Search dblp for Publications

export results for "stream:streams/conf/acisp:"

more than 1000 matches, exporting first 1000 hits only!

 download as .bib file

@inproceedings{DBLP:conf/acisp/AtapoorBCP23,
  author       = {Shahla Atapoor and
                  Karim Baghery and
                  Daniele Cozzo and
                  Robi Pedersen},
  editor       = {Leonie Simpson and
                  Mir Ali Rezazadeh Baee},
  title        = {CSI-SharK: CSI-FiSh with Sharing-friendly Keys},
  booktitle    = {Information Security and Privacy - 28th Australasian Conference, {ACISP}
                  2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13915},
  pages        = {471--502},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-35486-1\_21},
  doi          = {10.1007/978-3-031-35486-1\_21},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/AtapoorBCP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BeightonBSW23,
  author       = {Matthew Beighton and
                  Harry Bartlett and
                  Leonie Simpson and
                  Kenneth Koon{-}Ho Wong},
  editor       = {Leonie Simpson and
                  Mir Ali Rezazadeh Baee},
  title        = {Key Recovery Attacks on Grain-Like Keystream Generators with Key Injection},
  booktitle    = {Information Security and Privacy - 28th Australasian Conference, {ACISP}
                  2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13915},
  pages        = {89--108},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-35486-1\_5},
  doi          = {10.1007/978-3-031-35486-1\_5},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BeightonBSW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Berti23,
  author       = {Francesco Berti},
  editor       = {Leonie Simpson and
                  Mir Ali Rezazadeh Baee},
  title        = {Reconsidering Generic Composition: The Modes A10, {A11} and {A12}
                  are Insecure},
  booktitle    = {Information Security and Privacy - 28th Australasian Conference, {ACISP}
                  2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13915},
  pages        = {157--176},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-35486-1\_8},
  doi          = {10.1007/978-3-031-35486-1\_8},
  timestamp    = {Wed, 21 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Berti23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BoydKM23,
  author       = {Colin Boyd and
                  Bor de Kock and
                  Lise Millerjord},
  editor       = {Leonie Simpson and
                  Mir Ali Rezazadeh Baee},
  title        = {Modular Design of KEM-Based Authenticated Key Exchange},
  booktitle    = {Information Security and Privacy - 28th Australasian Conference, {ACISP}
                  2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13915},
  pages        = {553--579},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-35486-1\_24},
  doi          = {10.1007/978-3-031-35486-1\_24},
  timestamp    = {Wed, 21 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BoydKM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/CheT23,
  author       = {Cheng Che and
                  Tian Tian},
  editor       = {Leonie Simpson and
                  Mir Ali Rezazadeh Baee},
  title        = {A New Correlation Cube Attack Based on Division Property},
  booktitle    = {Information Security and Privacy - 28th Australasian Conference, {ACISP}
                  2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13915},
  pages        = {53--71},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-35486-1\_3},
  doi          = {10.1007/978-3-031-35486-1\_3},
  timestamp    = {Wed, 13 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/CheT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Chen0ALJW23,
  author       = {Huiqin Chen and
                  Yongqiang Li and
                  Parhat Abla and
                  Zhiran Li and
                  Lin Jiao and
                  Mingsheng Wang},
  editor       = {Leonie Simpson and
                  Mir Ali Rezazadeh Baee},
  title        = {Quantum Algorithm for Finding Impossible Differentials and Zero-Correlation
                  Linear Hulls of Symmetric Ciphers},
  booktitle    = {Information Security and Privacy - 28th Australasian Conference, {ACISP}
                  2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13915},
  pages        = {431--451},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-35486-1\_19},
  doi          = {10.1007/978-3-031-35486-1\_19},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Chen0ALJW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/FanLA23,
  author       = {Jingjing Fan and
                  Xingye Lu and
                  Man Ho Au},
  editor       = {Leonie Simpson and
                  Mir Ali Rezazadeh Baee},
  title        = {Adaptively Secure Identity-Based Encryption from Middle-Product Learning
                  with Errors},
  booktitle    = {Information Security and Privacy - 28th Australasian Conference, {ACISP}
                  2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13915},
  pages        = {320--340},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-35486-1\_15},
  doi          = {10.1007/978-3-031-35486-1\_15},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/FanLA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/FengLW0L023,
  author       = {Zhuohui Feng and
                  Ye Luo and
                  Chao Wang and
                  Qianqian Yang and
                  Zhiquan Liu and
                  Ling Song},
  editor       = {Leonie Simpson and
                  Mir Ali Rezazadeh Baee},
  title        = {Improved Differential Cryptanalysis on {SPECK} Using Plaintext Structures},
  booktitle    = {Information Security and Privacy - 28th Australasian Conference, {ACISP}
                  2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13915},
  pages        = {3--24},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-35486-1\_1},
  doi          = {10.1007/978-3-031-35486-1\_1},
  timestamp    = {Wed, 21 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/FengLW0L023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/FooL23,
  author       = {Ernest Foo and
                  Qinyi Li},
  editor       = {Leonie Simpson and
                  Mir Ali Rezazadeh Baee},
  title        = {Tightly Secure Lattice Identity-Based Signature in the Quantum Random
                  Oracle Model},
  booktitle    = {Information Security and Privacy - 28th Australasian Conference, {ACISP}
                  2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13915},
  pages        = {381--402},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-35486-1\_17},
  doi          = {10.1007/978-3-031-35486-1\_17},
  timestamp    = {Wed, 21 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/FooL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/IshibashiY23,
  author       = {Ren Ishibashi and
                  Kazuki Yoneyama},
  editor       = {Leonie Simpson and
                  Mir Ali Rezazadeh Baee},
  title        = {Compact Password Authenticated Key Exchange from Group Actions},
  booktitle    = {Information Security and Privacy - 28th Australasian Conference, {ACISP}
                  2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13915},
  pages        = {220--247},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-35486-1\_11},
  doi          = {10.1007/978-3-031-35486-1\_11},
  timestamp    = {Wed, 21 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/IshibashiY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/IshizakaF23,
  author       = {Masahito Ishizaka and
                  Kazuhide Fukushima},
  editor       = {Leonie Simpson and
                  Mir Ali Rezazadeh Baee},
  title        = {Homomorphic Signatures for Subset and Superset Mixed Predicates and
                  Its Applications},
  booktitle    = {Information Security and Privacy - 28th Australasian Conference, {ACISP}
                  2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13915},
  pages        = {291--319},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-35486-1\_14},
  doi          = {10.1007/978-3-031-35486-1\_14},
  timestamp    = {Wed, 21 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/IshizakaF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Ismail0HG23,
  author       = {Maliha Ismail and
                  Yan Lin and
                  DongGyun Han and
                  Debin Gao},
  editor       = {Leonie Simpson and
                  Mir Ali Rezazadeh Baee},
  title        = {BinAlign: Alignment Padding Based Compiler Provenance Recovery},
  booktitle    = {Information Security and Privacy - 28th Australasian Conference, {ACISP}
                  2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13915},
  pages        = {609--629},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-35486-1\_26},
  doi          = {10.1007/978-3-031-35486-1\_26},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/Ismail0HG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/IzabachenePR23,
  author       = {Malika Izabach{\`{e}}ne and
                  Lucas Prabel and
                  Adeline Roux{-}Langlois},
  editor       = {Leonie Simpson and
                  Mir Ali Rezazadeh Baee},
  title        = {Identity-Based Encryption from Lattices Using Approximate Trapdoors},
  booktitle    = {Information Security and Privacy - 28th Australasian Conference, {ACISP}
                  2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13915},
  pages        = {270--290},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-35486-1\_13},
  doi          = {10.1007/978-3-031-35486-1\_13},
  timestamp    = {Wed, 21 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/IzabachenePR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KimuraTT23,
  author       = {Naoto Kimura and
                  Atsushi Takayasu and
                  Tsuyoshi Takagi},
  editor       = {Leonie Simpson and
                  Mir Ali Rezazadeh Baee},
  title        = {Memory-Efficient Quantum Information Set Decoding Algorithm},
  booktitle    = {Information Security and Privacy - 28th Australasian Conference, {ACISP}
                  2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13915},
  pages        = {452--468},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-35486-1\_20},
  doi          = {10.1007/978-3-031-35486-1\_20},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KimuraTT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LohGSY23,
  author       = {Jia{-}Chng Loh and
                  Fuchun Guo and
                  Willy Susilo and
                  Guomin Yang},
  editor       = {Leonie Simpson and
                  Mir Ali Rezazadeh Baee},
  title        = {A Tightly Secure ID-Based Signature Scheme Under {DL} Assumption in
                  {AGM}},
  booktitle    = {Information Security and Privacy - 28th Australasian Conference, {ACISP}
                  2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13915},
  pages        = {199--219},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-35486-1\_10},
  doi          = {10.1007/978-3-031-35486-1\_10},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LohGSY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MadhusudanSTCP23,
  author       = {Akash Madhusudan and
                  Mahdi Sedaghat and
                  Samarth Tiwari and
                  Kelong Cong and
                  Bart Preneel},
  editor       = {Leonie Simpson and
                  Mir Ali Rezazadeh Baee},
  title        = {Reusable, Instant and Private Payment Guarantees for Cryptocurrencies},
  booktitle    = {Information Security and Privacy - 28th Australasian Conference, {ACISP}
                  2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13915},
  pages        = {580--605},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-35486-1\_25},
  doi          = {10.1007/978-3-031-35486-1\_25},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MadhusudanSTCP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MaoWZ023,
  author       = {Yongxia Mao and
                  Wenling Wu and
                  Yafei Zheng and
                  Lei Zhang},
  editor       = {Leonie Simpson and
                  Mir Ali Rezazadeh Baee},
  title        = {Related-Cipher Attacks: Applications to Ballet and {ANT}},
  booktitle    = {Information Security and Privacy - 28th Australasian Conference, {ACISP}
                  2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13915},
  pages        = {109--123},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-35486-1\_6},
  doi          = {10.1007/978-3-031-35486-1\_6},
  timestamp    = {Wed, 21 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MaoWZ023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Mouha23,
  author       = {Nicky Mouha},
  editor       = {Leonie Simpson and
                  Mir Ali Rezazadeh Baee},
  title        = {Exploring Formal Methods for Cryptographic Hash Function Implementations},
  booktitle    = {Information Security and Privacy - 28th Australasian Conference, {ACISP}
                  2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13915},
  pages        = {177--195},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-35486-1\_9},
  doi          = {10.1007/978-3-031-35486-1\_9},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Mouha23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Mukherjee23,
  author       = {Sayantan Mukherjee},
  editor       = {Leonie Simpson and
                  Mir Ali Rezazadeh Baee},
  title        = {Statistically Consistent Broadcast Authenticated Encryption with Keyword
                  Search - Adaptive Security from Standard Assumptions},
  booktitle    = {Information Security and Privacy - 28th Australasian Conference, {ACISP}
                  2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13915},
  pages        = {523--552},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-35486-1\_23},
  doi          = {10.1007/978-3-031-35486-1\_23},
  timestamp    = {Wed, 21 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Mukherjee23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/NakahashiSARSL023,
  author       = {Motoki Nakahashi and
                  Rentaro Shiba and
                  Ravi Anand and
                  Mostafizar Rahman and
                  Kosei Sakamoto and
                  Fukang Liu and
                  Takanori Isobe},
  editor       = {Leonie Simpson and
                  Mir Ali Rezazadeh Baee},
  title        = {Ghidle: Efficient Large-State Block Ciphers for Post-quantum Security},
  booktitle    = {Information Security and Privacy - 28th Australasian Conference, {ACISP}
                  2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13915},
  pages        = {403--430},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-35486-1\_18},
  doi          = {10.1007/978-3-031-35486-1\_18},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/NakahashiSARSL023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/OkonkwoFHLJ23,
  author       = {Zulu Okonkwo and
                  Ernest Foo and
                  Zhe Hou and
                  Qinyi Li and
                  Zahra Jadidi},
  editor       = {Leonie Simpson and
                  Mir Ali Rezazadeh Baee},
  title        = {Encrypted Network Traffic Classification with Higher Order Graph Neural
                  Network},
  booktitle    = {Information Security and Privacy - 28th Australasian Conference, {ACISP}
                  2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13915},
  pages        = {630--650},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-35486-1\_27},
  doi          = {10.1007/978-3-031-35486-1\_27},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/OkonkwoFHLJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WangNLLPW23,
  author       = {Jinliang Wang and
                  Chao Niu and
                  Qun Liu and
                  Muzhou Li and
                  Bart Preneel and
                  Meiqin Wang},
  editor       = {Leonie Simpson and
                  Mir Ali Rezazadeh Baee},
  title        = {Cryptanalysis of {SPEEDY}},
  booktitle    = {Information Security and Privacy - 28th Australasian Conference, {ACISP}
                  2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13915},
  pages        = {124--156},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-35486-1\_7},
  doi          = {10.1007/978-3-031-35486-1\_7},
  timestamp    = {Thu, 22 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WangNLLPW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/XieT23,
  author       = {Xiaofeng Xie and
                  Tian Tian},
  editor       = {Leonie Simpson and
                  Mir Ali Rezazadeh Baee},
  title        = {The Triangle Differential Cryptanalysis},
  booktitle    = {Information Security and Privacy - 28th Australasian Conference, {ACISP}
                  2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13915},
  pages        = {72--88},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-35486-1\_4},
  doi          = {10.1007/978-3-031-35486-1\_4},
  timestamp    = {Tue, 14 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/XieT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/XuCWW23,
  author       = {Zeyu Xu and
                  Shiyao Chen and
                  Meiqin Wang and
                  Puwen Wei},
  editor       = {Leonie Simpson and
                  Mir Ali Rezazadeh Baee},
  title        = {Linear Cryptanalysis and Its Variants with Fast Fourier Transformation
                  Technique on MPC/FHE/ZK-Friendly {\textdollar}{\textbackslash}mathbb
                  \{F\}{\_}p{\textdollar}-Based Ciphers},
  booktitle    = {Information Security and Privacy - 28th Australasian Conference, {ACISP}
                  2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13915},
  pages        = {25--52},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-35486-1\_2},
  doi          = {10.1007/978-3-031-35486-1\_2},
  timestamp    = {Wed, 21 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/XuCWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/XuW23,
  author       = {Peiying Xu and
                  Li{-}Ping Wang},
  editor       = {Leonie Simpson and
                  Mir Ali Rezazadeh Baee},
  title        = {Multi-key Homomorphic Secret Sharing from {LWE} Without Multi-key
                  {HE}},
  booktitle    = {Information Security and Privacy - 28th Australasian Conference, {ACISP}
                  2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13915},
  pages        = {248--269},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-35486-1\_12},
  doi          = {10.1007/978-3-031-35486-1\_12},
  timestamp    = {Wed, 21 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/XuW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YuanTA23,
  author       = {Quan Yuan and
                  Mehdi Tibouchi and
                  Masayuki Abe},
  editor       = {Leonie Simpson and
                  Mir Ali Rezazadeh Baee},
  title        = {Quantum-Access Security of Hash-Based Signature Schemes},
  booktitle    = {Information Security and Privacy - 28th Australasian Conference, {ACISP}
                  2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13915},
  pages        = {343--380},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-35486-1\_16},
  doi          = {10.1007/978-3-031-35486-1\_16},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YuanTA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YuenPHZ23,
  author       = {Tsz Hon Yuen and
                  Shimin Pan and
                  Sheng Huang and
                  Xiaoting Zhang},
  editor       = {Leonie Simpson and
                  Mir Ali Rezazadeh Baee},
  title        = {Practical Verifiable Random Function with {RKA} Security},
  booktitle    = {Information Security and Privacy - 28th Australasian Conference, {ACISP}
                  2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13915},
  pages        = {503--522},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-35486-1\_22},
  doi          = {10.1007/978-3-031-35486-1\_22},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YuenPHZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2023,
  editor       = {Leonie Simpson and
                  Mir Ali Rezazadeh Baee},
  title        = {Information Security and Privacy - 28th Australasian Conference, {ACISP}
                  2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13915},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-35486-1},
  doi          = {10.1007/978-3-031-35486-1},
  isbn         = {978-3-031-35485-4},
  timestamp    = {Wed, 21 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/2023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AdomnicaiMS22,
  author       = {Alexandre Adomnicai and
                  Kazuhiko Minematsu and
                  Maki Shigeri},
  editor       = {Khoa Nguyen and
                  Guomin Yang and
                  Fuchun Guo and
                  Willy Susilo},
  title        = {Fast Skinny-128 {SIMD} Implementations for Sequential Modes of Operation},
  booktitle    = {Information Security and Privacy - 27th Australasian Conference, {ACISP}
                  2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13494},
  pages        = {125--144},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22301-3\_7},
  doi          = {10.1007/978-3-031-22301-3\_7},
  timestamp    = {Sat, 17 Dec 2022 21:30:21 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/AdomnicaiMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BaiBJVN22,
  author       = {Shi Bai and
                  Austin Beard and
                  Floyd Johnson and
                  Sulani K. B. Vidhanalage and
                  Tran Ngo},
  editor       = {Khoa Nguyen and
                  Guomin Yang and
                  Fuchun Guo and
                  Willy Susilo},
  title        = {Fiat-Shamir Signatures Based on Module-NTRU},
  booktitle    = {Information Security and Privacy - 27th Australasian Conference, {ACISP}
                  2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13494},
  pages        = {289--308},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22301-3\_15},
  doi          = {10.1007/978-3-031-22301-3\_15},
  timestamp    = {Tue, 30 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BaiBJVN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BiLLW22,
  author       = {Lei Bi and
                  Xianhui Lu and
                  Junjie Luo and
                  Kunpeng Wang},
  editor       = {Khoa Nguyen and
                  Guomin Yang and
                  Fuchun Guo and
                  Willy Susilo},
  title        = {Hybrid Dual and Meet-LWE Attack},
  booktitle    = {Information Security and Privacy - 27th Australasian Conference, {ACISP}
                  2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13494},
  pages        = {168--188},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22301-3\_9},
  doi          = {10.1007/978-3-031-22301-3\_9},
  timestamp    = {Thu, 08 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/BiLLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BijweCS22,
  author       = {Subodh Bijwe and
                  Amit Kumar Chauhan and
                  Somitra Kumar Sanadhya},
  editor       = {Khoa Nguyen and
                  Guomin Yang and
                  Fuchun Guo and
                  Willy Susilo},
  title        = {Implementing Grover Oracle for Lightweight Block Ciphers Under Depth
                  Constraints},
  booktitle    = {Information Security and Privacy - 27th Australasian Conference, {ACISP}
                  2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13494},
  pages        = {85--105},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22301-3\_5},
  doi          = {10.1007/978-3-031-22301-3\_5},
  timestamp    = {Thu, 08 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/BijweCS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/CaoPCL22,
  author       = {Jinzheng Cao and
                  Yanbin Pan and
                  Qingfeng Cheng and
                  Xinghua Li},
  editor       = {Khoa Nguyen and
                  Guomin Yang and
                  Fuchun Guo and
                  Willy Susilo},
  title        = {Handle the Traces: Revisiting the Attack on {ECDSA} with {EHNP}},
  booktitle    = {Information Security and Privacy - 27th Australasian Conference, {ACISP}
                  2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13494},
  pages        = {147--167},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22301-3\_8},
  doi          = {10.1007/978-3-031-22301-3\_8},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/CaoPCL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChangGHM22,
  author       = {Donghoon Chang and
                  Surabhi Garg and
                  Munawar Hasan and
                  Sweta Mishra},
  editor       = {Khoa Nguyen and
                  Guomin Yang and
                  Fuchun Guo and
                  Willy Susilo},
  title        = {On Security of Fuzzy Commitment Scheme for Biometric Authentication},
  booktitle    = {Information Security and Privacy - 27th Australasian Conference, {ACISP}
                  2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13494},
  pages        = {399--419},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22301-3\_20},
  doi          = {10.1007/978-3-031-22301-3\_20},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ChangGHM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChenLLG22,
  author       = {Shenwei Chen and
                  Zhen Liu and
                  Yu Long and
                  Dawu Gu},
  editor       = {Khoa Nguyen and
                  Guomin Yang and
                  Fuchun Guo and
                  Willy Susilo},
  title        = {DeChain: {A} Blockchain Framework Enhancing Decentralization via Sharding},
  booktitle    = {Information Security and Privacy - 27th Australasian Conference, {ACISP}
                  2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13494},
  pages        = {469--488},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22301-3\_23},
  doi          = {10.1007/978-3-031-22301-3\_23},
  timestamp    = {Wed, 14 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ChenLLG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DingESS22,
  author       = {Xiaohui Ding and
                  Muhammed F. Esgin and
                  Amin Sakzad and
                  Ron Steinfeld},
  editor       = {Khoa Nguyen and
                  Guomin Yang and
                  Fuchun Guo and
                  Willy Susilo},
  title        = {An Injectivity Analysis of Crystals-Kyber and Implications on Quantum
                  Security},
  booktitle    = {Information Security and Privacy - 27th Australasian Conference, {ACISP}
                  2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13494},
