Linear Approximations. 74-86
Hash Functions
- Jean-Philippe Aumasson, Emilia Käsper, Lars R. Knudsen, Krystian Matusiewicz, Rune Steinsmo Ødegård, Thomas Peyrin, Martin Schläffer:

Distinguishers for the Compression Function and Output Transformation of Hamsi-256. 87-103 - Christian Rechberger:

Second-Preimage Analysis of Reduced SHA-1. 104-116 - Ewan Fleischmann, Michael Gorski, Stefan Lucks:

Some Observations on Indifferentiability. 117-134
Public Key Cryptography
- Huafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai:

Adaptive and Composable Non-committing Encryptions. 135-144 - Manuel Barbosa

, Pooya Farshim:
Relations among Notions of Complete Non-malleability: Indistinguishability Characterisation and Efficient Construction without Random Oracles. 145-163 - Manuel Barbosa

, Pooya Farshim:
Strong Knowledge Extractors for Public-Key Encryption Schemes. 164-181 - Ryo Nishimaki, Eiichiro Fujisaki, Keisuke Tanaka:

A Multi-trapdoor Commitment Scheme from the RSA Assumption. 182-199 - Xiaofeng Chen, Fangguo Zhang

, Willy Susilo
, Haibo Tian, Jin Li, Kwangjo Kim:
Identity-Based Chameleon Hash Scheme without Key Exposure. 200-215 - Jun Shao, Min Feng, Bin B. Zhu, Zhenfu Cao

, Peng Liu:
The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key. 216-232 - Jean-François Biasse

, Michael J. Jacobson Jr., Alan K. Silvester:
Security Estimates for Quadratic Field Based Cryptosystems. 233-247 - Noboru Kunihiro

:
Solving Generalized Small Inverse Problems. 248-263
Protocols
- Kenneth G. Paterson, Douglas Stebila

:
One-Time-Password-Authenticated Key Exchange. 264-281 - James Birkett, Douglas Stebila

:
Predicate-Based Key Exchange. 282-299 - M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto:

Attribute-Based Authenticated Key Exchange. 300-317 - Ahto Buldas

, Margus Niitsoo:
Optimally Tight Security Proofs for Hash-Then-Publish Time-Stamping. 318-335 - Rafik Chaabouni, Helger Lipmaa

, Abhi Shelat:
Additive Combinatorics and Discrete Logarithm Based Range Protocols. 336-351 - Man Ho Au

, Willy Susilo
, Yi Mu:
Proof-of-Knowledge of Representation of Committed Value and Its Applications. 352-369
Network Security
- Li Sun, Steven Versteeg, Serdar Boztas

, Trevor Yann:
Pattern Recognition Techniques for the Classification of Malware Packers. 370-390 - Marek Klonowski, Michal Koza, Miroslaw Kutylowski:

Repelling Sybil-Type Attacks in Wireless Ad Hoc Systems. 391-402

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














