


default search action
23rd ACISP 2018: Wollongong, NSW, Australia
- Willy Susilo, Guomin Yang:

Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings. Lecture Notes in Computer Science 10946, Springer 2018, ISBN 978-3-319-93637-6
Foundation
- Liqiang Peng, Yao Lu, Noboru Kunihiro

, Rui Zhang, Lei Hu:
A Deterministic Algorithm for Computing Divisors in an Interval. 3-12 - Yunhua Wen, Shengli Liu:

Reusable Fuzzy Extractor from LWE. 13-27 - Jung Hee Cheon, Jinhyuck Jeong, Dongwoo Kim

, Jongchan Lee:
A Reusable Fuzzy Extractor with Practical Storage Size: Modifying Canetti et al.'s Construction. 28-44 - Bernardo David, Rafael Dowsley, Mario Larangeira:

21 - Bringing Down the Complexity: Fast Composable Protocols for Card Games Without Secret State. 45-63 - Ryo Kikuchi, Dai Ikarashi, Takahiro Matsuda, Koki Hamada, Koji Chida:

Efficient Bit-Decomposition and Modulus-Conversion Protocols with an Honest Majority. 64-82 - Zhe Xia, Liuying Sun, Bo Yang, Yanwei Zhou, Mingwu Zhang:

Verifiable Secret Sharing Based on Hyperplane Geometry with Its Applications to Optimal Resilient Proactive Cryptosystems. 83-100 - Eunkyung Kim, Hyang-Sook Lee, Jeongeun Park

:
Towards Round-Optimal Secure Multiparty Computations: Multikey FHE Without a CRS. 101-113 - Souradyuti Paul, Ananya Shrivastava

:
Robust Multiparty Computation with Faster Verification Time. 114-131
Symmetric-Key Cryptography
- Howard M. Heys

:
Distributed Time-Memory Tradeoff Attacks on Ciphers - (with Application to Stream Ciphers and Counter Mode). 135-153 - Ryoma Ito

, Atsuko Miyaji
:
New Iterated RC4 Key Correlations. 154-171 - Chen-Dong Ye, Tian Tian:

A New Framework for Finding Nonlinear Superpolies in Cube Attacks Against Trivium-Like Ciphers. 172-187 - Nicolas Marrière, Valérie Nachef, Emmanuel Volte:

Differential Attacks on Reduced Round LILLIPUT. 188-206 - Sumanta Sarkar, Habeeb Syed:

Bounds on Differential and Linear Branch Number of Permutations. 207-224 - Yusuke Naito:

Keyed Sponge with Prefix-Free Padding: Independence Between Capacity and Online Queries Without the Suffix Key. 225-242
Public-Key Cryptography
- Xavier Boyen, Thomas Haines:

Forward-Secure Linkable Ring Signatures. 245-264 - Ziyuan Hu, Shengli Liu, Kefei Chen, Joseph K. Liu:

Revocable Identity-Based Encryption from the Computational Diffie-Hellman Problem. 265-283 - Shimin Li, Bei Liang

, Rui Xue:
Private Functional Signatures: Definition and Construction. 284-303 - Haibin Zheng, Qianhong Wu, Bo Qin, Lin Zhong, Shuangyu He, Jianwei Liu:

Linkable Group Signature for Auditing Anonymous Communication. 304-321 - Lin Zhong, Qianhong Wu, Bo Qin, Haibin Zheng, Jianwei Liu:

Auditable Hierarchy-Private Public-Key Encryption. 322-340 - Hiroaki Anada, Akira Kanaoka, Natsume Matsuzaki, Yohei Watanabe:

Key-Updatable Public-Key Encryption with Keyword Search: Models and Generic Constructions. 341-359 - Xuecheng Ma, Xin Wang, Dongdai Lin:

Anonymous Identity-Based Encryption with Identity Recovery. 360-375 - Chi Liu, Rongmao Chen, Yi Wang, Yongjun Wang:

Asymmetric Subversion Attacks on Signature Schemes. 376-395
Cloud Security
- Yan Xu, Ran Ding, Jie Cui, Hong Zhong:

Intrusion-Resilient Public Auditing Protocol for Data Storage in Cloud Computing. 399-416 - Jian Shen

, Dengzhi Liu, Xiaofeng Chen, Xinyi Huang, Jiageng Chen
, Mingwu Zhang:
Secure Publicly Verifiable Computation with Polynomial Commitment in Cloud Computing. 417-430 - Lin Liu, Jinshu Su, Rongmao Chen, Ximeng Liu, Xiaofeng Wang, Shuhui Chen, Ho-fung Leung:

Privacy-Preserving Mining of Association Rule on Outsourced Cloud Data from Multiple Parties. 431-451
Post-quantum Cryptography
- Haoyu Li, Renzhang Liu, Abderrahmane Nitaj, Yanbin Pan:

