


default search action
29th ACISP 2024: Sydney, NSW, Australia - Part II
- Tianqing Zhu

, Yannan Li
:
Information Security and Privacy - 29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15-17, 2024, Proceedings, Part II. Lecture Notes in Computer Science 14896, Springer 2024, ISBN 978-981-97-5027-6
Post-Quantum Cryptography
- Nam Tran, Khoa Nguyen, Dongxi Liu, Josef Pieprzyk, Willy Susilo

:
Improved Multimodal Private Signatures from Lattices. 3-23 - Zhenzhen Bao, Jian Guo, Shun Li

, Phuong Pham:
Automatic Quantum Multi-collision Distinguishers and Rebound Attacks with Triangulation Algorithm. 24-43 - Xiaokang Dai, Jingwei Chen

, Wenyuan Wu
, Yong Feng:
Lattice-Based, More General Anti-leakage Model and Its Application in Decentralization. 44-63 - Zixuan Wu, Rongmao Chen, Yi Wang, Qiong Wang, Wei Peng:

An Efficient Hardware Implementation of Crystal-Dilithium on FPGA. 64-83 - Vincent Hwang:

Pushing the Limit of Vectorized Polynomial Multiplications for NTRU Prime. 84-102 - Li-Jie Jian, Ting-Yuan Wang, Bo-Yin Yang, Ming-Shing Chen:

Jumping for Bernstein-Yang Inversion. 103-123 - Xinyu Zhang

, Ron Steinfeld, Joseph K. Liu, Muhammed F. Esgin, Dongxi Liu, Sushmita Ruj:
DualRing-PRF: Post-quantum (Linkable) Ring Signatures from Legendre and Power Residue PRFs. 124-143 - Arnaud Sipasseuth

:
Faster Verifications and Smaller Signatures: Trade-Offs for ALTEQ Using Rejections. 144-163 - Quan Yuan

, Chao Sun, Tsuyoshi Takagi:
Revisiting the Security of Fiat-Shamir Signature Schemes Under Superposition Attacks. 164-184 - Mengce Zheng

, Wei Yan
:
Improved Lattice-Based Attack on Mersenne Low Hamming Ratio Search Problem. 185-202
Cryptanalysis
- Chen Wang, Jinliang Wang, Muzhou Li

, Meiqin Wang:
New Strategy for Evaluating Differential Clustering Effect of uBlock. 205-224 - Tomer Ashur, Thomas Buschman, Mohammad Mahzoun:

Algebraic Cryptanalysis of the HADES Design Strategy: Application to Poseidon and Poseidon2. 225-244 - Weiwei Cao:

Revisiting Impossible Differential Cryptanalysis and Expanding the Application of MILP in Impossible Differential Attack. 245-265
Secure Protocols
- Tuong Ngoc Nguyen

, Willy Susilo
, Dung Hoang Duong
, Fuchun Guo
, Kazuhide Fukushima
, Shinsaku Kiyomoto
:
A Fault-Tolerant Content Moderation Mechanism for Secure Messaging Systems. 269-289 - Kakeru Watanabe, Kazuki Yoneyama:

Formal Verification of Challenge Flow in EMV 3-D Secure. 290-310 - Kazumasa Shinagawa

:
Size-Hiding Computation in the Honest-But-Curious Model. 311-329 - Saskia Bayreuther, Robin Berger

, Felix Dörre
, Jeremias Mechler, Jörn Müller-Quade:
Hidden $\varDelta $-Fairness: A Novel Notion for Fair Secure Two-Party Computation. 330-349 - Yali Yuan, Yichao Wang, Guang Cheng:

ProfistMAC: A Protocol Finite State Machine Classifier via Graph Representation. 350-369 - Jialiu Cheng

, Yi Wang
, Rongmao Chen
, Xinyi Huang
:
Subverting Cryptographic Protocols from a Fine-Grained Perspective- A Case Study on 2-Party ECDSA. 370-390
Application Security
- Madeline Moran

, Arrianna Szymczak, Anna Hart, Shelia Kennison
, Eric Chan-Tin
:
Deep Dive on Relationship Between Personality and Password Creation. 393-411 - Hangyu Zhao

, Hua Wu, Xuqiong Bian, Songtao Liu, Guang Cheng, Xiaoyan Hu, Zhiyi Tian:
Unveiling the Unseen: Video Recognition Attacks on Social Software. 412-432 - Zhiwei Tang, Xuemeng Zhai, Gaolei Fei, Junyi Gao, Jianwei Ding, Keren Wang, Qiang Li, Guangmin Hu:

An Account Matching Method Based on Hyper Graph. 433-452

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