  pages        = {332--351},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22301-3\_17},
  doi          = {10.1007/978-3-031-22301-3\_17},
  timestamp    = {Thu, 08 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/DingESS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GjosteenHMRS22,
  author       = {Kristian Gj{\o}steen and
                  Thomas Haines and
                  Johannes M{\"{u}}ller and
                  Peter B. R{\o}nne and
                  Tjerand Silde},
  editor       = {Khoa Nguyen and
                  Guomin Yang and
                  Fuchun Guo and
                  Willy Susilo},
  title        = {Verifiable Decryption in the Head},
  booktitle    = {Information Security and Privacy - 27th Australasian Conference, {ACISP}
                  2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13494},
  pages        = {355--374},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22301-3\_18},
  doi          = {10.1007/978-3-031-22301-3\_18},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/GjosteenHMRS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GrassiR22,
  author       = {Lorenzo Grassi and
                  Christian Rechberger},
  editor       = {Khoa Nguyen and
                  Guomin Yang and
                  Fuchun Guo and
                  Willy Susilo},
  title        = {Truncated Differential Properties of the Diagonal Set of Inputs for
                  5-Round {AES}},
  booktitle    = {Information Security and Privacy - 27th Australasian Conference, {ACISP}
                  2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13494},
  pages        = {24--45},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22301-3\_2},
  doi          = {10.1007/978-3-031-22301-3\_2},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/GrassiR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GuoF22,
  author       = {Wenshuo Guo and
                  Fangwei Fu},
  editor       = {Khoa Nguyen and
                  Guomin Yang and
                  Fuchun Guo and
                  Willy Susilo},
  title        = {Cryptanalysis and Repair of a Gabidulin Code Based Cryptosystem from
                  {ACISP} 2018},
  booktitle    = {Information Security and Privacy - 27th Australasian Conference, {ACISP}
                  2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13494},
  pages        = {189--205},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22301-3\_10},
  doi          = {10.1007/978-3-031-22301-3\_10},
  timestamp    = {Tue, 23 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/GuoF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GuoSW22,
  author       = {Jian Guo and
                  Ling Song and
                  Haoyang Wang},
  editor       = {Khoa Nguyen and
                  Guomin Yang and
                  Fuchun Guo and
                  Willy Susilo},
  title        = {Key Structures: Improved Related-Key Boomerang Attack Against the
                  Full {AES-256}},
  booktitle    = {Information Security and Privacy - 27th Australasian Conference, {ACISP}
                  2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13494},
  pages        = {3--23},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22301-3\_1},
  doi          = {10.1007/978-3-031-22301-3\_1},
  timestamp    = {Mon, 06 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/GuoSW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiZZ22,
  author       = {Yumei Li and
                  Mingwu Zhang and
                  Futai Zhang},
  editor       = {Khoa Nguyen and
                  Guomin Yang and
                  Fuchun Guo and
                  Willy Susilo},
  title        = {Structure-Preserving Linearly Homomorphic Signature with Designated
                  Combiner for Subspace},
  booktitle    = {Information Security and Privacy - 27th Australasian Conference, {ACISP}
                  2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13494},
  pages        = {229--243},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22301-3\_12},
  doi          = {10.1007/978-3-031-22301-3\_12},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/LiZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LoeMOQ22,
  author       = {Angelique Faye Loe and
                  Liam Medley and
                  Christian O'Connell and
                  Elizabeth A. Quaglia},
  editor       = {Khoa Nguyen and
                  Guomin Yang and
                  Fuchun Guo and
                  Willy Susilo},
  title        = {{TIDE:} {A} Novel Approach to Constructing Timed-Release Encryption},
  booktitle    = {Information Security and Privacy - 27th Australasian Conference, {ACISP}
                  2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13494},
  pages        = {244--264},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22301-3\_13},
  doi          = {10.1007/978-3-031-22301-3\_13},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LoeMOQ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MaedaN22,
  author       = {Yusaku Maeda and
                  Koji Nuida},
  editor       = {Khoa Nguyen and
                  Guomin Yang and
                  Fuchun Guo and
                  Willy Susilo},
  title        = {Chosen Ciphertext Secure Keyed Two-Level Homomorphic Encryption},
  booktitle    = {Information Security and Privacy - 27th Australasian Conference, {ACISP}
                  2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13494},
  pages        = {209--228},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22301-3\_11},
  doi          = {10.1007/978-3-031-22301-3\_11},
  timestamp    = {Thu, 08 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/MaedaN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MaoWWZ22,
  author       = {Yongxia Mao and
                  Wenling Wu and
                  Bolin Wang and
                  Li Zhang},
  editor       = {Khoa Nguyen and
                  Guomin Yang and
                  Fuchun Guo and
                  Willy Susilo},
  title        = {Improved Division Property for Ciphers with Complex Linear Layers},
  booktitle    = {Information Security and Privacy - 27th Australasian Conference, {ACISP}
                  2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13494},
  pages        = {106--124},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22301-3\_6},
  doi          = {10.1007/978-3-031-22301-3\_6},
  timestamp    = {Tue, 18 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MaoWWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MirzaeiSYS22,
  author       = {Arash Mirzaei and
                  Amin Sakzad and
                  Jiangshan Yu and
                  Ron Steinfeld},
  editor       = {Khoa Nguyen and
                  Guomin Yang and
                  Fuchun Guo and
                  Willy Susilo},
  title        = {Garrison: {A} Novel Watchtower Scheme for Bitcoin},
  booktitle    = {Information Security and Privacy - 27th Australasian Conference, {ACISP}
                  2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13494},
  pages        = {489--508},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22301-3\_24},
  doi          = {10.1007/978-3-031-22301-3\_24},
  timestamp    = {Thu, 08 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/MirzaeiSYS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MiyashitaIM22,
  author       = {Shotaro Miyashita and
                  Ryoma Ito and
                  Atsuko Miyaji},
  editor       = {Khoa Nguyen and
                  Guomin Yang and
                  Fuchun Guo and
                  Willy Susilo},
  title        = {PNB-Focused Differential Cryptanalysis of ChaCha Stream Cipher},
  booktitle    = {Information Security and Privacy - 27th Australasian Conference, {ACISP}
                  2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13494},
  pages        = {46--66},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22301-3\_3},
  doi          = {10.1007/978-3-031-22301-3\_3},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/MiyashitaIM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PanCCY22,
  author       = {Shimin Pan and
                  Kwan Yin Chan and
                  Handong Cui and
                  Tsz Hon Yuen},
  editor       = {Khoa Nguyen and
                  Guomin Yang and
                  Fuchun Guo and
                  Willy Susilo},
  title        = {Multi-signatures for {ECDSA} and Its Applications in Blockchain},
  booktitle    = {Information Security and Privacy - 27th Australasian Conference, {ACISP}
                  2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13494},
  pages        = {265--285},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22301-3\_14},
  doi          = {10.1007/978-3-031-22301-3\_14},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PanCCY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PhalakarnSH22,
  author       = {Kittiphon Phalakarn and
                  Vorapong Suppakitpaisarn and
                  M. Anwar Hasan},
  editor       = {Khoa Nguyen and
                  Guomin Yang and
                  Fuchun Guo and
                  Willy Susilo},
  title        = {Speeding-Up Parallel Computation of Large Smooth-Degree Isogeny Using
                  Precedence-Constrained Scheduling},
  booktitle    = {Information Security and Privacy - 27th Australasian Conference, {ACISP}
                  2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13494},
  pages        = {309--331},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22301-3\_16},
  doi          = {10.1007/978-3-031-22301-3\_16},
  timestamp    = {Thu, 08 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/PhalakarnSH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/RaikwarG22,
  author       = {Mayank Raikwar and
                  Danilo Gligoroski},
  editor       = {Khoa Nguyen and
                  Guomin Yang and
                  Fuchun Guo and
                  Willy Susilo},
  title        = {SoK: Decentralized Randomness Beacon Protocols},
  booktitle    = {Information Security and Privacy - 27th Australasian Conference, {ACISP}
                  2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13494},
  pages        = {420--446},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22301-3\_21},
  doi          = {10.1007/978-3-031-22301-3\_21},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/RaikwarG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WuWGZHKCL22,
  author       = {Xiaofei Wu and
                  Hao Wang and
                  Chunpeng Ge and
                  Lu Zhou and
                  Qiong Huang and
                  Lanju Kong and
                  Lizhen Cui and
                  Zhe Liu},
  editor       = {Khoa Nguyen and
                  Guomin Yang and
                  Fuchun Guo and
                  Willy Susilo},
  title        = {{CCOM:} Cost-Efficient and Collusion-Resistant Oracle Mechanism for
                  Smart Contracts},
  booktitle    = {Information Security and Privacy - 27th Australasian Conference, {ACISP}
                  2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13494},
  pages        = {449--468},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22301-3\_22},
  doi          = {10.1007/978-3-031-22301-3\_22},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WuWGZHKCL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhangWXDLWL22,
  author       = {Handong Zhang and
                  Puwen Wei and
                  Haiyang Xue and
                  Yi Deng and
                  Jinsong Li and
                  Wei Wang and
                  Guoxiao Liu},
  editor       = {Khoa Nguyen and
                  Guomin Yang and
                  Fuchun Guo and
                  Willy Susilo},
  title        = {Resumable Zero-Knowledge for Circuits from Symmetric Key Primitives},
  booktitle    = {Information Security and Privacy - 27th Australasian Conference, {ACISP}
                  2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13494},
  pages        = {375--398},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22301-3\_19},
  doi          = {10.1007/978-3-031-22301-3\_19},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhangWXDLWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhangWZ22,
  author       = {Yuhan Zhang and
                  Wenling Wu and
                  Lei Zhang},
  editor       = {Khoa Nguyen and
                  Guomin Yang and
                  Fuchun Guo and
                  Willy Susilo},
  title        = {Improved Differential Attack on Round-Reduced {LEA}},
  booktitle    = {Information Security and Privacy - 27th Australasian Conference, {ACISP}
                  2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13494},
  pages        = {67--84},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22301-3\_4},
  doi          = {10.1007/978-3-031-22301-3\_4},
  timestamp    = {Wed, 15 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhangWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhaoDLLXG22,
  author       = {Chen Zhao and
                  Jianing Ding and
                  Zhenzhen Li and
                  Zhen Li and
                  Gang Xiong and
                  Gaopeng Gou},
  editor       = {Khoa Nguyen and
                  Guomin Yang and
                  Fuchun Guo and
                  Willy Susilo},
  title        = {Shoot Before You Escape: Dynamic Behavior Monitor of Bitcoin Users
                  via Bi-Temporal Network Analytics},
  booktitle    = {Information Security and Privacy - 27th Australasian Conference, {ACISP}
                  2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13494},
  pages        = {509--528},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22301-3\_25},
  doi          = {10.1007/978-3-031-22301-3\_25},
  timestamp    = {Thu, 08 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhaoDLLXG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2022,
  editor       = {Khoa Nguyen and
                  Guomin Yang and
                  Fuchun Guo and
                  Willy Susilo},
  title        = {Information Security and Privacy - 27th Australasian Conference, {ACISP}
                  2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13494},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22301-3},
  doi          = {10.1007/978-3-031-22301-3},
  isbn         = {978-3-031-22300-6},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/2022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AbdolmalekiS21,
  author       = {Behzad Abdolmaleki and
                  Daniel Slamanig},
  editor       = {Joonsang Baek and
                  Sushmita Ruj},
  title        = {Updatable Trapdoor SPHFs: Modular Construction of Updatable Zero-Knowledge
                  Arguments and More},
  booktitle    = {Information Security and Privacy - 26th Australasian Conference, {ACISP}
                  2021, Virtual Event, December 1-3, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13083},
  pages        = {46--67},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90567-5\_3},
  doi          = {10.1007/978-3-030-90567-5\_3},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/AbdolmalekiS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BlazyMNPS21,
  author       = {Olivier Blazy and
                  Sayantan Mukherjee and
                  Huyen Nguyen and
                  Duong Hieu Phan and
                  Damien Stehl{\'{e}}},
  editor       = {Joonsang Baek and
                  Sushmita Ruj},
  title        = {An Anonymous Trace-and-Revoke Broadcast Encryption Scheme},
  booktitle    = {Information Security and Privacy - 26th Australasian Conference, {ACISP}
                  2021, Virtual Event, December 1-3, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13083},
  pages        = {214--233},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90567-5\_11},
  doi          = {10.1007/978-3-030-90567-5\_11},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BlazyMNPS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BoyenFL21,
  author       = {Xavier Boyen and
                  Ernest Foo and
                  Qinyi Li},
  editor       = {Joonsang Baek and
                  Sushmita Ruj},
  title        = {Anonymous Lattice Identity-Based Encryption with Traceable Identities},
  booktitle    = {Information Security and Privacy - 26th Australasian Conference, {ACISP}
                  2021, Virtual Event, December 1-3, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13083},
  pages        = {630--649},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90567-5\_32},
  doi          = {10.1007/978-3-030-90567-5\_32},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BoyenFL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BrunettaTLBM21,
  author       = {Carlo Brunetta and
                  Georgia Tsaloli and
                  Bei Liang and
                  Gustavo Banegas and
                  Aikaterini Mitrokotsa},
  editor       = {Joonsang Baek and
                  Sushmita Ruj},
  title        = {Non-interactive, Secure Verifiable Aggregation for Decentralized,
                  Privacy-Preserving Learning},
  booktitle    = {Information Security and Privacy - 26th Australasian Conference, {ACISP}
                  2021, Virtual Event, December 1-3, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13083},
  pages        = {510--528},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90567-5\_26},
  doi          = {10.1007/978-3-030-90567-5\_26},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BrunettaTLBM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChenDCRLLS21,
  author       = {Jikun Chen and
                  Ruoyu Deng and
                  Hongbin Chen and
                  Na Ruan and
                  Yao Liu and
                  Chao Liu and
                  Chunhua Su},
  editor       = {Joonsang Baek and
                  Sushmita Ruj},
  title        = {{ALRS:} An Adversarial Noise Based Privacy-Preserving Data Sharing
                  Mechanism},
  booktitle    = {Information Security and Privacy - 26th Australasian Conference, {ACISP}
                  2021, Virtual Event, December 1-3, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13083},
  pages        = {490--509},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90567-5\_25},
  doi          = {10.1007/978-3-030-90567-5\_25},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ChenDCRLLS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChenWZXQ21,
  author       = {Liuqiao Chen and
                  Hu Wang and
                  Benjamin Zi Hao Zhao and
                  Minhui Xue and
                  Haifeng Qian},
  editor       = {Joonsang Baek and
                  Sushmita Ruj},
  title        = {Oriole: Thwarting Privacy Against Trustworthy Deep Learning Models},
  booktitle    = {Information Security and Privacy - 26th Australasian Conference, {ACISP}
                  2021, Virtual Event, December 1-3, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13083},
  pages        = {550--568},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90567-5\_28},
  doi          = {10.1007/978-3-030-90567-5\_28},
  timestamp    = {Mon, 08 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ChenWZXQ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/CheonKKLSS21,
  author       = {Jung Hee Cheon and
                  Dongwoo Kim and
                  Duhyeong Kim and
                  Joohee Lee and
                  Junbum Shin and
                  Yongsoo Song},
  editor       = {Joonsang Baek and
                  Sushmita Ruj},
  title        = {Lattice-Based Secure Biometric Authentication for Hamming Distance},
  booktitle    = {Information Security and Privacy - 26th Australasian Conference, {ACISP}
                  2021, Virtual Event, December 1-3, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13083},
  pages        = {653--672},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90567-5\_33},
  doi          = {10.1007/978-3-030-90567-5\_33},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/CheonKKLSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChiuM21,
  author       = {Wei{-}Yang Chiu and
                  Weizhi Meng},
  editor       = {Joonsang Baek and
                  Sushmita Ruj},
  title        = {Mind the Scraps: Attacking Blockchain Based on Selfdestruct},
  booktitle    = {Information Security and Privacy - 26th Australasian Conference, {ACISP}
                  2021, Virtual Event, December 1-3, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13083},
  pages        = {451--469},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90567-5\_23},
  doi          = {10.1007/978-3-030-90567-5\_23},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ChiuM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/CouteauRR21,
  author       = {Geoffroy Couteau and
                  A. W. Roscoe and
                  Peter Y. A. Ryan},
  editor       = {Joonsang Baek and
                  Sushmita Ruj},
  title        = {Partially-Fair Computation from Timed-Release Encryption and Oblivious
                  Transfer},
  booktitle    = {Information Security and Privacy - 26th Australasian Conference, {ACISP}
                  2021, Virtual Event, December 1-3, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13083},
  pages        = {330--349},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90567-5\_17},
  doi          = {10.1007/978-3-030-90567-5\_17},
  timestamp    = {Mon, 08 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/CouteauRR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/CuiY21,
  author       = {Handong Cui and
                  Tsz Hon Yuen},
  editor       = {Joonsang Baek and
                  Sushmita Ruj},
  title        = {A Trustless {GQ} Multi-signature Scheme with Identifiable Abort},
  booktitle    = {Information Security and Privacy - 26th Australasian Conference, {ACISP}
                  2021, Virtual Event, December 1-3, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13083},
  pages        = {673--693},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90567-5\_34},
  doi          = {10.1007/978-3-030-90567-5\_34},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/CuiY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DuttaS21,
  author       = {Sabyasachi Dutta and
                  Reihaneh Safavi{-}Naini},
  editor       = {Joonsang Baek and
                  Sushmita Ruj},
  title        = {Leakage Resilient Cheating Detectable Secret Sharing Schemes},
  booktitle    = {Information Security and Privacy - 26th Australasian Conference, {ACISP}
                  2021, Virtual Event, December 1-3, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13083},
  pages        = {3--23},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90567-5\_1},
  doi          = {10.1007/978-3-030-90567-5\_1},
  timestamp    = {Mon, 08 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/DuttaS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DuttaSDR21,
  author       = {Priyanka Dutta and
                  Willy Susilo and
                  Dung Hoang Duong and
                  Partha Sarathi Roy},
  editor       = {Joonsang Baek and
                  Sushmita Ruj},
  title        = {Puncturable Identity-Based Encryption from Lattices},
  booktitle    = {Information Security and Privacy - 26th Australasian Conference, {ACISP}
                  2021, Virtual Event, December 1-3, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13083},
  pages        = {571--589},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90567-5\_29},
  doi          = {10.1007/978-3-030-90567-5\_29},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/DuttaSDR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ElSheikhY21,
  author       = {Muhammad ElSheikh and
                  Amr M. Youssef},
  editor       = {Joonsang Baek and
                  Sushmita Ruj},
  title        = {On MILP-Based Automatic Search for Bit-Based Division Property for
                  Ciphers with (Large) Linear Layers},
  booktitle    = {Information Security and Privacy - 26th Australasian Conference, {ACISP}
                  2021, Virtual Event, December 1-3, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13083},
  pages        = {111--131},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90567-5\_6},
  doi          = {10.1007/978-3-030-90567-5\_6},
  timestamp    = {Mon, 08 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ElSheikhY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/FanWLLYW21,
  author       = {Yanhong Fan and
                  Weijia Wang and
                  Zhihu Li and
                  Zhenyu Lu and
                  Siu{-}Ming Yiu and
                  Meiqin Wang},
  editor       = {Joonsang Baek and
                  Sushmita Ruj},
  title        = {Forced Independent Optimized Implementation of 4-Bit S-Box},
  booktitle    = {Information Security and Privacy - 26th Australasian Conference, {ACISP}
                  2021, Virtual Event, December 1-3, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13083},
  pages        = {151--170},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90567-5\_8},
  doi          = {10.1007/978-3-030-90567-5\_8},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/FanWLLYW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GalbraithL21,
  author       = {Steven D. Galbraith and
                  Trey Li},
  editor       = {Joonsang Baek and
                  Sushmita Ruj},
  title        = {Small Superset and Big Subset Obfuscation},
  booktitle    = {Information Security and Privacy - 26th Australasian Conference, {ACISP}
                  2021, Virtual Event, December 1-3, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13083},
  pages        = {68--87},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90567-5\_4},
  doi          = {10.1007/978-3-030-90567-5\_4},
  timestamp    = {Mon, 08 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/GalbraithL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HainesM21,
  author       = {Thomas Haines and
                  Johannes M{\"{u}}ller},
  editor       = {Joonsang Baek and
                  Sushmita Ruj},
  title        = {Optimal Randomized Partial Checking for Decryption Mix Nets},
  booktitle    = {Information Security and Privacy - 26th Australasian Conference, {ACISP}
                  2021, Virtual Event, December 1-3, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13083},
  pages        = {277--292},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90567-5\_14},
  doi          = {10.1007/978-3-030-90567-5\_14},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/HainesM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HainesM21a,
  author       = {Thomas Haines and
                  Johannes M{\"{u}}ller},
  editor       = {Joonsang Baek and
                  Sushmita Ruj},
  title        = {A Novel Proof of Shuffle: Exponentially Secure Cut-and-Choose},
  booktitle    = {Information Security and Privacy - 26th Australasian Conference, {ACISP}
