


default search action
30th ACISP 2025: Wollongong, NSW, Australia - Part I
- Willy Susilo

, Josef Pieprzyk
:
Information Security and Privacy - 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025, Proceedings, Part I. Lecture Notes in Computer Science 15658, Springer 2025, ISBN 978-981-96-9094-7
Symmetric-Key Cryptography and Cryptanalysis
- Kosuke Sasaki, Rikuto Kurahara, Kosei Sakamoto, Takanori Isobe:

Forgery Attacks on SipHash. 3-22 - Subhadeep Banik, Hailun Yan:

Cryptanalysis of Fruit-F: Exploiting Key-Derivation Weaknesses and Initialization Vulnerabilities. 23-37 - Bingqing Li, Ling Sun:

Exploring Key-Recovery-Friendly Differential Distinguishers for SM4 and Their Performance in Differential Attacks. 38-57 - Weizhe Wang

, Deng Tang, Haoyang Wang:
Inner Product Masked Integral Distinguishers and Integral Sets over Large Finite Fields - Applications to MiMC, CIMINION and Chaghri. 58-77 - Weiqing Deng, Jianing Zhang, Haoyang Wang

:
Improved Differential Meet-in-the-Middle Cryptanalysis on SIMON and Piccolo. 78-97 - Shoma Kawakami, Kazuma Taka, Atsushi Tanaka, Tatsuya Ishikawa

, Takanori Isobe:
Strengthening Key Scheduling of AES-256 with Minimal Software Modifications. 98-115
Public-Key Encryption
- Yao Cheng, Xianhui Lu, Ziyi Li:

Ideal Transformations for Public Key Encryption. 119-139 - Yao Cheng, Xianhui Lu, Ziyi Li, Yongjian Yin:

Indifferentiability Separations in Ideal Public Key Encryption: Explicit vs. Implicit Rejection. 140-160
Digital Signatures and Zero Knowledge
- Yuxi Xue, Tianyu Zheng, Shang Gao, Bin Xiao, Man Ho Au:

Compressed Sigma Protocols: New Model and Aggregation Techniques. 163-183 - Shaolong Tang, Peng Jiang, Liehuang Zhu:

sfGlitter: A Fully Adaptive and Tightly Secure Threshold Signature. 184-204 - Dung Bui

, Kelong Cong
, Cyprien Delpech de Saint Guilhem
:
Faster VOLEitH Signatures from All-But-One Vector Commitment and Half-Tree. 205-223 - Bowen Jiang, Guofeng Tang, Haiyang Xue

:
Three-Round (Robust) Threshold ECDSA from Threshold CL Encryption. 224-244 - Tianyou Tang, Shuqin Fan:

Lattice Attack with EHNP: Key Recovery from Two ECDSA Signatures and Breaking the Information-Theoretic Limit. 245-266
Cryptographic Protocols and Blockchain
- Yang Yang, Bingyu Li, Zhenyang Ding, Qianhong Wu, Bo Qin, Qin Wang:

FlexiADKG: A Flexible Asynchronous Distributed Key Generation Protocol with Constant Round Complexity. 269-288 - Qinyi Li, Lise Millerjord, Colin Boyd:

TEAKEX: TESLA-Authenticated Group Key Exchange. 289-309 - Qishuang Fu, Joseph K. Liu, Shirui Pan, Tsz Hon Yuen:

SoK: A Deep Dive Into Anti-money Laundering Techniques for Blockchain Cryptocurrencies. 310-330 - Jianbin Gao

, Ansu Badjie
, Qi Xia
, Patrick Mukala
, Hu Xia
, Grace Mupoyi Ntuala
:
Advanced Temporal Graph Embedding for Detecting Fraudulent Transactions on Complex Blockchain Transactional Networks. 331-350 - Lei Tian, Chenke Wang, Yu Long, Xian Xu, Mingchao Wan, Chunmiao Li, Shifeng Sun, Dawu Gu:

Walnut: A Generic Framework with Enhanced Scalability for BFT Protocols. 351-371 - Hideaki Miyaji, Noriaki Kamiyama:

PPSCCC: Privacy-Preserving Scalable Cross-Chain Communication Among Multiple Blockchains Based on Parent-Child Blockchain. 372-392

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














