


default search action
20. ACISP 2015: Brisbane, QLD, Australia
- Ernest Foo, Douglas Stebila

:
Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings. Lecture Notes in Computer Science 9144, Springer 2015, ISBN 978-3-319-19961-0
Symmetric Cryptanalysis
- Zhelei Sun, Peng Wang

, Liting Zhang:
Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes. 3-19 - Bingke Ma, Bao Li, Ronglin Hao, Xiaoqian Li:

Cryptanalysis of Reduced-Round Whirlwind. 20-38 - Biaoshuai Tao, Hongjun Wu

:
Improving the Biclique Cryptanalysis of AES. 39-56
Public Key Cryptography
- Rongmao Chen, Yi Mu, Guomin Yang

, Fuchun Guo
, Xiaofen Wang:
A New General Framework for Secure Public Key Encryption with Keyword Search. 59-76 - Yusuke Sakai

, Keita Emura
, Jacob C. N. Schuldt, Goichiro Hanaoka
, Kazuo Ohta:
Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptions. 77-92 - Tarun Kumar Bansal, Donghoon Chang, Somitra Kumar Sanadhya

:
Sponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length Message. 93-106 - Christophe Nègre, Guilherme Perin:

Trade-Off Approaches for Leak Resistant Modular Arithmetic in RNS. 107-124
Identity-Based Encryption
- Qiang Tang:

Towards Forward Security Properties for PEKS and IBE. 127-144 - Kaoru Kurosawa, Le Trieu Phong:

IBE Under k k -LIN with Shorter Ciphertexts and Private Keys. 145-159 - Jianchang Lai, Yi Mu, Fuchun Guo

, Willy Susilo
:
Improved Identity-Based Online/Offline Encryption. 160-173 - Yuu Ishida, Yohei Watanabe, Junji Shikata:

Constructions of CCA-Secure Revocable Identity-Based Encryption. 174-191
Digital Signatures
- Felix Günther, Bertram Poettering:

Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes. 195-212 - Yuyu Wang, Keisuke Tanaka:

Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Continuous Leakage Resiliency. 213-229 - Priyanka Bose, Dipanjan Das

, Chandrasekaran Pandu Rangan:
Constant Size Ring Signature Without Random Oracle. 230-247
Security Protocols
- Tingting Zhang, Hongda Li, Guifang Huang:

Constant-Round Leakage-Resilient Zero-Knowledge Argument for NP from the Knowledge-of-Exponent Assumption. 251-269 - Benjamin Dowling, Douglas Stebila

:
Modelling Ciphersuite and Version Negotiation in the TLS Protocol. 270-288 - Leliel Trethowen, Craig Anslow, Stuart Marshall, Ian Welch

:
VisRAID: Visualizing Remote Access for Intrusion Detection. 289-306 - Khalid Alissa, Jason Reid, Ed Dawson

, Farzad Salim:
BP-XACML an Authorisation Policy Language for Business Processes. 307-325
Symmetric Cryptanalysis
- Ryoma Ito

, Atsuko Miyaji
:
How TKIP Induces Biases of Internal States of Generic RC4. 329-342 - Shamit Ghosh, Dhiman Saha

, Abhrajit Sengupta, Dipanwita Roy Chowdhury:
Preventing Fault Attacks Using Fault Randomization with a Case Study on AES. 343-355 - Gildas Avoine, Adrien Bourgeois, Xavier Carpent

:
Analysis of Rainbow Tables with Fingerprints. 356-374
Privacy Protocols
- Yiteng Feng, Yi Mu, Guomin Yang

, Joseph K. Liu
:
A New Public Remote Integrity Checking Scheme with User Privacy. 377-394 - Clémentine Gritti, Willy Susilo

, Thomas Plantard
:
Efficient Dynamic Provable Data Possession with Public Verifiability and Data Privacy. 395-412 - Rolf Egert, Marc Fischlin, David Gens, Sven Jacob, Matthias Senker, Jörn Tillmanns:

Privately Computing Set-Union and Set-Intersection Cardinality via Bloom Filters. 413-430
Symmetric Constructions
- Nilanjan Datta, Kan Yasuda:

Generalizing PMAC Under Weaker Assumptions. 433-450 - Megha Agrawal, Donghoon Chang, Somitra Sanadhya

:
sp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained Devices. 451-468
Homomorphic Encryption and Obfuscation
- Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba

:
Secure Statistical Analysis Using RLWE-Based Homomorphic Encryption. 471-487 - Daniel J. Bernstein, Andreas Hülsing

, Tanja Lange, Ruben Niederhagen:
Bad Directions in Cryptographic Hash Functions. 488-508

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