                  2021, Virtual Event, December 1-3, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13083},
  pages        = {293--308},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90567-5\_15},
  doi          = {10.1007/978-3-030-90567-5\_15},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/HainesM21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HokiIILS21,
  author       = {Jin Hoki and
                  Takanori Isobe and
                  Ryoma Ito and
                  Fukang Liu and
                  Kosei Sakamoto},
  editor       = {Joonsang Baek and
                  Sushmita Ruj},
  title        = {Distinguishing and Key Recovery Attacks on the Reduced-Round {SNOW-V}},
  booktitle    = {Information Security and Privacy - 26th Australasian Conference, {ACISP}
                  2021, Virtual Event, December 1-3, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13083},
  pages        = {171--190},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90567-5\_9},
  doi          = {10.1007/978-3-030-90567-5\_9},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/HokiIILS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/IsobeI21,
  author       = {Takanori Isobe and
                  Ryoma Ito},
  editor       = {Joonsang Baek and
                  Sushmita Ruj},
  title        = {Security Analysis of End-to-End Encryption for Zoom Meetings},
  booktitle    = {Information Security and Privacy - 26th Australasian Conference, {ACISP}
                  2021, Virtual Event, December 1-3, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13083},
  pages        = {234--253},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90567-5\_12},
  doi          = {10.1007/978-3-030-90567-5\_12},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/IsobeI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiSYPYL21,
  author       = {Yannan Li and
                  Willy Susilo and
                  Guomin Yang and
                  Tran Viet Xuan Phuong and
                  Yong Yu and
                  Dongxi Liu},
  editor       = {Joonsang Baek and
                  Sushmita Ruj},
  title        = {Concise Mercurial Subvector Commitments: Definitions and Constructions},
  booktitle    = {Information Security and Privacy - 26th Australasian Conference, {ACISP}
                  2021, Virtual Event, December 1-3, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13083},
  pages        = {353--371},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90567-5\_18},
  doi          = {10.1007/978-3-030-90567-5\_18},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/LiSYPYL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiW21,
  author       = {Xiaodan Li and
                  Wenling Wu},
  editor       = {Joonsang Baek and
                  Sushmita Ruj},
  title        = {Constructions of Iterative Near-MDS Matrices with the Lowest {XOR}
                  Count},
  booktitle    = {Information Security and Privacy - 26th Australasian Conference, {ACISP}
                  2021, Virtual Event, December 1-3, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13083},
  pages        = {132--150},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90567-5\_7},
  doi          = {10.1007/978-3-030-90567-5\_7},
  timestamp    = {Mon, 08 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/LiW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiuHYSTH21,
  author       = {Xueqiao Liu and
                  Kai He and
                  Guomin Yang and
                  Willy Susilo and
                  Joseph Tonien and
                  Qiong Huang},
  editor       = {Joonsang Baek and
                  Sushmita Ruj},
  title        = {Broadcast Authenticated Encryption with Keyword Search},
  booktitle    = {Information Security and Privacy - 26th Australasian Conference, {ACISP}
                  2021, Virtual Event, December 1-3, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13083},
  pages        = {193--213},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90567-5\_10},
  doi          = {10.1007/978-3-030-90567-5\_10},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LiuHYSTH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiuIMY21,
  author       = {Fukang Liu and
                  Takanori Isobe and
                  Willi Meier and
                  Zhonghao Yang},
  editor       = {Joonsang Baek and
                  Sushmita Ruj},
  title        = {Algebraic Attacks on Round-Reduced Keccak},
  booktitle    = {Information Security and Privacy - 26th Australasian Conference, {ACISP}
                  2021, Virtual Event, December 1-3, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13083},
  pages        = {91--110},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90567-5\_5},
  doi          = {10.1007/978-3-030-90567-5\_5},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/LiuIMY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiuLHXW21,
  author       = {Yizhong Liu and
                  Jianwei Liu and
                  Yiming Hei and
                  Yu Xia and
                  Qianhong Wu},
  editor       = {Joonsang Baek and
                  Sushmita Ruj},
  title        = {A Secure Cross-Shard View-Change Protocol for Sharding Blockchains},
  booktitle    = {Information Security and Privacy - 26th Australasian Conference, {ACISP}
                  2021, Virtual Event, December 1-3, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13083},
  pages        = {372--390},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90567-5\_19},
  doi          = {10.1007/978-3-030-90567-5\_19},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/LiuLHXW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiuWZ21,
  author       = {Chao Liu and
                  Anyu Wang and
                  Zhongxiang Zheng},
  editor       = {Joonsang Baek and
                  Sushmita Ruj},
  title        = {Optimizing Bootstrapping and Evaluating Large {FHE} Gates in the LWE-Based
                  {GSW-FHE}},
  booktitle    = {Information Security and Privacy - 26th Australasian Conference, {ACISP}
                  2021, Virtual Event, December 1-3, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13083},
  pages        = {590--609},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90567-5\_30},
  doi          = {10.1007/978-3-030-90567-5\_30},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/LiuWZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PalD21,
  author       = {Tapas Pal and
                  Ratna Dutta},
  editor       = {Joonsang Baek and
                  Sushmita Ruj},
  title        = {Chosen Ciphertext Secure Functional Encryption from Constrained Witness
                  {PRF}},
  booktitle    = {Information Security and Privacy - 26th Australasian Conference, {ACISP}
                  2021, Virtual Event, December 1-3, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13083},
  pages        = {24--45},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90567-5\_2},
  doi          = {10.1007/978-3-030-90567-5\_2},
  timestamp    = {Mon, 08 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/PalD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PalD21a,
  author       = {Tapas Pal and
                  Ratna Dutta},
  editor       = {Joonsang Baek and
                  Sushmita Ruj},
  title        = {{CCA} Secure Attribute-Hiding Inner Product Encryption from Minimal
                  Assumption},
  booktitle    = {Information Security and Privacy - 26th Australasian Conference, {ACISP}
                  2021, Virtual Event, December 1-3, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13083},
  pages        = {254--274},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90567-5\_13},
  doi          = {10.1007/978-3-030-90567-5\_13},
  timestamp    = {Mon, 08 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/PalD21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PanCZS21,
  author       = {Jing Pan and
                  Xiaofeng Chen and
                  Fangguo Zhang and
                  Willy Susilo},
  editor       = {Joonsang Baek and
                  Sushmita Ruj},
  title        = {Forward-Secure Group Encryptions from Lattices},
  booktitle    = {Information Security and Privacy - 26th Australasian Conference, {ACISP}
                  2021, Virtual Event, December 1-3, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13083},
  pages        = {610--629},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90567-5\_31},
  doi          = {10.1007/978-3-030-90567-5\_31},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/PanCZS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/QiWWHCXZ21,
  author       = {Minfeng Qi and
                  Ziyuan Wang and
                  Fan Wu and
                  Rob Hanson and
                  Shiping Chen and
                  Yang Xiang and
                  Liming Zhu},
  editor       = {Joonsang Baek and
                  Sushmita Ruj},
  title        = {A Blockchain-Enabled Federated Learning Model for Privacy Preservation:
                  System Design},
  booktitle    = {Information Security and Privacy - 26th Australasian Conference, {ACISP}
                  2021, Virtual Event, December 1-3, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13083},
  pages        = {473--489},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90567-5\_24},
  doi          = {10.1007/978-3-030-90567-5\_24},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/QiWWHCXZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TaKNLDSFK21,
  author       = {Anh The Ta and
                  Thanh Xuan Khuc and
                  Tuong Ngoc Nguyen and
                  Huy Quoc Le and
                  Dung Hoang Duong and
                  Willy Susilo and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto},
  editor       = {Joonsang Baek and
                  Sushmita Ruj},
  title        = {Efficient Unique Ring Signature for Blockchain Privacy Protection},
  booktitle    = {Information Security and Privacy - 26th Australasian Conference, {ACISP}
                  2021, Virtual Event, December 1-3, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13083},
  pages        = {391--407},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90567-5\_20},
  doi          = {10.1007/978-3-030-90567-5\_20},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/TaKNLDSFK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TsuchidaN21,
  author       = {Hikaru Tsuchida and
                  Takashi Nishide},
  editor       = {Joonsang Baek and
                  Sushmita Ruj},
  title        = {Private Decision Tree Evaluation with Constant Rounds via (Only) Fair
                  {SS-4PC}},
  booktitle    = {Information Security and Privacy - 26th Australasian Conference, {ACISP}
                  2021, Virtual Event, December 1-3, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13083},
  pages        = {309--329},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90567-5\_16},
  doi          = {10.1007/978-3-030-90567-5\_16},
  timestamp    = {Mon, 08 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/TsuchidaN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WijayaLSL21,
  author       = {Dimaz Ankaa Wijaya and
                  Joseph K. Liu and
                  Ron Steinfeld and
                  Dongxi Liu},
  editor       = {Joonsang Baek and
                  Sushmita Ruj},
  title        = {Transparency or Anonymity Leak: Monero Mining Pools Data Publication},
  booktitle    = {Information Security and Privacy - 26th Australasian Conference, {ACISP}
                  2021, Virtual Event, December 1-3, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13083},
  pages        = {433--450},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90567-5\_22},
  doi          = {10.1007/978-3-030-90567-5\_22},
  timestamp    = {Mon, 08 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/WijayaLSL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YehiaAG21,
  author       = {Mahmoud Yehia and
                  Riham AlTawy and
                  T. Aaron Gulliver},
  editor       = {Joonsang Baek and
                  Sushmita Ruj},
  title        = {Verifiable Obtained Random Subsets for Improving SPHINCS\({}^{\mbox{+}}\)},
  booktitle    = {Information Security and Privacy - 26th Australasian Conference, {ACISP}
                  2021, Virtual Event, December 1-3, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13083},
  pages        = {694--714},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90567-5\_35},
  doi          = {10.1007/978-3-030-90567-5\_35},
  timestamp    = {Mon, 08 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/YehiaAG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhangLWL21,
  author       = {Zongyang Zhang and
                  Tong Li and
                  Zhuo Wang and
                  Jianwei Liu},
  editor       = {Joonsang Baek and
                  Sushmita Ruj},
  title        = {Redactable Transactions in Consortium Blockchain: Controlled by Multi-authority
                  {CP-ABE}},
  booktitle    = {Information Security and Privacy - 26th Australasian Conference, {ACISP}
                  2021, Virtual Event, December 1-3, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13083},
  pages        = {408--429},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90567-5\_21},
  doi          = {10.1007/978-3-030-90567-5\_21},
  timestamp    = {Mon, 08 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhangLWL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZongCS21,
  author       = {Wei Zong and
                  Yang{-}Wai Chow and
                  Willy Susilo},
  editor       = {Joonsang Baek and
                  Sushmita Ruj},
  title        = {Towards Visualizing and Detecting Audio Adversarial Examples for Automatic
                  Speech Recognition},
  booktitle    = {Information Security and Privacy - 26th Australasian Conference, {ACISP}
                  2021, Virtual Event, December 1-3, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13083},
  pages        = {531--549},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90567-5\_27},
  doi          = {10.1007/978-3-030-90567-5\_27},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ZongCS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2021,
  editor       = {Joonsang Baek and
                  Sushmita Ruj},
  title        = {Information Security and Privacy - 26th Australasian Conference, {ACISP}
                  2021, Virtual Event, December 1-3, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13083},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-90567-5},
  doi          = {10.1007/978-3-030-90567-5},
  isbn         = {978-3-030-90566-8},
  timestamp    = {Mon, 08 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/2021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AlkadriB020,
  author       = {Nabil Alkeilani Alkadri and
                  Rachid El Bansarkhani and
                  Johannes Buchmann},
  editor       = {Joseph K. Liu and
                  Hui Cui},
  title        = {On Lattice-Based Interactive Protocols: An Approach with Less or No
                  Aborts},
  booktitle    = {Information Security and Privacy - 25th Australasian Conference, {ACISP}
                  2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12248},
  pages        = {41--61},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-55304-3\_3},
  doi          = {10.1007/978-3-030-55304-3\_3},
  timestamp    = {Wed, 17 Aug 2022 14:32:12 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/AlkadriB020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BaksiKKBSC20,
  author       = {Anubhab Baksi and
                  Vinay B. Y. Kumar and
                  Banashri Karmakar and
                  Shivam Bhasin and
                  Dhiman Saha and
                  Anupam Chattopadhyay},
  editor       = {Joseph K. Liu and
                  Hui Cui},
  title        = {A Novel Duplication Based Countermeasure to Statistical Ineffective
                  Fault Analysis},
  booktitle    = {Information Security and Privacy - 25th Australasian Conference, {ACISP}
                  2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12248},
  pages        = {525--542},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-55304-3\_27},
  doi          = {10.1007/978-3-030-55304-3\_27},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/BaksiKKBSC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChatterjeeK20,
  author       = {Sanjit Chatterjee and
                  R. Kabaleeshwaran},
  editor       = {Joseph K. Liu and
                  Hui Cui},
  title        = {From Rerandomizability to Sequential Aggregation: Efficient Signature
                  Schemes Based on {SXDH} Assumption},
  booktitle    = {Information Security and Privacy - 25th Australasian Conference, {ACISP}
                  2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12248},
  pages        = {183--203},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-55304-3\_10},
  doi          = {10.1007/978-3-030-55304-3\_10},
  timestamp    = {Mon, 10 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ChatterjeeK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChenLCP20,
  author       = {Jinrong Chen and
                  Lin Liu and
                  Rongmao Chen and
                  Wei Peng},
  editor       = {Joseph K. Liu and
                  Hui Cui},
  title        = {{SHOSVD:} Secure Outsourcing of High-Order Singular Value Decomposition},
  booktitle    = {Information Security and Privacy - 25th Australasian Conference, {ACISP}
                  2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12248},
  pages        = {309--329},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-55304-3\_16},
  doi          = {10.1007/978-3-030-55304-3\_16},
  timestamp    = {Sun, 21 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ChenLCP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DamodaranR20,
  author       = {Aditya Damodaran and
                  Alfredo Rial},
  editor       = {Joseph K. Liu and
                  Hui Cui},
  title        = {Unlinkable Updatable Databases and Oblivious Transfer with Access
                  Control},
  booktitle    = {Information Security and Privacy - 25th Australasian Conference, {ACISP}
                  2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12248},
  pages        = {584--604},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-55304-3\_30},
  doi          = {10.1007/978-3-030-55304-3\_30},
  timestamp    = {Wed, 26 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/DamodaranR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DaviesGGJ20,
  author       = {Gareth T. Davies and
                  Herman Galteland and
                  Kristian Gj{\o}steen and
                  Yao Jiang},
  editor       = {Joseph K. Liu and
                  Hui Cui},
  title        = {Cloud-Assisted Asynchronous Key Transport with Post-Quantum Security},
  booktitle    = {Information Security and Privacy - 25th Australasian Conference, {ACISP}
                  2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12248},
  pages        = {82--101},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-55304-3\_5},
  doi          = {10.1007/978-3-030-55304-3\_5},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/DaviesGGJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DuFW20,
  author       = {Yusong Du and
                  Baoying Fan and
                  Baodian Wei},
  editor       = {Joseph K. Liu and
                  Hui Cui},
  title        = {Arbitrary-Centered Discrete Gaussian Sampling over the Integers},
  booktitle    = {Information Security and Privacy - 25th Australasian Conference, {ACISP}
                  2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12248},
  pages        = {391--407},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-55304-3\_20},
  doi          = {10.1007/978-3-030-55304-3\_20},
  timestamp    = {Mon, 10 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/DuFW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GongCZ20,
  author       = {Boru Gong and
                  Leixiao Cheng and
                  Yunlei Zhao},
  editor       = {Joseph K. Liu and
                  Hui Cui},
  title        = {{SKCN:} Practical and Flexible Digital Signature from Module Lattice},
  booktitle    = {Information Security and Privacy - 25th Australasian Conference, {ACISP}
                  2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12248},
  pages        = {62--81},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-55304-3\_4},
  doi          = {10.1007/978-3-030-55304-3\_4},
  timestamp    = {Mon, 10 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/GongCZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GuoLLZCZ20,
  author       = {Xiaoyu Guo and
                  Yan Liu and
                  Lian Liu and
                  Guangsheng Zhang and
                  Jing Chen and
                  Yuan Zhao},
  editor       = {Joseph K. Liu and
                  Hui Cui},
  title        = {User Identity Linkage Across Social Networks via Community Preserving
                  Network Embedding},
  booktitle    = {Information Security and Privacy - 25th Australasian Conference, {ACISP}
                  2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12248},
  pages        = {621--630},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-55304-3\_32},
  doi          = {10.1007/978-3-030-55304-3\_32},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/GuoLLZCZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Huang0HG20,
  author       = {Junhao Huang and
                  Zhe Liu and
                  Zhi Hu and
                  Johann Gro{\ss}sch{\"{a}}dl},
  editor       = {Joseph K. Liu and
                  Hui Cui},
  title        = {Parallel Implementation of {SM2} Elliptic Curve Cryptography on Intel
                  Processors with {AVX2}},
  booktitle    = {Information Security and Privacy - 25th Australasian Conference, {ACISP}
                  2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12248},
  pages        = {204--224},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-55304-3\_11},
  doi          = {10.1007/978-3-030-55304-3\_11},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Huang0HG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HuangZHL20,
  author       = {Yan Huang and
                  Fangguo Zhang and
                  Zhi Hu and
                  Zhijie Liu},
  editor       = {Joseph K. Liu and
                  Hui Cui},
  title        = {Optimized Arithmetic Operations for Isogeny-Based Cryptography on
                  Huff Curves},
  booktitle    = {Information Security and Privacy - 25th Australasian Conference, {ACISP}
                  2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12248},
  pages        = {23--40},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-55304-3\_2},
  doi          = {10.1007/978-3-030-55304-3\_2},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/HuangZHL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/JangJWK20,
  author       = {Hanbin Jang and
                  Woojoong Ji and
                  Simon S. Woo and
                  Hyoungshick Kim},
  editor       = {Joseph K. Liu and
                  Hui Cui},
  title        = {Design and Evaluation of Enumeration Attacks on Package Tracking Systems},
  booktitle    = {Information Security and Privacy - 25th Australasian Conference, {ACISP}
                  2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12248},
  pages        = {543--559},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-55304-3\_28},
  doi          = {10.1007/978-3-030-55304-3\_28},
  timestamp    = {Mon, 10 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/JangJWK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/JinM20,
  author       = {Yaoan Jin and
                  Atsuko Miyaji},
  editor       = {Joseph K. Liu and
                  Hui Cui},
  title        = {Secure and Compact Elliptic Curve {LR} Scalar Multiplication},
  booktitle    = {Information Security and Privacy - 25th Australasian Conference, {ACISP}
                  2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12248},
  pages        = {605--618},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-55304-3\_31},
  doi          = {10.1007/978-3-030-55304-3\_31},
  timestamp    = {Mon, 10 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/JinM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KimAK20,
  author       = {Bedeuro Kim and
                  Sharif Abuadbba and
                  Hyoungshick Kim},
  editor       = {Joseph K. Liu and
                  Hui Cui},
  title        = {DeepCapture: Image Spam Detection Using Deep Learning and Data Augmentation},
  booktitle    = {Information Security and Privacy - 25th Australasian Conference, {ACISP}
                  2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12248},
  pages        = {461--475},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-55304-3\_24},
  doi          = {10.1007/978-3-030-55304-3\_24},
  timestamp    = {Mon, 10 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KimAK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KoikeSH020,
  author       = {Yuji Koike and
                  Kosei Sakamoto and
                  Takuya Hayashi and
                  Takanori Isobe},
  editor       = {Joseph K. Liu and
                  Hui Cui},
  title        = {Galaxy: {A} Family of Stream-Cipher-Based Space-Hard Ciphers},
  booktitle    = {Information Security and Privacy - 25th Australasian Conference, {ACISP}
                  2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12248},
  pages        = {142--159},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-55304-3\_8},
  doi          = {10.1007/978-3-030-55304-3\_8},
  timestamp    = {Thu, 15 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KoikeSH020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Kurek20,
  author       = {Rafael Kurek},
  editor       = {Joseph K. Liu and
                  Hui Cui},
  title        = {Efficient Forward-Secure Threshold Public Key Encryption},
  booktitle    = {Information Security and Privacy - 25th Australasian Conference, {ACISP}
                  2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12248},
  pages        = {330--349},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-55304-3\_17},
  doi          = {10.1007/978-3-030-55304-3\_17},
  timestamp    = {Mon, 10 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Kurek20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LeDSTTPP20,
  author       = {Huy Quoc Le and
                  Dung Hoang Duong and
                  Willy Susilo and
                  Ha Thanh Nguyen Tran and
                  Viet Cuong Trinh and
                  Josef Pieprzyk and
                  Thomas Plantard},
  editor       = {Joseph K. Liu and
                  Hui Cui},
