


default search action
25th ACISP 2020: Perth, WA, Australia
- Joseph K. Liu

, Hui Cui:
Information Security and Privacy - 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings. Lecture Notes in Computer Science 12248, Springer 2020, ISBN 978-3-030-55303-6
Post-quantum Cryptography
- Huy Quoc Le

, Dung Hoang Duong, Willy Susilo
, Ha Thanh Nguyen Tran, Viet Cuong Trinh
, Josef Pieprzyk
, Thomas Plantard
:
Lattice Blind Signatures with Forward Security. 3-22 - Yan Huang, Fangguo Zhang

, Zhi Hu, Zhijie Liu:
Optimized Arithmetic Operations for Isogeny-Based Cryptography on Huff Curves. 23-40 - Nabil Alkeilani Alkadri

, Rachid El Bansarkhani, Johannes Buchmann:
On Lattice-Based Interactive Protocols: An Approach with Less or No Aborts. 41-61 - Boru Gong, Leixiao Cheng, Yunlei Zhao:

SKCN: Practical and Flexible Digital Signature from Module Lattice. 62-81 - Gareth T. Davies

, Herman Galteland, Kristian Gjøsteen, Yao Jiang
:
Cloud-Assisted Asynchronous Key Transport with Post-Quantum Security. 82-101
Symmetric Cipher
- Jinyu Lu, Yunwen Liu

, Tomer Ashur
, Bing Sun, Chao Li:
Rotational-XOR Cryptanalysis of Simon-Like Block Ciphers. 105-124 - Abderrahmane Nitaj, Willy Susilo

, Joseph Tonien
:
A New Improved AES S-box with Enhanced Properties. 125-141 - Yuji Koike, Kosei Sakamoto, Takuya Hayashi

, Takanori Isobe:
Galaxy: A Family of Stream-Cipher-Based Space-Hard Ciphers. 142-159 - Wei-Zhu Yeoh

, Je Sen Teh, Jiageng Chen
:
Automated Search for Block Cipher Differentials: A GPU-Accelerated Branch-and-Bound Algorithm. 160-179
Signature
- Sanjit Chatterjee, R. Kabaleeshwaran

:
From Rerandomizability to Sequential Aggregation: Efficient Signature Schemes Based on SXDH Assumption. 183-203 - Junhao Huang

, Zhe Liu, Zhi Hu, Johann Großschädl:
Parallel Implementation of SM2 Elliptic Curve Cryptography on Intel Processors with AVX2. 204-224 - Masayuki Tezuka

, Keisuke Tanaka:
Improved Security Proof for the Camenisch-Lysyanskaya Signature-Based Synchronized Aggregate Signature Scheme. 225-243
Network Security and Blockchain
- Zuchao Ma, Liang Liu, Weizhi Meng

:
DCONST: Detection of Multiple-Mix-Attack Malicious Nodes Using Consensus-Based Trust in IoT Networks. 247-267 - Xiaolei Liu, Teng Hu, Kangyi Ding, Yang Bai, Weina Niu, Jiazhong Lu:

A Black-Box Attack on Neural Networks Based on Swarm Evolutionary Algorithm. 268-284 - Tongchen Wang, Jianwei Liu

, Dawei Li, Qianhong Wu:
A Blockchain-Based Resource Supervision Scheme for Edge Devices Under Cloud-Fog-End Computing Models. 285-305
Cryptographic Primitives
- Jinrong Chen

, Lin Liu, Rongmao Chen, Wei Peng:
SHOSVD: Secure Outsourcing of High-Order Singular Value Decomposition. 309-329 - Rafael Kurek:

Efficient Forward-Secure Threshold Public Key Encryption. 330-349 - Zhijie Xie, Min Zhang, Anqi Yin, Zhenhan Li:

A New Targeted Password Guessing Model. 350-368 - Bo Pang, Long Chen, Xiong Fan, Qiang Tang

:
Multi-input Laconic Function Evaluation. 369-388
Mathematical Foundation
- Yusong Du, Baoying Fan, Baodian Wei:

Arbitrary-Centered Discrete Gaussian Sampling over the Integers. 391-407 - Xiaopeng Zhao, Zhenfu Cao

, Xiaolei Dong, Jun Shao, Licheng Wang, Zhusen Liu:
New Assumptions and Efficient Cryptosystems from the e-th Power Residue Symbol. 408-424 - Chao Sun

, Mehdi Tibouchi, Masayuki Abe:
Revisiting the Hardness of Binary Error LWE. 425-444
Machine Learning Security
- Jialin Wen, Benjamin Zi Hao Zhao, Minhui Xue

, Haifeng Qian:
PALOR: Poisoning Attacks Against Logistic Regression. 447-460 - Bedeuro Kim, Sharif Abuadbba, Hyoungshick Kim:

DeepCapture: Image Spam Detection Using Deep Learning and Data Augmentation. 461-475
Attack
- Linyu Li, Lei Yu, Can Yang, Jie Gou, Jiawei Yin, Xiaorui Gong:

Rolling Attack: An Efficient Way to Reduce Armors of Office Automation Devices. 479-504 - Satoshi Okada, Yuntao Wang

, Tsuyoshi Takagi:
Improving Key Mismatch Attack on NewHope with Fewer Queries. 505-524 - Anubhab Baksi, Vinay B. Y. Kumar

, Banashri Karmakar
, Shivam Bhasin, Dhiman Saha
, Anupam Chattopadhyay:
A Novel Duplication Based Countermeasure to Statistical Ineffective Fault Analysis. 525-542 - Hanbin Jang, Woojoong Ji, Simon S. Woo, Hyoungshick Kim:

Design and Evaluation of Enumeration Attacks on Package Tracking Systems. 543-559
Privacy
- Mengfei Xie, Jianming Fu, Jia He, Chenke Luo

, Guojun Peng:
JTaint: Finding Privacy-Leakage in Chrome Extensions. 563-583 - Aditya Damodaran

, Alfredo Rial
:
Unlinkable Updatable Databases and Oblivious Transfer with Access Control. 584-604 - Yaoan Jin, Atsuko Miyaji

:
Secure and Compact Elliptic Curve LR Scalar Multiplication. 605-618
Short Papers
- Xiaoyu Guo

, Yan Liu, Lian Liu, Guangsheng Zhang, Jing Chen, Yuan Zhao:
User Identity Linkage Across Social Networks via Community Preserving Network Embedding. 621-630 - Zhe Xia, Bo Yang, Yanwei Zhou, Mingwu Zhang, Yi Mu:

Improvement of Attribute-Based Encryption Using Blakley Secret Sharing. 631-641 - Kento Oonishi

, Noboru Kunihiro:
Recovering CRT-RSA Secret Keys from Noisy Square-and-Multiply Sequences in the Sliding Window Method. 642-652 - Bozhi Wang, Qin Wang

, Shiping Chen
, Yang Xiang:
Security Analysis on Tangle-Based Blockchain Through Simulation. 653-663 - Xiangyu Liu, Shengli Liu, Dawu Gu:

Tightly Secure Chameleon Hash Functions in the Multi-user Setting and Their Applications. 664-673

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














