


default search action
22. ACISP 2017: Auckland, New Zealand
- Josef Pieprzyk, Suriadi Suriadi:

Information Security and Privacy - 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part I. Lecture Notes in Computer Science 10342, Springer 2017, ISBN 978-3-319-60054-3
Public Key Encryption
- Puwen Wei, Wei Wang, Bingxin Zhu, Siu-Ming Yiu:

Tightly-Secure Encryption in the Multi-user, Multi-challenge Setting with Improved Efficiency. 3-22 - Shiwei Zhang, Yi Mu, Guomin Yang

, Xiaofen Wang:
Hierarchical Functional Encryption for Linear Transformations. 23-43 - Shuai Han, Shengli Liu:

KDM-Secure Public-Key Encryption from Constant-Noise LPN. 44-64 - Ahto Buldas

, Matthias Geihs, Johannes Buchmann:
Long-Term Secure Commitments via Extractable-Binding Commitments. 65-81
Attribute-Based Encryption
- Katsuyuki Takashima:

New Proof Techniques for DLIN-Based Adaptively Secure Attribute-Based Encryption. 85-105 - Hui Cui

, Robert H. Deng
, Joseph K. Liu, Yingjiu Li:
Attribute-Based Encryption with Expressive and Authorized Keyword Search. 106-126 - Yanjiang Yang, Joseph K. Liu, Zhuo Wei, Xinyi Huang:

Towards Revocable Fine-Grained Encryption of Cloud Data: Reducing Trust upon Cloud. 127-144
Identity-Based Encryption
- Shengmin Xu, Guomin Yang

, Yi Mu, Willy Susilo
:
Mergeable and Revocable Identity-Based Encryption. 147-167 - Tong Wu

, Sha Ma, Yi Mu, Shengke Zeng:
ID-Based Encryption with Equality Test Against Insider Attack. 168-183 - Atsushi Takayasu, Yohei Watanabe:

Lattice-Based Revocable Identity-Based Encryption with Bounded Decryption Key Exposure Resistance. 184-204
Searchable Encryption
- Peng Xu, Shuai Liang, Wei Wang, Willy Susilo

, Qianhong Wu, Hai Jin:
Dynamic Searchable Symmetric Encryption with Physical Deletion and Small Leakage. 207-226 - Shabnam Kasra Kermanshahi

, Joseph K. Liu, Ron Steinfeld:
Multi-user Cloud-Based Secure Keyword Search. 227-247 - Hong Zhu

, Zhuolin Mei, Bing Wu, Hongbo Li, Zongmin Cui:
Fuzzy Keyword Search and Access Control over Ciphertexts in Cloud Computing. 248-265 - Shujie Cui, Muhammad Rizwan Asghar

, Steven D. Galbraith
, Giovanni Russello:
Secure and Practical Searchable Encryption: A Position Paper. 266-281
Cryptanalysis
- Hassan Qahur Al Mahri, Leonie Simpson

, Harry Bartlett
, Ed Dawson
, Kenneth Koon-Ho Wong
:
Fault Attacks on XEX Mode with Application to Certain Authenticated Encryption Modes. 285-305 - Gildas Avoine, Xavier Carpent

, Barbara Kordy, Florent Tardif:
How to Handle Rainbow Tables with External Memory. 306-323 - Mengce Zheng

, Noboru Kunihiro
, Honggang Hu:
Improved Factoring Attacks on Multi-prime RSA with Small Prime Difference. 324-342 - Suvradip Chakraborty, Goutam Paul, C. Pandu Rangan:

Efficient Compilers for After-the-Fact Leakage: From CPA to CCA-2 Secure PKE to AKE. 343-362 - Yuki Funabiki, Yosuke Todo

, Takanori Isobe, Masakatu Morii:
Improved Integral Attack on HIGHT. 363-383 - Ivan Tjuawinata, Tao Huang, Hongjun Wu

:
Cryptanalysis of Simpira v2. 384-401 - Tingting Cui, Ling Sun, Huaifeng Chen, Meiqin Wang:

Statistical Integral Distinguisher with Multi-structure and Its Application on AES. 402-420 - Yuhei Watanabe

, Takanori Isobe, Masakatu Morii:
Conditional Differential Cryptanalysis for Kreyvium. 421-434
Digital Signatures
- Michael Till Beck, Jan Camenisch, David Derler

, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig
:
Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures. 437-452 - Xiao Zhang, Shengli Liu, Dawu Gu:

Tightly-Secure Signatures from the Decisional Composite Residuosity Assumption. 453-468

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