  title        = {Lattice Blind Signatures with Forward Security},
  booktitle    = {Information Security and Privacy - 25th Australasian Conference, {ACISP}
                  2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12248},
  pages        = {3--22},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-55304-3\_1},
  doi          = {10.1007/978-3-030-55304-3\_1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LeDSTTPP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiYYGYG20,
  author       = {Linyu Li and
                  Lei Yu and
                  Can Yang and
                  Jie Gou and
                  Jiawei Yin and
                  Xiaorui Gong},
  editor       = {Joseph K. Liu and
                  Hui Cui},
  title        = {Rolling Attack: An Efficient Way to Reduce Armors of Office Automation
                  Devices},
  booktitle    = {Information Security and Privacy - 25th Australasian Conference, {ACISP}
                  2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12248},
  pages        = {479--504},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-55304-3\_25},
  doi          = {10.1007/978-3-030-55304-3\_25},
  timestamp    = {Mon, 10 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LiYYGYG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiuHDBNL20,
  author       = {Xiaolei Liu and
                  Teng Hu and
                  Kangyi Ding and
                  Yang Bai and
                  Weina Niu and
                  Jiazhong Lu},
  editor       = {Joseph K. Liu and
                  Hui Cui},
  title        = {A Black-Box Attack on Neural Networks Based on Swarm Evolutionary
                  Algorithm},
  booktitle    = {Information Security and Privacy - 25th Australasian Conference, {ACISP}
                  2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12248},
  pages        = {268--284},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-55304-3\_14},
  doi          = {10.1007/978-3-030-55304-3\_14},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/LiuHDBNL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiuLG20,
  author       = {Xiangyu Liu and
                  Shengli Liu and
                  Dawu Gu},
  editor       = {Joseph K. Liu and
                  Hui Cui},
  title        = {Tightly Secure Chameleon Hash Functions in the Multi-user Setting
                  and Their Applications},
  booktitle    = {Information Security and Privacy - 25th Australasian Conference, {ACISP}
                  2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12248},
  pages        = {664--673},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-55304-3\_36},
  doi          = {10.1007/978-3-030-55304-3\_36},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LiuLG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LuLASL20,
  author       = {Jinyu Lu and
                  Yunwen Liu and
                  Tomer Ashur and
                  Bing Sun and
                  Chao Li},
  editor       = {Joseph K. Liu and
                  Hui Cui},
  title        = {Rotational-XOR Cryptanalysis of Simon-Like Block Ciphers},
  booktitle    = {Information Security and Privacy - 25th Australasian Conference, {ACISP}
                  2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12248},
  pages        = {105--124},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-55304-3\_6},
  doi          = {10.1007/978-3-030-55304-3\_6},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LuLASL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Ma0M20,
  author       = {Zuchao Ma and
                  Liang Liu and
                  Weizhi Meng},
  editor       = {Joseph K. Liu and
                  Hui Cui},
  title        = {{DCONST:} Detection of Multiple-Mix-Attack Malicious Nodes Using Consensus-Based
                  Trust in IoT Networks},
  booktitle    = {Information Security and Privacy - 25th Australasian Conference, {ACISP}
                  2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12248},
  pages        = {247--267},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-55304-3\_13},
  doi          = {10.1007/978-3-030-55304-3\_13},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Ma0M20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/NitajST20,
  author       = {Abderrahmane Nitaj and
                  Willy Susilo and
                  Joseph Tonien},
  editor       = {Joseph K. Liu and
                  Hui Cui},
  title        = {A New Improved {AES} S-box with Enhanced Properties},
  booktitle    = {Information Security and Privacy - 25th Australasian Conference, {ACISP}
                  2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12248},
  pages        = {125--141},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-55304-3\_7},
  doi          = {10.1007/978-3-030-55304-3\_7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/NitajST20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Okada0T20,
  author       = {Satoshi Okada and
                  Yuntao Wang and
                  Tsuyoshi Takagi},
  editor       = {Joseph K. Liu and
                  Hui Cui},
  title        = {Improving Key Mismatch Attack on NewHope with Fewer Queries},
  booktitle    = {Information Security and Privacy - 25th Australasian Conference, {ACISP}
                  2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12248},
  pages        = {505--524},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-55304-3\_26},
  doi          = {10.1007/978-3-030-55304-3\_26},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Okada0T20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/OonishiK20,
  author       = {Kento Oonishi and
                  Noboru Kunihiro},
  editor       = {Joseph K. Liu and
                  Hui Cui},
  title        = {Recovering {CRT-RSA} Secret Keys from Noisy Square-and-Multiply Sequences
                  in the Sliding Window Method},
  booktitle    = {Information Security and Privacy - 25th Australasian Conference, {ACISP}
                  2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12248},
  pages        = {642--652},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-55304-3\_34},
  doi          = {10.1007/978-3-030-55304-3\_34},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/OonishiK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PangCFT20,
  author       = {Bo Pang and
                  Long Chen and
                  Xiong Fan and
                  Qiang Tang},
  editor       = {Joseph K. Liu and
                  Hui Cui},
  title        = {Multi-input Laconic Function Evaluation},
  booktitle    = {Information Security and Privacy - 25th Australasian Conference, {ACISP}
                  2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12248},
  pages        = {369--388},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-55304-3\_19},
  doi          = {10.1007/978-3-030-55304-3\_19},
  timestamp    = {Tue, 19 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/PangCFT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SunTA20,
  author       = {Chao Sun and
                  Mehdi Tibouchi and
                  Masayuki Abe},
  editor       = {Joseph K. Liu and
                  Hui Cui},
  title        = {Revisiting the Hardness of Binary Error {LWE}},
  booktitle    = {Information Security and Privacy - 25th Australasian Conference, {ACISP}
                  2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12248},
  pages        = {425--444},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-55304-3\_22},
  doi          = {10.1007/978-3-030-55304-3\_22},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SunTA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TezukaT20,
  author       = {Masayuki Tezuka and
                  Keisuke Tanaka},
  editor       = {Joseph K. Liu and
                  Hui Cui},
  title        = {Improved Security Proof for the Camenisch-Lysyanskaya Signature-Based
                  Synchronized Aggregate Signature Scheme},
  booktitle    = {Information Security and Privacy - 25th Australasian Conference, {ACISP}
                  2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12248},
  pages        = {225--243},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-55304-3\_12},
  doi          = {10.1007/978-3-030-55304-3\_12},
  timestamp    = {Mon, 10 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/TezukaT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WangLLW20,
  author       = {Tongchen Wang and
                  Jianwei Liu and
                  Dawei Li and
                  Qianhong Wu},
  editor       = {Joseph K. Liu and
                  Hui Cui},
  title        = {A Blockchain-Based Resource Supervision Scheme for Edge Devices Under
                  Cloud-Fog-End Computing Models},
  booktitle    = {Information Security and Privacy - 25th Australasian Conference, {ACISP}
                  2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12248},
  pages        = {285--305},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-55304-3\_15},
  doi          = {10.1007/978-3-030-55304-3\_15},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/WangLLW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WangW0X20,
  author       = {Bozhi Wang and
                  Qin Wang and
                  Shiping Chen and
                  Yang Xiang},
  editor       = {Joseph K. Liu and
                  Hui Cui},
  title        = {Security Analysis on Tangle-Based Blockchain Through Simulation},
  booktitle    = {Information Security and Privacy - 25th Australasian Conference, {ACISP}
                  2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12248},
  pages        = {653--663},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-55304-3\_35},
  doi          = {10.1007/978-3-030-55304-3\_35},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WangW0X20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WenZXQ20,
  author       = {Jialin Wen and
                  Benjamin Zi Hao Zhao and
                  Minhui Xue and
                  Haifeng Qian},
  editor       = {Joseph K. Liu and
                  Hui Cui},
  title        = {{PALOR:} Poisoning Attacks Against Logistic Regression},
  booktitle    = {Information Security and Privacy - 25th Australasian Conference, {ACISP}
                  2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12248},
  pages        = {447--460},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-55304-3\_23},
  doi          = {10.1007/978-3-030-55304-3\_23},
  timestamp    = {Mon, 10 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WenZXQ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/XiaYZZ020,
  author       = {Zhe Xia and
                  Bo Yang and
                  Yanwei Zhou and
                  Mingwu Zhang and
                  Yi Mu},
  editor       = {Joseph K. Liu and
                  Hui Cui},
  title        = {Improvement of Attribute-Based Encryption Using Blakley Secret Sharing},
  booktitle    = {Information Security and Privacy - 25th Australasian Conference, {ACISP}
                  2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12248},
  pages        = {631--641},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-55304-3\_33},
  doi          = {10.1007/978-3-030-55304-3\_33},
  timestamp    = {Tue, 16 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/XiaYZZ020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/XieFHLP20,
  author       = {Mengfei Xie and
                  Jianming Fu and
                  Jia He and
                  Chenke Luo and
                  Guojun Peng},
  editor       = {Joseph K. Liu and
                  Hui Cui},
  title        = {JTaint: Finding Privacy-Leakage in Chrome Extensions},
  booktitle    = {Information Security and Privacy - 25th Australasian Conference, {ACISP}
                  2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12248},
  pages        = {563--583},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-55304-3\_29},
  doi          = {10.1007/978-3-030-55304-3\_29},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/XieFHLP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/XieZYL20,
  author       = {Zhijie Xie and
                  Min Zhang and
                  Anqi Yin and
                  Zhenhan Li},
  editor       = {Joseph K. Liu and
                  Hui Cui},
  title        = {A New Targeted Password Guessing Model},
  booktitle    = {Information Security and Privacy - 25th Australasian Conference, {ACISP}
                  2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12248},
  pages        = {350--368},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-55304-3\_18},
  doi          = {10.1007/978-3-030-55304-3\_18},
  timestamp    = {Mon, 10 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/XieZYL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YeohTC20,
  author       = {Wei{-}Zhu Yeoh and
                  Je Sen Teh and
                  Jiageng Chen},
  editor       = {Joseph K. Liu and
                  Hui Cui},
  title        = {Automated Search for Block Cipher Differentials: {A} GPU-Accelerated
                  Branch-and-Bound Algorithm},
  booktitle    = {Information Security and Privacy - 25th Australasian Conference, {ACISP}
                  2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12248},
  pages        = {160--179},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-55304-3\_9},
  doi          = {10.1007/978-3-030-55304-3\_9},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YeohTC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhaoCDSWL20,
  author       = {Xiaopeng Zhao and
                  Zhenfu Cao and
                  Xiaolei Dong and
                  Jun Shao and
                  Licheng Wang and
                  Zhusen Liu},
  editor       = {Joseph K. Liu and
                  Hui Cui},
  title        = {New Assumptions and Efficient Cryptosystems from the e-th Power Residue
                  Symbol},
  booktitle    = {Information Security and Privacy - 25th Australasian Conference, {ACISP}
                  2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12248},
  pages        = {408--424},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-55304-3\_21},
  doi          = {10.1007/978-3-030-55304-3\_21},
  timestamp    = {Sat, 20 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhaoCDSWL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2020,
  editor       = {Joseph K. Liu and
                  Hui Cui},
  title        = {Information Security and Privacy - 25th Australasian Conference, {ACISP}
                  2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12248},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-55304-3},
  doi          = {10.1007/978-3-030-55304-3},
  isbn         = {978-3-030-55303-6},
  timestamp    = {Wed, 17 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/2020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Ashouri19,
  author       = {Mohammadreza Ashouri},
  editor       = {Julian Jang{-}Jaccard and
                  Fuchun Guo},
  title        = {Practical Dynamic Taint Tracking for Exploiting Input Sanitization
                  Error in Java Applications},
  booktitle    = {Information Security and Privacy - 24th Australasian Conference, {ACISP}
                  2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11547},
  pages        = {494--513},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21548-4\_27},
  doi          = {10.1007/978-3-030-21548-4\_27},
  timestamp    = {Fri, 05 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Ashouri19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/CuiLWG19,
  author       = {Nan Cui and
                  Shengli Liu and
                  Yunhua Wen and
                  Dawu Gu},
  editor       = {Julian Jang{-}Jaccard and
                  Fuchun Guo},
  title        = {Pseudorandom Functions from {LWE:} {RKA} Security and Application},
  booktitle    = {Information Security and Privacy - 24th Australasian Conference, {ACISP}
                  2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11547},
  pages        = {229--250},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21548-4\_13},
  doi          = {10.1007/978-3-030-21548-4\_13},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/CuiLWG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/CurryCFM19,
  author       = {Timothy Curry and
                  Devon Callahan and
                  Benjamin Fuller and
                  Laurent Michel},
  editor       = {Julian Jang{-}Jaccard and
                  Fuchun Guo},
  title        = {{DOCSDN:} Dynamic and Optimal Configuration of Software-Defined Networks},
  booktitle    = {Information Security and Privacy - 24th Australasian Conference, {ACISP}
                  2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11547},
  pages        = {456--474},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21548-4\_25},
  doi          = {10.1007/978-3-030-21548-4\_25},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/CurryCFM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DavidsonDLM19,
  author       = {Alex Davidson and
                  Amit Deo and
                  Ela Lee and
                  Keith Martin},
  editor       = {Julian Jang{-}Jaccard and
                  Fuchun Guo},
  title        = {Strong Post-Compromise Secure Proxy Re-Encryption},
  booktitle    = {Information Security and Privacy - 24th Australasian Conference, {ACISP}
                  2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11547},
  pages        = {58--77},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21548-4\_4},
  doi          = {10.1007/978-3-030-21548-4\_4},
  timestamp    = {Wed, 26 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/DavidsonDLM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DuongFK0S19,
  author       = {Dung Hoang Duong and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Partha Sarathi Roy and
                  Willy Susilo},
  editor       = {Julian Jang{-}Jaccard and
                  Fuchun Guo},
  title        = {A Lattice-Based Public Key Encryption with Equality Test in Standard
                  Model},
  booktitle    = {Information Security and Privacy - 24th Australasian Conference, {ACISP}
                  2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11547},
  pages        = {138--155},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21548-4\_8},
  doi          = {10.1007/978-3-030-21548-4\_8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/DuongFK0S19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/FanTLL19,
  author       = {Xuejun Fan and
                  Song Tian and
                  Bao Li and
                  Weixuan Li},
  editor       = {Julian Jang{-}Jaccard and
                  Fuchun Guo},
  title        = {Constructing Hyperelliptic Covers for Elliptic Curves over Quadratic
                  Extension Fields},
  booktitle    = {Information Security and Privacy - 24th Australasian Conference, {ACISP}
                  2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11547},
  pages        = {630--638},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21548-4\_35},
  doi          = {10.1007/978-3-030-21548-4\_35},
  timestamp    = {Thu, 08 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/FanTLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HuangCYSHC19,
  author       = {Yi{-}Ting Huang and
                  Yu{-}Yuan Chen and
                  Chih{-}Chun Yang and
                  Yeali S. Sun and
                  Shun{-}Wen Hsiao and
                  Meng Chang Chen},
  editor       = {Julian Jang{-}Jaccard and
                  Fuchun Guo},
  title        = {Tagging Malware Intentions by Using Attention-Based Sequence-to-Sequence
                  Neural Network},
  booktitle    = {Information Security and Privacy - 24th Australasian Conference, {ACISP}
                  2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11547},
  pages        = {660--668},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21548-4\_38},
  doi          = {10.1007/978-3-030-21548-4\_38},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HuangCYSHC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/IchikawaOHK19,
  author       = {Atsunori Ichikawa and
                  Wakaha Ogata and
                  Koki Hamada and
                  Ryo Kikuchi},
  editor       = {Julian Jang{-}Jaccard and
                  Fuchun Guo},
  title        = {Efficient Secure Multi-Party Protocols for Decision Tree Classification},
  booktitle    = {Information Security and Privacy - 24th Australasian Conference, {ACISP}
                  2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11547},
  pages        = {362--380},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21548-4\_20},
  doi          = {10.1007/978-3-030-21548-4\_20},
  timestamp    = {Fri, 05 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/IchikawaOHK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/JiKKK19,
  author       = {Woojoong Ji and
                  Taeyun Kim and
                  Kuyju Kim and
                  Hyoungshick Kim},
  editor       = {Julian Jang{-}Jaccard and
                  Fuchun Guo},
  title        = {Automated Cash Mining Attacks on Mobile Advertising Networks},
  booktitle    = {Information Security and Privacy - 24th Australasian Conference, {ACISP}
                  2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11547},
  pages        = {679--686},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21548-4\_40},
  doi          = {10.1007/978-3-030-21548-4\_40},
  timestamp    = {Wed, 26 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/JiKKK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/JinM19,
  author       = {Yaoan Jin and
                  Atsuko Miyaji},
  editor       = {Julian Jang{-}Jaccard and
                  Fuchun Guo},
  title        = {Secure and Compact Elliptic Curve Cryptosystems},
  booktitle    = {Information Security and Privacy - 24th Australasian Conference, {ACISP}
                  2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11547},
  pages        = {639--650},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21548-4\_36},
  doi          = {10.1007/978-3-030-21548-4\_36},
  timestamp    = {Wed, 26 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/JinM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KampSJP19,
  author       = {Tim van de Kamp and
                  David Stritzl and
                  Willem Jonker and
                  Andreas Peter},
  editor       = {Julian Jang{-}Jaccard and
                  Fuchun Guo},
  title        = {Two-Client and Multi-client Functional Encryption for Set Intersection},
  booktitle    = {Information Security and Privacy - 24th Australasian Conference, {ACISP}
                  2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11547},
  pages        = {97--115},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21548-4\_6},
  doi          = {10.1007/978-3-030-21548-4\_6},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/KampSJP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KikuchiAHII00S19,
  author       = {Ryo Kikuchi and
                  Nuttapong Attrapadung and
                  Koki Hamada and
                  Dai Ikarashi and
                  Ai Ishida and
                  Takahiro Matsuda and
                  Yusuke Sakai and
                  Jacob C. N. Schuldt},
  editor       = {Julian Jang{-}Jaccard and
                  Fuchun Guo},
  title        = {Field Extension in Secret-Shared Form and Its Applications to Efficient
                  Secure Computation},
  booktitle    = {Information Security and Privacy - 24th Australasian Conference, {ACISP}
                  2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11547},
  pages        = {343--361},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21548-4\_19},
  doi          = {10.1007/978-3-030-21548-4\_19},
  timestamp    = {Wed, 26 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KikuchiAHII00S19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KimSBNL19,
  author       = {Jongkil Kim and
                  Willy Susilo and
                  Joonsang Baek and
                  Surya Nepal and
                  Dongxi Liu},
  editor       = {Julian Jang{-}Jaccard and
                  Fuchun Guo},
  title        = {Ciphertext-Delegatable {CP-ABE} for a Dynamic Credential: {A} Modular
                  Approach},
  booktitle    = {Information Security and Privacy - 24th Australasian Conference, {ACISP}
                  2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11547},
  pages        = {3--20},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21548-4\_1},
  doi          = {10.1007/978-3-030-21548-4\_1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KimSBNL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KraitsbergLOSA19,
  author       = {Michael Kraitsberg and
                  Yehuda Lindell and
                  Valery Osheter and
                  Nigel P. Smart and
                  Younes Talibi Alaoui},
  editor       = {Julian Jang{-}Jaccard and
                  Fuchun Guo},
  title        = {Adding Distributed Decryption and Key Generation to a Ring-LWE Based
                  {CCA} Encryption Scheme},
  booktitle    = {Information Security and Privacy - 24th Australasian Conference, {ACISP}
                  2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11547},
  pages        = {192--210},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21548-4\_11},
  doi          = {10.1007/978-3-030-21548-4\_11},
  timestamp    = {Fri, 05 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KraitsbergLOSA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LauT19,
  author       = {Terry Shue Chien Lau and
                  Chik How Tan},
  editor       = {Julian Jang{-}Jaccard and
                  Fuchun Guo},
  title        = {Cryptanalysis on CCA2-Secured LRPC-Kronecker Cryptosystem},
  booktitle    = {Information Security and Privacy - 24th Australasian Conference, {ACISP}
                  2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11547},
  pages        = {211--228},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21548-4\_12},
  doi          = {10.1007/978-3-030-21548-4\_12},
  timestamp    = {Fri, 05 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LauT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Li0LF19,
  author       = {Weixuan Li and
                  Wei Yu and
                  Bao Li and
                  Xuejun Fan},
  editor       = {Julian Jang{-}Jaccard and
                  Fuchun Guo},
  title        = {Speeding up Scalar Multiplication on Koblitz Curves Using {\textbackslash}mu
                  {\_}4 Coordinates},
  booktitle    = {Information Security and Privacy - 24th Australasian Conference, {ACISP}
                  2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11547},
  pages        = {620--629},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21548-4\_34},