Cryptanalysis of the Randomized Version of a Lattice-Based Signature Scheme from PKC'08. 455-466 - Jintai Ding

, Scott R. Fluhrer, Saraswathy RV:
Complete Attack on RLWE Key Exchange with Reused Keys, Without Signal Leakage. 467-486 - Yacheng Wang, Yasuhiko Ikematsu, Dung Hoang Duong

, Tsuyoshi Takagi:
Efficient Decryption Algorithms for Extension Field Cancellation Type Encryption Schemes. 487-501 - Zuoxia Yu, Man Ho Au, Rupeng Yang, Junzuo Lai, Qiuliang Xu:

Lattice-Based Universal Accumulator with Nonmembership Arguments. 502-519 - Daode Zhang, Kai Zhang

, Bao Li, Xianhui Lu, Haiyang Xue
, Jie Li:
Lattice-Based Dual Receiver Encryption and More. 520-538 - Qiqi Lai, Bo Yang, Yong Yu

, Yuan Chen, Liju Dong:
Anonymous Identity-Based Hash Proof System from Lattices in the Standard Model. 539-557 - Wilson Abel Alberto Torres, Ron Steinfeld, Amin Sakzad

, Joseph K. Liu, Veronika Kuchta, Nandita Bhattacharjee, Man Ho Au, Jacob Cheng:
Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0). 558-576
Security Protocol
- Handan Kilinç, Serge Vaudenay:

Secure Contactless Payment. 579-597 - Ahmad Ahmadi, Reihaneh Safavi-Naini, Md. Mamunur Rashid Akand

:
New Attacks and Secure Design for Anonymous Distance-Bounding. 598-616
System and Network Security
- Deqing Zou, Zhijun Deng, Zhen Li, Hai Jin:

Automatically Identifying Security Bug Reports via Multitype Features Analysis. 619-633 - Yali Zeng, Xu Li, Xu Yang, Qikui Xu, Dongcheng Wang:

A Practical Privacy Preserving Protocol in Database-Driven Cognitive Radio Networks. 634-648 - Jie Cui, Jiantao He, Yan Xu, Hong Zhong:

TDDAD: Time-Based Detection and Defense Scheme Against DDoS Attack on SDN Controller. 649-665
Blockchain and Cryptocurrency
- Kexin Hu

, Zhenfeng Zhang:
Fast Lottery-Based Micropayments for Decentralized Currencies. 669-686 - Yuncong Zhang

, Yu Long, Zhen Liu, Zhiqiang Liu, Dawu Gu:
Z-Channel: Scalable and Efficient Scheme in Zerocash. 687-705 - Jiayuan Yin, Changren Wang, Zongyang Zhang, Jianwei Liu:

Revisiting the Incentive Mechanism of Bitcoin-NG. 706-719 - Rupeng Yang, Man Ho Au, Qiuliang Xu, Zuoxia Yu:

Decentralized Blacklistable Anonymous Credentials with Reputation. 720-738
Short Papers
- Yinxia Sun, Futai Zhang, Anmin Fu

:
Revocable Certificateless Encryption with Ciphertext Evolution. 741-749 - Terry Shue Chien Lau

, Chik How Tan:
A New Encryption Scheme Based on Rank Metric Codes. 750-758 - Weizhi Meng

, Yu Wang, Wenjuan Li
, Zhe Liu, Jin Li, Christian W. Probst
:
Enhancing Intelligent Alarm Reduction for Distributed Intrusion Detection Systems via Edge Computing. 759-767 - Mohamad Barbar, Yulei Sui

, Hongyu Zhang
, Shiping Chen
, Jingling Xue
:
Live Path CFI Against Control Flow Hijacking Attacks. 768-779 - Hyung Tae Lee, Huaxiong Wang, Kai Zhang

:
Security Analysis and Modification of ID-Based Encryption with Equality Test from ACISP 2017. 780-786 - Yuntao Wang

, Tsuyoshi Takagi:
Improving the BKZ Reduction Algorithm by Quick Reordering Technique. 787-795 - Yeali S. Sun, Chien-Chun Chen, Shun-Wen Hsiao, Meng Chang Chen:

ANTSdroid: Automatic Malware Family Behaviour Generation and Analysis for Android Apps. 796-804 - Junzuo Lai, Zhengan Huang, Man Ho Au, Xianping Mao:

Constant-Size CCA-Secure Multi-hop Unidirectional Proxy Re-encryption from Indistinguishability Obfuscation. 805-812 - Xingye Lu

, Zhenfei Zhang, Man Ho Au:
Practical Signatures from the Partial Fourier Recovery Problem Revisited: A Provably-Secure and Gaussian-Distributed Construction. 813-820 - Pinaki Sarkar, Mayank Baranwal, Sukumar Nandi

:
CRT-KPS: A Key Predistribution Schemes Using CRT. 821-830

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














