


default search action
30th ACISP 2025: Wollongong, NSW, Australia - Part I
- Willy Susilo
, Josef Pieprzyk
:
Information Security and Privacy - 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025, Proceedings, Part I. Lecture Notes in Computer Science 15658, Springer 2025, ISBN 978-981-96-9094-7
Symmetric-Key Cryptography and Cryptanalysis
- Kosuke Sasaki, Rikuto Kurahara, Kosei Sakamoto, Takanori Isobe:
Forgery Attacks on SipHash. 3-22 - Subhadeep Banik, Hailun Yan:
Cryptanalysis of Fruit-F: Exploiting Key-Derivation Weaknesses and Initialization Vulnerabilities. 23-37 - Bingqing Li, Ling Sun:
Exploring Key-Recovery-Friendly Differential Distinguishers for SM4 and Their Performance in Differential Attacks. 38-57 - Weizhe Wang, Deng Tang, Haoyang Wang:
Inner Product Masked Integral Distinguishers and Integral Sets over Large Finite Fields - Applications to MiMC, CIMINION and Chaghri. 58-77 - Weiqing Deng, Jianing Zhang, Haoyang Wang:
Improved Differential Meet-in-the-Middle Cryptanalysis on SIMON and Piccolo. 78-97 - Shoma Kawakami, Kazuma Taka, Atsushi Tanaka, Tatsuya Ishikawa, Takanori Isobe:
Strengthening Key Scheduling of AES-256 with Minimal Software Modifications. 98-115
Public-Key Encryption
- Yao Cheng, Xianhui Lu, Ziyi Li:
Ideal Transformations for Public Key Encryption. 119-139 - Yao Cheng, Xianhui Lu, Ziyi Li, Yongjian Yin:
Indifferentiability Separations in Ideal Public Key Encryption: Explicit vs. Implicit Rejection. 140-160
Digital Signatures and Zero Knowledge
- Yuxi Xue, Tianyu Zheng, Shang Gao, Bin Xiao, Man Ho Au:
Compressed Sigma Protocols: New Model and Aggregation Techniques. 163-183 - Shaolong Tang, Peng Jiang, Liehuang Zhu:
sfGlitter: A Fully Adaptive and Tightly Secure Threshold Signature. 184-204 - Dung Bui, Kelong Cong, Cyprien Delpech de Saint Guilhem:
Faster VOLEitH Signatures from All-But-One Vector Commitment and Half-Tree. 205-223 - Bowen Jiang, Guofeng Tang, Haiyang Xue:
Three-Round (Robust) Threshold ECDSA from Threshold CL Encryption. 224-244 - Tianyou Tang, Shuqin Fan:
Lattice Attack with EHNP: Key Recovery from Two ECDSA Signatures and Breaking the Information-Theoretic Limit. 245-266
Cryptographic Protocols and Blockchain
- Yang Yang, Bingyu Li, Zhenyang Ding, Qianhong Wu, Bo Qin, Qin Wang:
FlexiADKG: A Flexible Asynchronous Distributed Key Generation Protocol with Constant Round Complexity. 269-288 - Qinyi Li, Lise Millerjord, Colin Boyd:
TEAKEX: TESLA-Authenticated Group Key Exchange. 289-309 - Qishuang Fu, Joseph K. Liu, Shirui Pan, Tsz Hon Yuen:
SoK: A Deep Dive Into Anti-money Laundering Techniques for Blockchain Cryptocurrencies. 310-330 - Jianbin Gao, Badjie Ansu, Qi Xia, Patrick Mukala, Hu Xia, Grace Mupoyi Ntuala:
Advanced Temporal Graph Embedding for Detecting Fraudulent Transactions on Complex Blockchain Transactional Networks. 331-350 - Lei Tian, Chenke Wang, Yu Long, Xian Xu, Mingchao Wan, Chunmiao Li, Shifeng Sun, Dawu Gu:
Walnut: A Generic Framework with Enhanced Scalability for BFT Protocols. 351-371 - Hideaki Miyaji, Noriaki Kamiyama:
PPSCCC: Privacy-Preserving Scalable Cross-Chain Communication Among Multiple Blockchains Based on Parent-Child Blockchain. 372-392

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.