  doi          = {10.1007/978-3-030-21548-4\_34},
  timestamp    = {Thu, 08 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Li0LF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiLZ19,
  author       = {Geng Li and
                  Jianwei Liu and
                  Zongyang Zhang},
  editor       = {Julian Jang{-}Jaccard and
                  Fuchun Guo},
  title        = {Security Against Subversion in a Multi-surveillant Setting},
  booktitle    = {Information Security and Privacy - 24th Australasian Conference, {ACISP}
                  2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11547},
  pages        = {419--437},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21548-4\_23},
  doi          = {10.1007/978-3-030-21548-4\_23},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/LiLZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiMS19,
  author       = {Dunming Li and
                  Jenwen Mao and
                  Fuke Shen},
  editor       = {Julian Jang{-}Jaccard and
                  Fuchun Guo},
  title        = {A Novel Semi-supervised Adaboost Technique Based on Improved Tri-training},
  booktitle    = {Information Security and Privacy - 24th Australasian Conference, {ACISP}
                  2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11547},
  pages        = {669--678},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21548-4\_39},
  doi          = {10.1007/978-3-030-21548-4\_39},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LiMS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LingMHXL19,
  author       = {Yunhao Ling and
                  Sha Ma and
                  Qiong Huang and
                  Ru Xiang and
                  Ximing Li},
  editor       = {Julian Jang{-}Jaccard and
                  Fuchun Guo},
  title        = {Group ID-Based Encryption with Equality Test},
  booktitle    = {Information Security and Privacy - 24th Australasian Conference, {ACISP}
                  2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11547},
  pages        = {39--57},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21548-4\_3},
  doi          = {10.1007/978-3-030-21548-4\_3},
  timestamp    = {Thu, 22 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/LingMHXL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiuS19,
  author       = {Yunwen Liu and
                  Yu Sasaki},
  editor       = {Julian Jang{-}Jaccard and
                  Fuchun Guo},
  title        = {Related-Key Boomerang Attacks on {GIFT} with Automated Trail Search
                  Including {BCT} Effect},
  booktitle    = {Information Security and Privacy - 24th Australasian Conference, {ACISP}
                  2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11547},
  pages        = {555--572},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21548-4\_30},
  doi          = {10.1007/978-3-030-21548-4\_30},
  timestamp    = {Wed, 26 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LiuS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MurphyP19,
  author       = {Sean Murphy and
                  Rachel Player},
  editor       = {Julian Jang{-}Jaccard and
                  Fuchun Guo},
  title        = {{\textbackslash}delta -subgaussian Random Variables in Cryptography},
  booktitle    = {Information Security and Privacy - 24th Australasian Conference, {ACISP}
                  2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11547},
  pages        = {251--268},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21548-4\_14},
  doi          = {10.1007/978-3-030-21548-4\_14},
  timestamp    = {Wed, 26 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MurphyP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Naito19,
  author       = {Yusuke Naito},
  editor       = {Julian Jang{-}Jaccard and
                  Fuchun Guo},
  title        = {A Highly Secure {MAC} from Tweakable Blockciphers with Support for
                  Short Tweaks},
  booktitle    = {Information Security and Privacy - 24th Australasian Conference, {ACISP}
                  2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11547},
  pages        = {588--606},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21548-4\_32},
  doi          = {10.1007/978-3-030-21548-4\_32},
  timestamp    = {Thu, 27 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Naito19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PalD19,
  author       = {Tapas Pal and
                  Ratna Dutta},
  editor       = {Julian Jang{-}Jaccard and
                  Fuchun Guo},
  title        = {Offline Witness Encryption from Witness {PRF} and Randomized Encoding
                  in {CRS} Model},
  booktitle    = {Information Security and Privacy - 24th Australasian Conference, {ACISP}
                  2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11547},
  pages        = {78--96},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21548-4\_5},
  doi          = {10.1007/978-3-030-21548-4\_5},
  timestamp    = {Wed, 26 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PalD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PanLLN19,
  author       = {Dongxue Pan and
                  Bei Liang and
                  Hongda Li and
                  Peifang Ni},
  editor       = {Julian Jang{-}Jaccard and
                  Fuchun Guo},
  title        = {Witness Encryption with (Weak) Unique Decryption and Message Indistinguishability:
                  Constructions and Applications},
  booktitle    = {Information Security and Privacy - 24th Australasian Conference, {ACISP}
                  2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11547},
  pages        = {609--619},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21548-4\_33},
  doi          = {10.1007/978-3-030-21548-4\_33},
  timestamp    = {Mon, 12 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PanLLN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PangYLM19,
  author       = {Xiaojian Pang and
                  Li Yang and
                  Maozhen Liu and
                  Jianfeng Ma},
  editor       = {Julian Jang{-}Jaccard and
                  Fuchun Guo},
  title        = {MineAuth: Mining Behavioural Habits for Continuous Authentication
                  on a Smartphone},
  booktitle    = {Information Security and Privacy - 24th Australasian Conference, {ACISP}
                  2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11547},
  pages        = {533--551},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21548-4\_29},
  doi          = {10.1007/978-3-030-21548-4\_29},
  timestamp    = {Tue, 25 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/PangYLM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PhuongSY0L19,
  author       = {Tran Viet Xuan Phuong and
                  Willy Susilo and
                  Guomin Yang and
                  Jun Yan and
                  Dongxi Liu},
  editor       = {Julian Jang{-}Jaccard and
                  Fuchun Guo},
  title        = {Location Based Encryption},
  booktitle    = {Information Security and Privacy - 24th Australasian Conference, {ACISP}
                  2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11547},
  pages        = {21--38},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21548-4\_2},
  doi          = {10.1007/978-3-030-21548-4\_2},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PhuongSY0L19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SadhyaC19,
  author       = {Debanjan Sadhya and
                  Bodhi Chakraborty},
  editor       = {Julian Jang{-}Jaccard and
                  Fuchun Guo},
  title        = {A Quantitative Study of Attribute Based Correlation in Micro-databases
                  and Its Effects on Privacy},
  booktitle    = {Information Security and Privacy - 24th Australasian Conference, {ACISP}
                  2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11547},
  pages        = {651--659},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21548-4\_37},
  doi          = {10.1007/978-3-030-21548-4\_37},
  timestamp    = {Fri, 05 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SadhyaC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SchabhuserB019,
  author       = {Lucas Schabh{\"{u}}ser and
                  Denis Butin and
                  Johannes Buchmann},
  editor       = {Julian Jang{-}Jaccard and
                  Fuchun Guo},
  title        = {Function-Dependent Commitments from Homomorphic Authenticators},
  booktitle    = {Information Security and Privacy - 24th Australasian Conference, {ACISP}
                  2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11547},
  pages        = {399--418},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21548-4\_22},
  doi          = {10.1007/978-3-030-21548-4\_22},
  timestamp    = {Wed, 26 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SchabhuserB019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ShenYCZ19,
  author       = {Jaryn Shen and
                  Timothy T. Yuen and
                  Kim{-}Kwang Raymond Choo and
                  Qingkai Zeng},
  editor       = {Julian Jang{-}Jaccard and
                  Fuchun Guo},
  title        = {{AMOGAP:} Defending Against Man-in-the-Middle and Offline Guessing
                  Attacks on Passwords},
  booktitle    = {Information Security and Privacy - 24th Australasian Conference, {ACISP}
                  2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11547},
  pages        = {514--532},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21548-4\_28},
  doi          = {10.1007/978-3-030-21548-4\_28},
  timestamp    = {Mon, 19 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ShenYCZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SipasseuthPS19,
  author       = {Arnaud Sipasseuth and
                  Thomas Plantard and
                  Willy Susilo},
  editor       = {Julian Jang{-}Jaccard and
                  Fuchun Guo},
  title        = {Improving the Security of the {DRS} Scheme with Uniformly Chosen Random
                  Noise},
  booktitle    = {Information Security and Privacy - 24th Australasian Conference, {ACISP}
                  2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11547},
  pages        = {119--137},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21548-4\_7},
  doi          = {10.1007/978-3-030-21548-4\_7},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SipasseuthPS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SusiloTY19,
  author       = {Willy Susilo and
                  Joseph Tonien and
                  Guomin Yang},
  editor       = {Julian Jang{-}Jaccard and
                  Fuchun Guo},
  title        = {The Wiener Attack on {RSA} Revisited: {A} Quest for the Exact Bound},
  booktitle    = {Information Security and Privacy - 24th Australasian Conference, {ACISP}
                  2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11547},
  pages        = {381--398},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21548-4\_21},
  doi          = {10.1007/978-3-030-21548-4\_21},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SusiloTY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TangCLL19,
  author       = {Shuyang Tang and
                  Sherman S. M. Chow and
                  Zhiqiang Liu and
                  Joseph K. Liu},
  editor       = {Julian Jang{-}Jaccard and
                  Fuchun Guo},
  title        = {Fast-to-Finalize Nakamoto-Like Consensus},
  booktitle    = {Information Security and Privacy - 24th Australasian Conference, {ACISP}
                  2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11547},
  pages        = {271--288},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21548-4\_15},
  doi          = {10.1007/978-3-030-21548-4\_15},
  timestamp    = {Wed, 17 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/TangCLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TorresKSSLC19,
  author       = {Wilson Abel Alberto Torres and
                  Veronika Kuchta and
                  Ron Steinfeld and
                  Amin Sakzad and
                  Joseph K. Liu and
                  Jacob Cheng},
  editor       = {Julian Jang{-}Jaccard and
                  Fuchun Guo},
  title        = {Lattice RingCT {V2.0} with Multiple Input and Multiple Output Wallets},
  booktitle    = {Information Security and Privacy - 24th Australasian Conference, {ACISP}
                  2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11547},
  pages        = {156--175},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21548-4\_9},
  doi          = {10.1007/978-3-030-21548-4\_9},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/TorresKSSLC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WangH19,
  author       = {Li{-}Ping Wang and
                  Jingwei Hu},
  editor       = {Julian Jang{-}Jaccard and
                  Fuchun Guo},
  title        = {Two New Module-Code-Based KEMs with Rank Metric},
  booktitle    = {Information Security and Privacy - 24th Australasian Conference, {ACISP}
                  2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11547},
  pages        = {176--191},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21548-4\_10},
  doi          = {10.1007/978-3-030-21548-4\_10},
  timestamp    = {Wed, 26 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WangH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WangLZZYYL19,
  author       = {Ziyu Wang and
                  Jianwei Liu and
                  Zongyang Zhang and
                  Yanting Zhang and
                  Jiayuan Yin and
                  Hui Yu and
                  Wenmao Liu},
  editor       = {Julian Jang{-}Jaccard and
                  Fuchun Guo},
  title        = {A Combined Micro-block Chain Truncation Attack on Bitcoin-NG},
  booktitle    = {Information Security and Privacy - 24th Australasian Conference, {ACISP}
                  2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11547},
  pages        = {322--339},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21548-4\_18},
  doi          = {10.1007/978-3-030-21548-4\_18},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/WangLZZYYL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WijayaLSL19,
  author       = {Dimaz Ankaa Wijaya and
                  Joseph K. Liu and
                  Ron Steinfeld and
                  Dongxi Liu},
  editor       = {Julian Jang{-}Jaccard and
                  Fuchun Guo},
  title        = {Risk of Asynchronous Protocol Update: Attacks to Monero Protocols},
  booktitle    = {Information Security and Privacy - 24th Australasian Conference, {ACISP}
                  2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11547},
  pages        = {307--321},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21548-4\_17},
  doi          = {10.1007/978-3-030-21548-4\_17},
  timestamp    = {Wed, 26 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WijayaLSL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhengHLMZT19,
  author       = {Liang Zheng and
                  Donglei Han and
                  Zongbin Liu and
                  Cunqing Ma and
                  Lingchen Zhang and
                  Churan Tang},
  editor       = {Julian Jang{-}Jaccard and
                  Fuchun Guo},
  title        = {A Low Overhead Error Correction Algorithm Using Random Permutation
                  for {SRAM} PUFs},
  booktitle    = {Information Security and Privacy - 24th Australasian Conference, {ACISP}
                  2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11547},
  pages        = {475--493},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21548-4\_26},
  doi          = {10.1007/978-3-030-21548-4\_26},
  timestamp    = {Thu, 24 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhengHLMZT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhongWXQLW19,
  author       = {Lin Zhong and
                  Huili Wang and
                  Jan Xie and
                  Bo Qin and
                  Joseph K. Liu and
                  Qianhong Wu},
  editor       = {Julian Jang{-}Jaccard and
                  Fuchun Guo},
  title        = {A Flexible Instant Payment System Based on Blockchain},
  booktitle    = {Information Security and Privacy - 24th Australasian Conference, {ACISP}
                  2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11547},
  pages        = {289--306},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21548-4\_16},
  doi          = {10.1007/978-3-030-21548-4\_16},
  timestamp    = {Wed, 29 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhongWXQLW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhuWZ19,
  author       = {Chunbo Zhu and
                  Gaoli Wang and
                  Boyu Zhu},
  editor       = {Julian Jang{-}Jaccard and
                  Fuchun Guo},
  title        = {Fast Chosen-Key Distinguish Attacks on Round-Reduced {AES-192}},
  booktitle    = {Information Security and Privacy - 24th Australasian Conference, {ACISP}
                  2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11547},
  pages        = {573--587},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21548-4\_31},
  doi          = {10.1007/978-3-030-21548-4\_31},
  timestamp    = {Wed, 26 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhuWZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZongCS19,
  author       = {Wei Zong and
                  Yang{-}Wai Chow and
                  Willy Susilo},
  editor       = {Julian Jang{-}Jaccard and
                  Fuchun Guo},
  title        = {Dimensionality Reduction and Visualization of Network Intrusion Detection
                  Data},
  booktitle    = {Information Security and Privacy - 24th Australasian Conference, {ACISP}
                  2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11547},
  pages        = {441--455},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21548-4\_24},
  doi          = {10.1007/978-3-030-21548-4\_24},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ZongCS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2019,
  editor       = {Julian Jang{-}Jaccard and
                  Fuchun Guo},
  title        = {Information Security and Privacy - 24th Australasian Conference, {ACISP}
                  2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11547},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21548-4},
  doi          = {10.1007/978-3-030-21548-4},
  isbn         = {978-3-030-21547-7},
  timestamp    = {Wed, 26 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AhmadiSA18,
  author       = {Ahmad Ahmadi and
                  Reihaneh Safavi{-}Naini and
                  Md. Mamunur Rashid Akand},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {New Attacks and Secure Design for Anonymous Distance-Bounding},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {598--616},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_34},
  doi          = {10.1007/978-3-319-93638-3\_34},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/AhmadiSA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AnadaKMW18,
  author       = {Hiroaki Anada and
                  Akira Kanaoka and
                  Natsume Matsuzaki and
                  Yohei Watanabe},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Key-Updatable Public-Key Encryption with Keyword Search: Models and
                  Generic Constructions},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {341--359},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_20},
  doi          = {10.1007/978-3-319-93638-3\_20},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/AnadaKMW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BarbarSZCX18,
  author       = {Mohamad Barbar and
                  Yulei Sui and
                  Hongyu Zhang and
                  Shiping Chen and
                  Jingling Xue},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Live Path {CFI} Against Control Flow Hijacking Attacks},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {768--779},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_45},
  doi          = {10.1007/978-3-319-93638-3\_45},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/BarbarSZCX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BoyenH18,
  author       = {Xavier Boyen and
                  Thomas Haines},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Forward-Secure Linkable Ring Signatures},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {245--264},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_15},
  doi          = {10.1007/978-3-319-93638-3\_15},
  timestamp    = {Mon, 02 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BoyenH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/CheonJKL18,
  author       = {Jung Hee Cheon and
                  Jinhyuck Jeong and
                  Dongwoo Kim and
                  Jongchan Lee},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {A Reusable Fuzzy Extractor with Practical Storage Size: Modifying
                  Canetti et al.'s Construction},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {28--44},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_3},
  doi          = {10.1007/978-3-319-93638-3\_3},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/CheonJKL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/CuiHX018,
  author       = {Jie Cui and
                  Jiantao He and
                  Yan Xu and
                  Hong Zhong},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {{TDDAD:} Time-Based Detection and Defense Scheme Against DDoS Attack
                  on {SDN} Controller},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {649--665},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_37},
  doi          = {10.1007/978-3-319-93638-3\_37},
  timestamp    = {Wed, 20 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/CuiHX018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DavidDL18,
  author       = {Bernardo David and
                  Rafael Dowsley and
                  Mario Larangeira},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {21 - Bringing Down the Complexity: Fast Composable Protocols for Card
                  Games Without Secret State},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {45--63},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_4},
  doi          = {10.1007/978-3-319-93638-3\_4},
  timestamp    = {Mon, 02 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/DavidDL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DingFR18,
  author       = {Jintai Ding and
                  Scott R. Fluhrer and
                  Saraswathy RV},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Complete Attack on {RLWE} Key Exchange with Reused Keys, Without Signal
                  Leakage},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {467--486},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_27},
  doi          = {10.1007/978-3-319-93638-3\_27},
  timestamp    = {Mon, 02 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/DingFR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Heys18,
  author       = {Howard M. Heys},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Distributed Time-Memory Tradeoff Attacks on Ciphers - (with Application
                  to Stream Ciphers and Counter Mode)},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {135--153},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_9},
  doi          = {10.1007/978-3-319-93638-3\_9},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Heys18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HuLCL18,
  author       = {Ziyuan Hu and
                  Shengli Liu and
                  Kefei Chen and
                  Joseph K. Liu},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Revocable Identity-Based Encryption from the Computational Diffie-Hellman
                  Problem},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {265--283},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_16},
  doi          = {10.1007/978-3-319-93638-3\_16},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HuLCL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HuZ18,
  author       = {Kexin Hu and
                  Zhenfeng Zhang},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Fast Lottery-Based Micropayments for Decentralized Currencies},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {669--686},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_38},
  doi          = {10.1007/978-3-319-93638-3\_38},
  timestamp    = {Sat, 19 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HuZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ItoM18,
  author       = {Ryoma Ito and
                  Atsuko Miyaji},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {New Iterated {RC4} Key Correlations},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {154--171},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_10},
  doi          = {10.1007/978-3-319-93638-3\_10},
  timestamp    = {Mon, 26 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ItoM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KikuchiIMHC18,
  author       = {Ryo Kikuchi and
                  Dai Ikarashi and
                  Takahiro Matsuda and
                  Koki Hamada and
                  Koji Chida},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Efficient Bit-Decomposition and Modulus-Conversion Protocols with
                  an Honest Majority},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {64--82},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_5},
  doi          = {10.1007/978-3-319-93638-3\_5},
  timestamp    = {Tue, 30 Oct 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/KikuchiIMHC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KilincV18,
  author       = {Handan Kilin{\c{c}} and
                  Serge Vaudenay},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Secure Contactless Payment},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {579--597},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_33},
  doi          = {10.1007/978-3-319-93638-3\_33},
  timestamp    = {Mon, 02 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KilincV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KimLP18,
  author       = {Eunkyung Kim and
                  Hyang{-}Sook Lee and
                  Jeongeun Park},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Towards Round-Optimal Secure Multiparty Computations: Multikey {FHE}
                  Without a {CRS}},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {101--113},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_7},
  doi          = {10.1007/978-3-319-93638-3\_7},
  timestamp    = {Tue, 26 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KimLP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LaiHAM18,
  author       = {Junzuo Lai and
                  Zhengan Huang and
                  Man Ho Au and
                  Xianping Mao},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Constant-Size CCA-Secure Multi-hop Unidirectional Proxy Re-encryption
