


default search action
28th ACISP 2023: Brisbane, QLD, Australia
- Leonie Simpson

, Mir Ali Rezazadeh Baee
:
Information Security and Privacy - 28th Australasian Conference, ACISP 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings. Lecture Notes in Computer Science 13915, Springer 2023, ISBN 978-3-031-35485-4
Symmetric-Key Cryptography
- Zhuohui Feng, Ye Luo, Chao Wang, Qianqian Yang, Zhiquan Liu, Ling Song:

Improved Differential Cryptanalysis on SPECK Using Plaintext Structures. 3-24 - Zeyu Xu, Shiyao Chen, Meiqin Wang, Puwen Wei:

Linear Cryptanalysis and Its Variants with Fast Fourier Transformation Technique on MPC/FHE/ZK-Friendly 𝔽p-Based Ciphers. 25-52 - Cheng Che, Tian Tian:

A New Correlation Cube Attack Based on Division Property. 53-71 - Xiaofeng Xie, Tian Tian:

The Triangle Differential Cryptanalysis. 72-88 - Matthew Beighton

, Harry Bartlett
, Leonie Simpson
, Kenneth Koon-Ho Wong
:
Key Recovery Attacks on Grain-Like Keystream Generators with Key Injection. 89-108 - Yongxia Mao, Wenling Wu, Yafei Zheng, Lei Zhang:

Related-Cipher Attacks: Applications to Ballet and ANT. 109-123 - Jinliang Wang, Chao Niu, Qun Liu, Muzhou Li

, Bart Preneel, Meiqin Wang:
Cryptanalysis of SPEEDY. 124-156 - Francesco Berti:

Reconsidering Generic Composition: The Modes A10, A11 and A12 are Insecure. 157-176 - Nicky Mouha

:
Exploring Formal Methods for Cryptographic Hash Function Implementations. 177-195
Public-Key Cryptography
- Jia-Chng Loh

, Fuchun Guo
, Willy Susilo
, Guomin Yang:
A Tightly Secure ID-Based Signature Scheme Under DL Assumption in AGM. 199-219 - Ren Ishibashi, Kazuki Yoneyama:

Compact Password Authenticated Key Exchange from Group Actions. 220-247 - Peiying Xu, Li-Ping Wang:

Multi-key Homomorphic Secret Sharing from LWE Without Multi-key HE. 248-269 - Malika Izabachène, Lucas Prabel, Adeline Roux-Langlois:

Identity-Based Encryption from Lattices Using Approximate Trapdoors. 270-290 - Masahito Ishizaka, Kazuhide Fukushima:

Homomorphic Signatures for Subset and Superset Mixed Predicates and Its Applications. 291-319 - Jingjing Fan

, Xingye Lu
, Man Ho Au
:
Adaptively Secure Identity-Based Encryption from Middle-Product Learning with Errors. 320-340
Post-Quantum Cryptography
- Quan Yuan

, Mehdi Tibouchi, Masayuki Abe:
Quantum-Access Security of Hash-Based Signature Schemes. 343-380 - Ernest Foo

, Qinyi Li:
Tightly Secure Lattice Identity-Based Signature in the Quantum Random Oracle Model. 381-402 - Motoki Nakahashi, Rentaro Shiba

, Ravi Anand, Mostafizar Rahman, Kosei Sakamoto, Fukang Liu, Takanori Isobe:
Ghidle: Efficient Large-State Block Ciphers for Post-quantum Security. 403-430 - Huiqin Chen

, Yongqiang Li
, Parhat Abla, Zhiran Li, Lin Jiao, Mingsheng Wang:
Quantum Algorithm for Finding Impossible Differentials and Zero-Correlation Linear Hulls of Symmetric Ciphers. 431-451 - Naoto Kimura, Atsushi Takayasu

, Tsuyoshi Takagi:
Memory-Efficient Quantum Information Set Decoding Algorithm. 452-468
Cryptographic Protocols
- Shahla Atapoor

, Karim Baghery
, Daniele Cozzo
, Robi Pedersen
:
CSI-SharK: CSI-FiSh with Sharing-friendly Keys. 471-502 - Tsz Hon Yuen

, Shimin Pan
, Sheng Huang, Xiaoting Zhang
:
Practical Verifiable Random Function with RKA Security. 503-522 - Sayantan Mukherjee

:
Statistically Consistent Broadcast Authenticated Encryption with Keyword Search - Adaptive Security from Standard Assumptions. 523-552 - Colin Boyd, Bor de Kock, Lise Millerjord:

Modular Design of KEM-Based Authenticated Key Exchange. 553-579 - Akash Madhusudan

, Mahdi Sedaghat
, Samarth Tiwari
, Kelong Cong
, Bart Preneel
:
Reusable, Instant and Private Payment Guarantees for Cryptocurrencies. 580-605
System Security
- Maliha Ismail, Yan Lin, DongGyun Han

, Debin Gao
:
BinAlign: Alignment Padding Based Compiler Provenance Recovery. 609-629 - Zulu Okonkwo, Ernest Foo

, Zhe Hou
, Qinyi Li, Zahra Jadidi:
Encrypted Network Traffic Classification with Higher Order Graph Neural Network. 630-650

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