                  from Indistinguishability Obfuscation},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {805--812},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_49},
  doi          = {10.1007/978-3-319-93638-3\_49},
  timestamp    = {Mon, 02 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LaiHAM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LaiYYCD18,
  author       = {Qiqi Lai and
                  Bo Yang and
                  Yong Yu and
                  Yuan Chen and
                  Liju Dong},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Anonymous Identity-Based Hash Proof System from Lattices in the Standard
                  Model},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {539--557},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_31},
  doi          = {10.1007/978-3-319-93638-3\_31},
  timestamp    = {Tue, 09 Jul 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LaiYYCD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LauT18,
  author       = {Terry Shue Chien Lau and
                  Chik How Tan},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {A New Encryption Scheme Based on Rank Metric Codes},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {750--758},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_43},
  doi          = {10.1007/978-3-319-93638-3\_43},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LauT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LeeWZ18,
  author       = {Hyung Tae Lee and
                  Huaxiong Wang and
                  Kai Zhang},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Security Analysis and Modification of ID-Based Encryption with Equality
                  Test from {ACISP} 2017},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {780--786},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_46},
  doi          = {10.1007/978-3-319-93638-3\_46},
  timestamp    = {Fri, 27 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LeeWZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiLNP18,
  author       = {Haoyu Li and
                  Renzhang Liu and
                  Abderrahmane Nitaj and
                  Yanbin Pan},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Cryptanalysis of the Randomized Version of a Lattice-Based Signature
                  Scheme from PKC'08},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {455--466},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_26},
  doi          = {10.1007/978-3-319-93638-3\_26},
  timestamp    = {Mon, 02 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LiLNP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiLX18,
  author       = {Shimin Li and
                  Bei Liang and
                  Rui Xue},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Private Functional Signatures: Definition and Construction},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {284--303},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_17},
  doi          = {10.1007/978-3-319-93638-3\_17},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/LiLX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiuCWW18,
  author       = {Chi Liu and
                  Rongmao Chen and
                  Yi Wang and
                  Yongjun Wang},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Asymmetric Subversion Attacks on Signature Schemes},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {376--395},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_22},
  doi          = {10.1007/978-3-319-93638-3\_22},
  timestamp    = {Thu, 21 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/LiuCWW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiuSCLWCL18,
  author       = {Lin Liu and
                  Jinshu Su and
                  Rongmao Chen and
                  Ximeng Liu and
                  Xiaofeng Wang and
                  Shuhui Chen and
                  Ho{-}fung Leung},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Privacy-Preserving Mining of Association Rule on Outsourced Cloud
                  Data from Multiple Parties},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {431--451},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_25},
  doi          = {10.1007/978-3-319-93638-3\_25},
  timestamp    = {Sun, 21 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/LiuSCLWCL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LuZA18,
  author       = {Xingye Lu and
                  Zhenfei Zhang and
                  Man Ho Au},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Practical Signatures from the Partial Fourier Recovery Problem Revisited:
                  {A} Provably-Secure and Gaussian-Distributed Construction},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {813--820},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_50},
  doi          = {10.1007/978-3-319-93638-3\_50},
  timestamp    = {Tue, 10 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LuZA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MaWL18,
  author       = {Xuecheng Ma and
                  Xin Wang and
                  Dongdai Lin},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Anonymous Identity-Based Encryption with Identity Recovery},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {360--375},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_21},
  doi          = {10.1007/978-3-319-93638-3\_21},
  timestamp    = {Mon, 02 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MaWL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MarriereNV18,
  author       = {Nicolas Marri{\`{e}}re and
                  Val{\'{e}}rie Nachef and
                  Emmanuel Volte},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Differential Attacks on Reduced Round {LILLIPUT}},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {188--206},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_12},
  doi          = {10.1007/978-3-319-93638-3\_12},
  timestamp    = {Mon, 02 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MarriereNV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MengWLLLP18,
  author       = {Weizhi Meng and
                  Yu Wang and
                  Wenjuan Li and
                  Zhe Liu and
                  Jin Li and
                  Christian W. Probst},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Enhancing Intelligent Alarm Reduction for Distributed Intrusion Detection
                  Systems via Edge Computing},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {759--767},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_44},
  doi          = {10.1007/978-3-319-93638-3\_44},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MengWLLLP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Naito18,
  author       = {Yusuke Naito},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Keyed Sponge with Prefix-Free Padding: Independence Between Capacity
                  and Online Queries Without the Suffix Key},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {225--242},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_14},
  doi          = {10.1007/978-3-319-93638-3\_14},
  timestamp    = {Wed, 04 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Naito18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PaulS18,
  author       = {Souradyuti Paul and
                  Ananya Shrivastava},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Robust Multiparty Computation with Faster Verification Time},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {114--131},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_8},
  doi          = {10.1007/978-3-319-93638-3\_8},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PaulS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PengLKZH18,
  author       = {Liqiang Peng and
                  Yao Lu and
                  Noboru Kunihiro and
                  Rui Zhang and
                  Lei Hu},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {A Deterministic Algorithm for Computing Divisors in an Interval},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {3--12},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_1},
  doi          = {10.1007/978-3-319-93638-3\_1},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PengLKZH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SarkarBN18,
  author       = {Pinaki Sarkar and
                  Mayank Baranwal and
                  Sukumar Nandi},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {{CRT-KPS:} {A} Key Predistribution Schemes Using {CRT}},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {821--830},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_51},
  doi          = {10.1007/978-3-319-93638-3\_51},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SarkarBN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SarkarS18,
  author       = {Sumanta Sarkar and
                  Habeeb Syed},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Bounds on Differential and Linear Branch Number of Permutations},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {207--224},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_13},
  doi          = {10.1007/978-3-319-93638-3\_13},
  timestamp    = {Mon, 02 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SarkarS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ShenL0HCZ18,
  author       = {Jian Shen and
                  Dengzhi Liu and
                  Xiaofeng Chen and
                  Xinyi Huang and
                  Jiageng Chen and
                  Mingwu Zhang},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Secure Publicly Verifiable Computation with Polynomial Commitment
                  in Cloud Computing},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {417--430},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_24},
  doi          = {10.1007/978-3-319-93638-3\_24},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ShenL0HCZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SunCHC18,
  author       = {Yeali S. Sun and
                  Chien{-}Chun Chen and
                  Shun{-}Wen Hsiao and
                  Meng Chang Chen},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {ANTSdroid: Automatic Malware Family Behaviour Generation and Analysis
                  for Android Apps},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {796--804},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_48},
  doi          = {10.1007/978-3-319-93638-3\_48},
  timestamp    = {Mon, 02 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SunCHC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SunZF18,
  author       = {Yinxia Sun and
                  Futai Zhang and
                  Anmin Fu},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Revocable Certificateless Encryption with Ciphertext Evolution},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {741--749},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_42},
  doi          = {10.1007/978-3-319-93638-3\_42},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/SunZF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TorresSSLKBAC18,
  author       = {Wilson Abel Alberto Torres and
                  Ron Steinfeld and
                  Amin Sakzad and
                  Joseph K. Liu and
                  Veronika Kuchta and
                  Nandita Bhattacharjee and
                  Man Ho Au and
                  Jacob Cheng},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Post-Quantum One-Time Linkable Ring Signature and Application to Ring
                  Confidential Transactions in Blockchain (Lattice RingCT v1.0)},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {558--576},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_32},
  doi          = {10.1007/978-3-319-93638-3\_32},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/TorresSSLKBAC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WangIDT18,
  author       = {Yacheng Wang and
                  Yasuhiko Ikematsu and
                  Dung Hoang Duong and
                  Tsuyoshi Takagi},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Efficient Decryption Algorithms for Extension Field Cancellation Type
                  Encryption Schemes},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {487--501},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_28},
  doi          = {10.1007/978-3-319-93638-3\_28},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WangIDT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WangT18,
  author       = {Yuntao Wang and
                  Tsuyoshi Takagi},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Improving the {BKZ} Reduction Algorithm by Quick Reordering Technique},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {787--795},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_47},
  doi          = {10.1007/978-3-319-93638-3\_47},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WangT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WenL18,
  author       = {Yunhua Wen and
                  Shengli Liu},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Reusable Fuzzy Extractor from {LWE}},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {13--27},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_2},
  doi          = {10.1007/978-3-319-93638-3\_2},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WenL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/XiaS0ZZ18,
  author       = {Zhe Xia and
                  Liuying Sun and
                  Bo Yang and
                  Yanwei Zhou and
                  Mingwu Zhang},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Verifiable Secret Sharing Based on Hyperplane Geometry with Its Applications
                  to Optimal Resilient Proactive Cryptosystems},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {83--100},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_6},
  doi          = {10.1007/978-3-319-93638-3\_6},
  timestamp    = {Mon, 02 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/XiaS0ZZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/XuDC018,
  author       = {Yan Xu and
                  Ran Ding and
                  Jie Cui and
                  Hong Zhong},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Intrusion-Resilient Public Auditing Protocol for Data Storage in Cloud
                  Computing},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {399--416},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_23},
  doi          = {10.1007/978-3-319-93638-3\_23},
  timestamp    = {Wed, 20 Mar 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/XuDC018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YangAXY18,
  author       = {Rupeng Yang and
                  Man Ho Au and
                  Qiuliang Xu and
                  Zuoxia Yu},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Decentralized Blacklistable Anonymous Credentials with Reputation},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {720--738},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_41},
  doi          = {10.1007/978-3-319-93638-3\_41},
  timestamp    = {Mon, 02 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YangAXY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YeT18,
  author       = {Chen{-}Dong Ye and
                  Tian Tian},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {A New Framework for Finding Nonlinear Superpolies in Cube Attacks
                  Against Trivium-Like Ciphers},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {172--187},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_11},
  doi          = {10.1007/978-3-319-93638-3\_11},
  timestamp    = {Mon, 15 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/YeT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YinWZL18,
  author       = {Jiayuan Yin and
                  Changren Wang and
                  Zongyang Zhang and
                  Jianwei Liu},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Revisiting the Incentive Mechanism of Bitcoin-NG},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {706--719},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_40},
  doi          = {10.1007/978-3-319-93638-3\_40},
  timestamp    = {Wed, 11 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/YinWZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YuAYLX18,
  author       = {Zuoxia Yu and
                  Man Ho Au and
                  Rupeng Yang and
                  Junzuo Lai and
                  Qiuliang Xu},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Lattice-Based Universal Accumulator with Nonmembership Arguments},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {502--519},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_29},
  doi          = {10.1007/978-3-319-93638-3\_29},
  timestamp    = {Mon, 02 Jul 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YuAYLX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZengLYXW18,
  author       = {Yali Zeng and
                  Xu Li and
                  Xu Yang and
                  Qikui Xu and
                  Dongcheng Wang},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {A Practical Privacy Preserving Protocol in Database-Driven Cognitive
                  Radio Networks},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {634--648},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_36},
  doi          = {10.1007/978-3-319-93638-3\_36},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ZengLYXW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhangLLLG18,
  author       = {Yuncong Zhang and
                  Yu Long and
                  Zhen Liu and
                  Zhiqiang Liu and
                  Dawu Gu},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Z-Channel: Scalable and Efficient Scheme in Zerocash},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {687--705},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_39},
  doi          = {10.1007/978-3-319-93638-3\_39},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhangLLLG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhangZLLXL18,
  author       = {Daode Zhang and
                  Kai Zhang and
                  Bao Li and
                  Xianhui Lu and
                  Haiyang Xue and
                  Jie Li},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Lattice-Based Dual Receiver Encryption and More},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {520--538},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_30},
  doi          = {10.1007/978-3-319-93638-3\_30},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhangZLLXL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhengWQZHL18,
  author       = {Haibin Zheng and
                  Qianhong Wu and
                  Bo Qin and
                  Lin Zhong and
                  Shuangyu He and
                  Jianwei Liu},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Linkable Group Signature for Auditing Anonymous Communication},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {304--321},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_18},
  doi          = {10.1007/978-3-319-93638-3\_18},
  timestamp    = {Wed, 29 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhengWQZHL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhongWQZL18,
  author       = {Lin Zhong and
                  Qianhong Wu and
                  Bo Qin and
                  Haibin Zheng and
                  Jianwei Liu},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Auditable Hierarchy-Private Public-Key Encryption},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {322--340},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_19},
  doi          = {10.1007/978-3-319-93638-3\_19},
  timestamp    = {Wed, 29 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhongWQZL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZouDL018,
  author       = {Deqing Zou and
                  Zhijun Deng and
                  Zhen Li and
                  Hai Jin},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Automatically Identifying Security Bug Reports via Multitype Features
                  Analysis},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {619--633},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_35},
  doi          = {10.1007/978-3-319-93638-3\_35},
  timestamp    = {Tue, 04 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ZouDL018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2018,
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3},
  doi          = {10.1007/978-3-319-93638-3},
  isbn         = {978-3-319-93637-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/0002T17,
  author       = {Eunkyung Kim and
                  Mehdi Tibouchi},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Secure {GLS} Recomposition for Sum-of-Square Cofactors},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {349--365},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_20},
  doi          = {10.1007/978-3-319-59870-3\_20},
  timestamp    = {Sun, 02 Jun 2019 21:26:44 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/0002T17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AkterH17,
  author       = {Mousumi Akter and
                  Tanzima Hashem},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Computing Aggregates Over Numeric Data with Personalized Local Differential
                  Privacy},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {249--260},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_14},
  doi          = {10.1007/978-3-319-59870-3\_14},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/AkterH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AvoineCKT17,
  author       = {Gildas Avoine and
                  Xavier Carpent and
                  Barbara Kordy and
                  Florent Tardif},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {How to Handle Rainbow Tables with External Memory},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {306--323},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_16},
  doi          = {10.1007/978-3-319-60055-0\_16},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/AvoineCKT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BeckCDKPSS17,
  author       = {Michael Till Beck and
                  Jan Camenisch and
                  David Derler and
                  Stephan Krenn and
                  Henrich C. P{\"{o}}hls and
                  Kai Samelin and
                  Daniel Slamanig},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Practical Strongly Invisible and Strongly Accountable Sanitizable
                  Signatures},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {437--452},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_23},
  doi          = {10.1007/978-3-319-60055-0\_23},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/BeckCDKPSS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BuldasGB17,
  author       = {Ahto Buldas and
                  Matthias Geihs and
                  Johannes Buchmann},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Long-Term Secure Commitments via Extractable-Binding Commitments},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {65--81},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_4},
  doi          = {10.1007/978-3-319-60055-0\_4},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/BuldasGB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChakrabortyPR17,
  author       = {Suvradip Chakraborty and
                  Goutam Paul and
                  C. Pandu Rangan},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Efficient Compilers for After-the-Fact Leakage: From {CPA} to {CCA-2}
                  Secure {PKE} to {AKE}},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {343--362},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_18},
  doi          = {10.1007/978-3-319-60055-0\_18},
  timestamp    = {Sun, 17 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ChakrabortyPR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChowSTZ17,
  author       = {Yang{-}Wai Chow and
                  Willy Susilo and
                  Joseph Tonien and
                  Wei Zong},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {A {QR} Code Watermarking Approach Based on the {DWT-DCT} Technique},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {314--331},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_18},
  doi          = {10.1007/978-3-319-59870-3\_18},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ChowSTZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/CuiAGR17,
  author       = {Shujie Cui and
                  Muhammad Rizwan Asghar and
                  Steven D. Galbraith and
                  Giovanni Russello},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Secure and Practical Searchable Encryption: {A} Position Paper},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {266--281},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_14},
  doi          = {10.1007/978-3-319-60055-0\_14},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/CuiAGR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/CuiDLL17,
  author       = {Hui Cui and
                  Robert H. Deng and
                  Joseph K. Liu and
                  Yingjiu Li},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Attribute-Based Encryption with Expressive and Authorized Keyword
                  Search},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {106--126},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_6},
  doi          = {10.1007/978-3-319-60055-0\_6},
  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/CuiDLL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/CuiSCW17,
  author       = {Tingting Cui and
                  Ling Sun and
                  Huaifeng Chen and
                  Meiqin Wang},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Statistical Integral Distinguisher with Multi-structure and Its Application
                  on {AES}},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {402--420},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_21},
  doi          = {10.1007/978-3-319-60055-0\_21},
  timestamp    = {Tue, 07 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/CuiSCW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DavidsonC17,
  author       = {Alex Davidson and
                  Carlos Cid},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {An Efficient Toolkit for Computing Private Set Operations},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {261--278},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_15},
  doi          = {10.1007/978-3-319-59870-3\_15},
  timestamp    = {Wed, 31 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/DavidsonC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DumasZ17,
  author       = {Jean{-}Guillaume Dumas and
                  Vincent Zucca},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Prover Efficient Public Verification of Dense or Sparse/Structured
                  Matrix-Vector Multiplication},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {115--134},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_7},
  doi          = {10.1007/978-3-319-59870-3\_7},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/DumasZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Emura17,
  author       = {Keita Emura},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability
                  from Simple Assumptions},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {193--213},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_11},
  doi          = {10.1007/978-3-319-59870-3\_11},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Emura17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ErwigFHHKKKLR17,
  author       = {Andreas Erwig and
                  Marc Fischlin and
                  Martin Hald and
                  Dominik Helm and
                  Robert Kiel and
                  Florian K{\"{u}}bler and
                  Michael K{\"{u}}mmerlin and
                  Jakob Laenge and
                  Felix Rohrbach},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Redactable Graph Hashing, Revisited - (Extended Abstract)},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {398--405},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_24},
  doi          = {10.1007/978-3-319-59870-3\_24},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ErwigFHHKKKLR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/FangYTLLWY17,
  author       = {Ying Fang and
                  Bo Yu and
                  Yong Tang and
                  Liu Liu and
                  Zexin Lu and
                  Yi Wang and
                  Qiang Yang},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {A New Malware Classification Approach Based on Malware Dynamic Analysis},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {173--189},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_10},
  doi          = {10.1007/978-3-319-59870-3\_10},
  timestamp    = {Fri, 15 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/FangYTLLWY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/FarashahiH17,
  author       = {Reza Rezaeian Farashahi and
                  Seyed Gholamhossein Hosseini},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Differential Addition on Twisted Edwards Curves},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {366--378},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_21},
  doi          = {10.1007/978-3-319-59870-3\_21},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/FarashahiH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ForlerLLW17,
  author       = {Christian Forler and
                  Eik List and
                  Stefan Lucks and
                  Jakob Wenzel},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Reforgeability of Authenticated Encryption Schemes},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {19--37},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_2},
  doi          = {10.1007/978-3-319-59870-3\_2},
  timestamp    = {Thu, 21 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ForlerLLW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/FunabikiTIM17,
  author       = {Yuki Funabiki and
                  Yosuke Todo and
                  Takanori Isobe and
                  Masakatu Morii},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Improved Integral Attack on {HIGHT}},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {363--383},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_19},
  doi          = {10.1007/978-3-319-60055-0\_19},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/FunabikiTIM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HanL17,
  author       = {Shuai Han and
                  Shengli Liu},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {KDM-Secure Public-Key Encryption from Constant-Noise {LPN}},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {44--64},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_3},
  doi          = {10.1007/978-3-319-60055-0\_3},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HanL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HattoriHMSW17,
  author       = {Mitsuhiro Hattori and
                  Takato Hirano and
                  Nori Matsuda and
                  Rina Shimizu and
                  Ye Wang},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Privacy-Utility Tradeoff for Applications Using Energy Disaggregation
                  of Smart-Meter Data},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {214--234},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_12},
  doi          = {10.1007/978-3-319-59870-3\_12},
  timestamp    = {Fri, 18 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HattoriHMSW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HeJLLJ17,
  author       = {Jingnan He and
                  Wenpan Jing and
                  Bao Li and
                  Xianhui Lu and
                  Dingding Jia},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Dual-Mode Cryptosystem Based on the Learning with Errors Problem},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {443--451},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_29},
  doi          = {10.1007/978-3-319-59870-3\_29},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HeJLLJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HorneN17,
  author       = {Dwight Horne and
                  Suku Nair},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {A Feasibility Evaluation of Fair and Privacy-Enhanced Matchmaking
                  with Identity Linked Wishes},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {422--434},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_27},
  doi          = {10.1007/978-3-319-59870-3\_27},
  timestamp    = {Wed, 31 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HorneN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Horsch0MB17,
  author       = {Moritz Horsch and
                  Johannes Braun and
                  Dominique Metz and
                  Johannes Buchmann},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Update-Tolerant and Revocable Password Backup},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {390--397},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_23},
  doi          = {10.1007/978-3-319-59870-3\_23},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/Horsch0MB17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/JiangZC17,
  author       = {Fan Jiang and
                  Cen Zhang and
                  Shaoyin Cheng},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {FFFuzzer: Filter Your Fuzz to Get Accuracy, Efficiency and Schedulability},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {61--79},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_4},
  doi          = {10.1007/978-3-319-59870-3\_4},
  timestamp    = {Tue, 21 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/JiangZC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KermanshahiLS17,
  author       = {Shabnam Kasra Kermanshahi and
                  Joseph K. Liu and
                  Ron Steinfeld},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Multi-user Cloud-Based Secure Keyword Search},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {227--247},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_12},
  doi          = {10.1007/978-3-319-60055-0\_12},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/KermanshahiLS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LinTG17,
  author       = {Yan Lin and
                  Xiaoxiao Tang and
                  Debin Gao},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {SafeStack + : Enhanced Dual Stack to Combat Data-Flow Hijacking},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {95--112},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_6},
  doi          = {10.1007/978-3-319-59870-3\_6},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/LinTG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MahriSBDW17,
  author       = {Hassan Qahur Al Mahri and
                  Leonie Simpson and
                  Harry Bartlett and
                  Ed Dawson and
                  Kenneth Koon{-}Ho Wong},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Fault Attacks on {XEX} Mode with Application to Certain Authenticated
                  Encryption Modes},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {285--305},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_15},
  doi          = {10.1007/978-3-319-60055-0\_15},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/MahriSBDW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MaitiGC17,
  author       = {Swapan Maiti and
                  Shamit Ghosh and
                  Dipanwita Roy Chowdhury},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {On the Security of Designing a Cellular Automata Based Stream Cipher},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {406--413},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_25},
  doi          = {10.1007/978-3-319-59870-3\_25},
  timestamp    = {Wed, 31 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MaitiGC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MengHAL17,
  author       = {Weizhi Meng and
                  Lee Wang Hao and
                  Man Ho Au and
                  Zhe Liu},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Exploring Effect of Location Number on Map-Based Graphical Password
                  Authentication},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {301--313},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_17},
  doi          = {10.1007/978-3-319-59870-3\_17},
  timestamp    = {Thu, 18 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/MengHAL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Naito17,
  author       = {Yusuke Naito},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Indifferentiability of Double-Block-Length Hash Function Without Feed-Forward
                  Operations},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {38--57},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_3},
  doi          = {10.1007/978-3-319-59870-3\_3},
  timestamp    = {Wed, 13 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Naito17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PrabowoT17,
  author       = {Theo Fanuela Prabowo and
                  Chik How Tan},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Generating Complete Edwards Curves},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {335--348},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_19},
  doi          = {10.1007/978-3-319-59870-3\_19},
  timestamp    = {Wed, 31 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PrabowoT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/QiangGJL17,
  author       = {Weizhong Qiang and
                  JiaZhen Guo and
                  Hai Jin and
                  Weifeng Li},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {JSFfox: Run-Timely Confining JavaScript for Firefox},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {135--150},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_8},
  doi          = {10.1007/978-3-319-59870-3\_8},
  timestamp    = {Thu, 24 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/QiangGJL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/QiangHZJWS17,
  author       = {Weizhong Qiang and
                  Yingda Huang and
                  Deqing Zou and
                  Hai Jin and
                  Shizhen Wang and
                  Guozhong Sun},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Fully Context-Sensitive {CFI} for {COTS} Binaries},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {435--442},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_28},
  doi          = {10.1007/978-3-319-59870-3\_28},
  timestamp    = {Thu, 24 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/QiangHZJWS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/RodofileSSDRF17,
  author       = {Nicholas R. Rodofile and
                  Thomas Schmidt and
                  Sebastian T. Sherry and
                  Christopher Djamaludin and
                  Kenneth Radke and
                  Ernest Foo},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Process Control Cyber-Attacks and Labelled Datasets on S7Comm Critical
                  Infrastructure},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {452--459},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_30},
  doi          = {10.1007/978-3-319-59870-3\_30},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/RodofileSSDRF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SarkarS17,
  author       = {Sumanta Sarkar and
                  Habeeb Syed},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Analysis of Toeplitz {MDS} Matrices},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {3--18},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_1},
  doi          = {10.1007/978-3-319-59870-3\_1},
  timestamp    = {Wed, 31 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SarkarS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SinghSR17,
  author       = {Abhishek Singh and
                  Binanda Sengupta and
                  Sushmita Ruj},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Certificate Transparency with Enhancements and Short Proofs},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {381--389},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_22},
  doi          = {10.1007/978-3-319-59870-3\_22},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/SinghSR17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SunSWCLH17,
  author       = {Hao Sun and
                  Jinshu Su and
                  Xiaofeng Wang and
                  Rongmao Chen and
                  Yujing Liu and
                  Qiaolin Hu},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {PriMal: Cloud-Based Privacy-Preserving Malware Detection},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {153--172},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_9},
  doi          = {10.1007/978-3-319-59870-3\_9},
  timestamp    = {Wed, 14 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/SunSWCLH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Takashima17,
  author       = {Katsuyuki Takashima},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {New Proof Techniques for DLIN-Based Adaptively Secure Attribute-Based
                  Encryption},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {85--105},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_5},
  doi          = {10.1007/978-3-319-60055-0\_5},
  timestamp    = {Wed, 31 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Takashima17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Takayasu017,
  author       = {Atsushi Takayasu and
                  Yohei Watanabe},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Lattice-Based Revocable Identity-Based Encryption with Bounded Decryption
                  Key Exposure Resistance},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {184--204},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_10},
  doi          = {10.1007/978-3-319-60055-0\_10},
  timestamp    = {Wed, 31 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Takayasu017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ThomborsonJ17,
  author       = {Clark D. Thomborson and
                  Marc Jeanmougin},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Stegogames},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {414--421},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_26},
  doi          = {10.1007/978-3-319-59870-3\_26},
  timestamp    = {Wed, 26 Jul 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ThomborsonJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TianZYMY17,
  author       = {Yangguang Tian and
                  Shiwei Zhang and
                  Guomin Yang and
                  Yi Mu and
                  Yong Yu},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Privacy-Preserving k-time Authenticated Secret Handshakes},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {281--300},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_16},
  doi          = {10.1007/978-3-319-59870-3\_16},
  timestamp    = {Tue, 02 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/TianZYMY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TjuawinataHW17,
  author       = {Ivan Tjuawinata and
                  Tao Huang and
                  Hongjun Wu},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Cryptanalysis of Simpira v2},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {384--401},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_20},
  doi          = {10.1007/978-3-319-60055-0\_20},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/TjuawinataHW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WatanabeIM17,
  author       = {Yuhei Watanabe and
                  Takanori Isobe and
                  Masakatu Morii},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Conditional Differential Cryptanalysis for Kreyvium},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {421--434},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_22},
  doi          = {10.1007/978-3-319-60055-0\_22},
  timestamp    = {Fri, 03 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/WatanabeIM17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WeiWZY17,
  author       = {Puwen Wei and
                  Wei Wang and
                  Bingxin Zhu and
                  Siu{-}Ming Yiu},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Tightly-Secure Encryption in the Multi-user, Multi-challenge Setting
                  with Improved Efficiency},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {3--22},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_1},
  doi          = {10.1007/978-3-319-60055-0\_1},
  timestamp    = {Wed, 01 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/WeiWZY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WuMMZ17,
  author       = {Tong Wu and
                  Sha Ma and
                  Yi Mu and
                  Shengke Zeng},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {ID-Based Encryption with Equality Test Against Insider Attack},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {168--183},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_9},
  doi          = {10.1007/978-3-319-60055-0\_9},
  timestamp    = {Thu, 06 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WuMMZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/XuL0SWJ17,
  author       = {Peng Xu and
                  Shuai Liang and
                  Wei Wang and
                  Willy Susilo and
                  Qianhong Wu and
                  Hai Jin},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Dynamic Searchable Symmetric Encryption with Physical Deletion and
                  Small Leakage},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {207--226},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_11},
  doi          = {10.1007/978-3-319-60055-0\_11},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/XuL0SWJ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/XuYMS17,
  author       = {Shengmin Xu and
                  Guomin Yang and
                  Yi Mu and
                  Willy Susilo},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Mergeable and Revocable Identity-Based Encryption},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {147--167},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_8},
  doi          = {10.1007/978-3-319-60055-0\_8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/XuYMS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YangLWH17,
  author       = {Yanjiang Yang and
                  Joseph K. Liu and
                  Zhuo Wei and
                  Xinyi Huang},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Towards Revocable Fine-Grained Encryption of Cloud Data: Reducing
                  Trust upon Cloud},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {127--144},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_7},
  doi          = {10.1007/978-3-319-60055-0\_7},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YangLWH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YingK17,
  author       = {Jason H. M. Ying and
                  Noboru Kunihiro},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Solving the {DLP} with Low Hamming Weight Product Exponents and Improved
                  Attacks on the {GPS} Identification Scheme},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {460--467},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_31},
  doi          = {10.1007/978-3-319-59870-3\_31},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YingK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhanZGWN17,
  author       = {Jiawei Zhan and
                  Quan Zhou and
                  Xiaozhuo Gu and
                  Yuewu Wang and
                  Yingjiao Niu},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Splitting Third-Party Libraries' Privileges from Android Apps},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {80--94},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_5},
  doi          = {10.1007/978-3-319-59870-3\_5},
  timestamp    = {Wed, 31 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhanZGWN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhangLG17,
  author       = {Xiao Zhang and
                  Shengli Liu and
                  Dawu Gu},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Tightly-Secure Signatures from the Decisional Composite Residuosity
                  Assumption},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {453--468},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_24},
  doi          = {10.1007/978-3-319-60055-0\_24},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhangLG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhangMYW17,
  author       = {Shiwei Zhang and
                  Yi Mu and
                  Guomin Yang and
                  Xiaofen Wang},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Hierarchical Functional Encryption for Linear Transformations},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {23--43},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_2},
  doi          = {10.1007/978-3-319-60055-0\_2},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhangMYW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhengKH17,
  author       = {Mengce Zheng and
                  Noboru Kunihiro and
                  Honggang Hu},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Improved Factoring Attacks on Multi-prime {RSA} with Small Prime Difference},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {324--342},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_17},
  doi          = {10.1007/978-3-319-60055-0\_17},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhengKH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhouXLXP17,
  author       = {Fucai Zhou and
                  Zifeng Xu and
                  Yuxi Li and
                  Jian Xu and
                  Su Peng},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Private Graph Intersection Protocol},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {235--248},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_13},
  doi          = {10.1007/978-3-319-59870-3\_13},
  timestamp    = {Wed, 14 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhouXLXP17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhuMWLC17,
  author       = {Hong Zhu and
                  Zhuolin Mei and
                  Bing Wu and
                  Hongbo Li and
                  Zongmin Cui},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Fuzzy Keyword Search and Access Control over Ciphertexts in Cloud
                  Computing},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {248--265},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_13},
  doi          = {10.1007/978-3-319-60055-0\_13},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhuMWLC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2017-1,
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0},
  doi          = {10.1007/978-3-319-60055-0},
  isbn         = {978-3-319-60054-3},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/2017-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2017-2,
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3},
  doi          = {10.1007/978-3-319-59870-3},
  isbn         = {978-3-319-59869-7},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/2017-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/0008WLHT16,
  author       = {Wei Yu and
                  Kunpeng Wang and
                  Bao Li and
                  Xiaoyang He and
                  Song Tian},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Deterministic Encoding into Twisted Edwards Curves},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {285--297},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_18},
  doi          = {10.1007/978-3-319-40367-0\_18},
  timestamp    = {Thu, 08 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/0008WLHT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BagheriMS16,
  author       = {Nasour Bagheri and
                  Florian Mendel and
                  Yu Sasaki},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Improved Rebound Attacks on {AESQ:} Core Permutation of {CAESAR} Candidate
                  {PAEQ}},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {301--316},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_19},
  doi          = {10.1007/978-3-319-40367-0\_19},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/BagheriMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BoydC16,
  author       = {Colin Boyd and
                  Christopher Carr},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Fair Client Puzzles from the Bitcoin Blockchain},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9722},
  pages        = {161--177},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40253-6\_10},
  doi          = {10.1007/978-3-319-40253-6\_10},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BoydC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BunderNST16,
  author       = {Martin W. Bunder and
                  Abderrahmane Nitaj and
                  Willy Susilo and
                  Joseph Tonien},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {A New Attack on Three Variants of the {RSA} Cryptosystem},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {258--268},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_16},
  doi          = {10.1007/978-3-319-40367-0\_16},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BunderNST16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/CastiglioneSMPC16,
  author       = {Arcangelo Castiglione and
                  Alfredo De Santis and
                  Barbara Masucci and
                  Francesco Palmieri and
                  Aniello Castiglione},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {On the Relations Between Security Notions in Hierarchical Key Assignment
                  Schemes for Dynamic Structures},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {37--54},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_3},
  doi          = {10.1007/978-3-319-40367-0\_3},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/CastiglioneSMPC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChenLYXAT16,
  author       = {Wei Chen and
                  Xiapu Luo and
                  Chengyu Yin and
                  Bin Xiao and
                  Man Ho Au and
                  Yajuan Tang},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {{MUSE:} Towards Robust and Stealthy Mobile Botnets via Multiple Message
                  Push Services},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9722},
  pages        = {20--39},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40253-6\_2},
  doi          = {10.1007/978-3-319-40253-6\_2},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ChenLYXAT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChenMSYGZ16,
  author       = {Rongmao Chen and
                  Yi Mu and
                  Willy Susilo and
                  Guomin Yang and
                  Fuchun Guo and
                  Mingwu Zhang},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {One-Round Strong Oblivious Signature-Based Envelope},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {3--20},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_1},
  doi          = {10.1007/978-3-319-40367-0\_1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ChenMSYGZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChenTSSF16,
  author       = {Jiageng Chen and
                  Jesen Teh and
                  Chunhua Su and
                  Azman Samsudin and
                  Junbin Fang},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Improved (related-key) Attacks on Round-Reduced {KATAN-32/48/64} Based
                  on the Extended Boomerang Framework},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {333--346},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_21},
  doi          = {10.1007/978-3-319-40367-0\_21},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ChenTSSF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChengLD16,
  author       = {Yao Cheng and
                  Yingjiu Li and
                  Robert H. Deng},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {A Feasible No-Root Approach on Android},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {481--489},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_32},
  doi          = {10.1007/978-3-319-40367-0\_32},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ChengLD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChowSYPPB16,
  author       = {Yang{-}Wai Chow and
                  Willy Susilo and
                  Guomin Yang and
                  James G. Phillips and
                  Ilung Pranata and
                  Ari Moesriami Barmawi},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Exploiting the Error Correction Mechanism in {QR} Codes for Secret
                  Sharing},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9722},
  pages        = {409--425},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40253-6\_25},
  doi          = {10.1007/978-3-319-40253-6\_25},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ChowSYPPB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DuongPT16,
  author       = {Dung Hoang Duong and
                  Albrecht Petzoldt and
                  Tsuyoshi Takagi},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Reducing the Key Size of the {SRP} Encryption Scheme},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {427--434},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_27},
  doi          = {10.1007/978-3-319-40367-0\_27},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/DuongPT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DuttaNP16,
  author       = {Avijit Dutta and
                  Mridul Nandi and
                  Goutam Paul},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {One-Key Compression Function Based {MAC} with Security Beyond Birthday
                  Bound},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9722},
  pages        = {343--358},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40253-6\_21},
  doi          = {10.1007/978-3-319-40253-6\_21},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/DuttaNP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ForlerLLW16,
  author       = {Christian Forler and
                  Eik List and
                  Stefan Lucks and
                  Jakob Wenzel},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated
                  Encryption with Minimal Stretch},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {317--332},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_20},
  doi          = {10.1007/978-3-319-40367-0\_20},
  timestamp    = {Thu, 21 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ForlerLLW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GlennanLE16,
  author       = {Timothy Glennan and
                  Christopher Leckie and
                  Sarah M. Erfani},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Improved Classification of Known and Unknown Network Traffic Flows
                  Using Semi-supervised Machine Learning},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {493--501},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_33},
  doi          = {10.1007/978-3-319-40367-0\_33},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/GlennanLE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GosmanCDPC16,
  author       = {Catalin Gosman and
                  Tudor Cornea and
                  Ciprian Dobre and
                  Florin Pop and
                  Aniello Castiglione},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Putting the User in Control of the Intelligent Transportation System},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9722},
  pages        = {231--246},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40253-6\_14},
  doi          = {10.1007/978-3-319-40253-6\_14},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/GosmanCDPC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HeWAMD16,
  author       = {Kai He and
                  Jian Weng and
                  Man Ho Au and
                  Yijun Mao and
                  Robert H. Deng},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext
                  Security},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {207--222},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_13},
  doi          = {10.1007/978-3-319-40367-0\_13},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/HeWAMD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HorschS0B16,
  author       = {Moritz Horsch and
                  Mario Schlipf and
                  Johannes Braun and
                  Johannes Buchmann},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Password Requirements Markup Language},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9722},
  pages        = {426--439},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40253-6\_26},
  doi          = {10.1007/978-3-319-40253-6\_26},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/HorschS0B16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HouLL16,
  author       = {Lin Hou and
                  Junzuo Lai and
                  Lixian Liu},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Secret Handshakes with Dynamic Expressive Matching Policy},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9722},
  pages        = {461--476},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40253-6\_28},
  doi          = {10.1007/978-3-319-40253-6\_28},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HouLL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/JiaW16,
  author       = {Keting Jia and
                  Ning Wang},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Impossible Differential Cryptanalysis of 14-Round Camellia-192},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {363--378},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_23},
  doi          = {10.1007/978-3-319-40367-0\_23},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/JiaW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/JiangCWMSL16,
  author       = {Tao Jiang and
                  Xiaofeng Chen and
                  Qianhong Wu and
                  Jianfeng Ma and
                  Willy Susilo and
                  Wenjing Lou},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Towards Efficient Fully Randomized Message-Locked Encryption},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9722},
  pages        = {361--375},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40253-6\_22},
  doi          = {10.1007/978-3-319-40253-6\_22},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/JiangCWMSL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/JiangMGW16,
  author       = {Peng Jiang and
                  Yi Mu and
                  Fuchun Guo and
                  Qiaoyan Wen},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Public Key Encryption with Authorized Keyword Search},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {170--186},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_11},
  doi          = {10.1007/978-3-319-40367-0\_11},
  timestamp    = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/JiangMGW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/JiangSMG16,
  author       = {Yinhao Jiang and
                  Willy Susilo and
                  Yi Mu and
                  Fuchun Guo},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Ciphertext-Policy Attribute-Based Encryption with Key-Delegation Abuse
                  Resistance},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9722},
  pages        = {477--494},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40253-6\_29},
  doi          = {10.1007/978-3-319-40253-6\_29},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/JiangSMG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KutylowskiHK16,
  author       = {Miroslaw Kutylowski and
                  Lucjan Hanzlik and
                  Kamil Kluczniak},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Pseudonymous Signature on eIDAS Token - Implementation Based Privacy
                  Threats},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {467--477},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_31},
  doi          = {10.1007/978-3-319-40367-0\_31},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KutylowskiHK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LaiMGSC16,
  author       = {Jianchang Lai and
                  Yi Mu and
                  Fuchun Guo and
                  Willy Susilo and
                  Rongmao Chen},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Anonymous Identity-Based Broadcast Encryption with Revocation for
                  File Sharing},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {223--239},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_14},
  doi          = {10.1007/978-3-319-40367-0\_14},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LaiMGSC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LeeMLLGY16,
  author       = {Min Cherng Lee and
                  Robin Mitra and
                  Emmanuel Lazaridis and
                  An Chow Lai and
                  Yong Kheng Goh and
                  Wun{-}She Yap},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Statistical Disclosure Control for Data Privacy Using Sequence of
                  Generalised Linear Models},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9722},
  pages        = {77--93},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40253-6\_5},
  doi          = {10.1007/978-3-319-40253-6\_5},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/LeeMLLGY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiLLJJL16,
  author       = {Tong Li and
                  Zheli Liu and
                  Ping Li and
                  Chunfu Jia and
                  Zoe Lin Jiang and
                  Jin Li},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Verifiable Searchable Encryption with Aggregate Keys for Data Sharing
                  in Outsourcing Storage},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {153--169},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_10},
  doi          = {10.1007/978-3-319-40367-0\_10},
  timestamp    = {Wed, 24 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LiLLJJL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiW16,
  author       = {Zhen Li and
                  Wei Wu},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Reversible Data Hiding for Encrypted Images Based on Statistical Learning},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9722},
  pages        = {198--212},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40253-6\_12},
  doi          = {10.1007/978-3-319-40253-6\_12},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LiW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiangMS16,
  author       = {Kaitai Liang and
                  Atsuko Miyaji and
                  Chunhua Su},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Secure and Traceable Framework for Data Circulation},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9722},
  pages        = {376--388},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40253-6\_23},
  doi          = {10.1007/978-3-319-40253-6\_23},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LiangMS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LinL16,
  author       = {Xiaodong Lin and
                  Rongxing Lu},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Proxy Re-encryption with Delegatable Verifiability},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {120--133},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_8},
  doi          = {10.1007/978-3-319-40367-0\_8},
  timestamp    = {Tue, 21 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/LinL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiuGLX16,
  author       = {Zhe Liu and
                  Johann Gro{\ss}sch{\"{a}}dl and
                  Lin Li and
                  Qiuliang Xu},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Energy-Efficient Elliptic Curve Cryptography for MSP430-Based Wireless
                  Sensor Nodes},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9722},
  pages        = {94--112},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40253-6\_6},
  doi          = {10.1007/978-3-319-40253-6\_6},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LiuGLX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiuWCX16,
  author       = {Shigang Liu and
                  Yu Wang and
                  Chao Chen and
                  Yang Xiang},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {An Ensemble Learning Approach for Addressing the Class Imbalance Problem
                  in Twitter Spam Detection},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9722},
  pages        = {215--228},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40253-6\_13},
  doi          = {10.1007/978-3-319-40253-6\_13},
  timestamp    = {Fri, 26 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LiuWCX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Lu16,
  author       = {Jiqiang Lu},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {On the Security of the {LAC} Authenticated Encryption Algorithm},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {395--408},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_25},
  doi          = {10.1007/978-3-319-40367-0\_25},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Lu16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LuoRLHLWXW16,
  author       = {Xiling Luo and
                  Yili Ren and
                  Jingwen Liu and
                  Jiankun Hu and
                  Weiran Liu and
                  Zhen Wang and
                  Wei Xu and
                  Qianhong Wu},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Identity-Based Group Encryption},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {87--102},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_6},
  doi          = {10.1007/978-3-319-40367-0\_6},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LuoRLHLWXW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/McCorryMSH16,
  author       = {Patrick McCorry and
                  Malte M{\"{o}}ser and
                  Siamak Fayyaz Shahandashti and
                  Feng Hao},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Towards Bitcoin Payment Networks},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9722},
  pages        = {57--76},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40253-6\_4},
  doi          = {10.1007/978-3-319-40253-6\_4},
  timestamp    = {Mon, 12 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/McCorryMSH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Minematsu16,
  author       = {Kazuhiko Minematsu},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Authenticated Encryption with Small Stretch (or, How to Accelerate
                  {AERO)}},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {347--362},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_22},
  doi          = {10.1007/978-3-319-40367-0\_22},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Minematsu16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/NisbetW16,
  author       = {Alastair Nisbet and
                  Andrew Woodward},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {A Comparison Study of Wireless Network Security in Several Australasian
                  Cities and Suburbs},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9722},
  pages        = {115--127},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40253-6\_7},
  doi          = {10.1007/978-3-319-40253-6\_7},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/NisbetW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PanYZ16,
  author       = {Shiran Pan and
                  Shen Yan and
                  Wen Tao Zhu},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Security Analysis on Privacy-Preserving Cloud Aided Biometric Identification
                  Schemes},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {446--453},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_29},
  doi          = {10.1007/978-3-319-40367-0\_29},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PanYZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PangYO16,
  author       = {Ying{-}Han Pang and
                  Khor Ean Yee and
                  Shih Yin Ooi},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Biometric Access Control with High Dimensional Facial Features},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {437--445},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_28},
  doi          = {10.1007/978-3-319-40367-0\_28},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PangYO16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ParraCH16,
  author       = {Jhordany Rodriguez Parra and
                  Terence Chan and
                  Siu{-}Wai Ho},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {A Noiseless Key-Homomorphic {PRF:} Application on Distributed Storage
                  Systems},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {505--513},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_34},
  doi          = {10.1007/978-3-319-40367-0\_34},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ParraCH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PhuongYSL16,
  author       = {Tran Viet Xuan Phuong and
                  Guomin Yang and
                  Willy Susilo and
                  Kaitai Liang},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Edit Distance Based Encryption and Its Application},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {103--119},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_7},
  doi          = {10.1007/978-3-319-40367-0\_7},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PhuongYSL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/QinCW16,
  author       = {Lingyue Qin and
                  Huaifeng Chen and
                  Xiaoyun Wang},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-Guessing
                  Techniques},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {409--424},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_26},
  doi          = {10.1007/978-3-319-40367-0\_26},
  timestamp    = {Mon, 25 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/QinCW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Rudolph16,
  author       = {Carsten Rudolph},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Exploring the Space of Digital Evidence - Position Paper},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9722},
  pages        = {249--262},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40253-6\_15},
  doi          = {10.1007/978-3-319-40253-6\_15},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Rudolph16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SongHY16,
  author       = {Ling Song and
                  Zhangjie Huang and
                  Qianqian Yang},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Automatic Differential Analysis of {ARX} Block Ciphers with Application
                  to {SPECK} and {LEA}},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {379--394},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_24},
  doi          = {10.1007/978-3-319-40367-0\_24},
  timestamp    = {Sun, 18 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/SongHY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SongKH16,
  author       = {Youngbae Song and
                  Hyoungshick Kim and
                  Jun Ho Huh},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {On the Guessability of Resident Registration Numbers in South Korea},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9722},
  pages        = {128--138},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40253-6\_8},
  doi          = {10.1007/978-3-319-40253-6\_8},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SongKH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SunPYYG16,
  author       = {Shifeng Sun and
                  Udaya Parampalli and
                  Tsz Hon Yuen and
                  Yu Yu and
                  Dawu Gu},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Efficient Completely Non-Malleable and {RKA} Secure Public Key Encryptions},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {134--150},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_9},
  doi          = {10.1007/978-3-319-40367-0\_9},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/SunPYYG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SunWLLHQH16,
  author       = {Yang Sun and
                  Qianhong Wu and
                  Jingwen Liu and
                  Jianwei Liu and
                  Xinyi Huang and
                  Bo Qin and
                  Wei Hu},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Accelerating Oblivious Transfer with Batch Multi-exponentiation},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9722},
  pages        = {310--326},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40253-6\_19},
  doi          = {10.1007/978-3-319-40253-6\_19},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SunWLLHQH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SunYLZQZ16,
  author       = {Yujuan Sun and
                  Yu Yu and
                  Xiangxue Li and
                  Kai Zhang and
                  Haifeng Qian and
                  Yuan Zhou},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Batch Verifiable Computation with Public Verifiability for Outsourcing
                  Polynomials and Matrix Computations},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9722},
  pages        = {293--309},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40253-6\_18},
  doi          = {10.1007/978-3-319-40253-6\_18},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/SunYLZQZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TakayasuK16,
  author       = {Atsushi Takayasu and
                  Noboru Kunihiro},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Partial Key Exposure Attacks on {RSA} with Multiple Exponent Pairs},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {243--257},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_15},
  doi          = {10.1007/978-3-319-40367-0\_15},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/TakayasuK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TangLS16,
  author       = {Shaohua Tang and
                  Bo Lv and
                  Wuqiang Shen},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Hybrid {MQ} Signature for Embedded Device},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9722},
  pages        = {281--290},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40253-6\_17},
  doi          = {10.1007/978-3-319-40253-6\_17},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/TangLS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WangHYCWF16,
  author       = {Jingxuan Wang and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu and
                  Xingmin Cui and
                  Eric Ke Wang and
                  Jun{-}bin Fang},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {A Survey on the Cyber Attacks Against Non-linear State Estimation
                  in Smart Grids},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9722},
  pages        = {40--56},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40253-6\_3},
  doi          = {10.1007/978-3-319-40253-6\_3},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WangHYCWF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WangM16,
  author       = {Xiaofen Wang and
                  Yi Mu},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Content-Based Encryption},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {57--72},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_4},
  doi          = {10.1007/978-3-319-40367-0\_4},
  timestamp    = {Mon, 24 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WangM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/XiaYXH16,
  author       = {Zhe Xia and
                  Xiaoyun Yang and
                  Min Xiao and
                  Debiao He},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Provably Secure Threshold Paillier Encryption Based on Hyperplane
                  Geometry},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {73--86},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_5},
  doi          = {10.1007/978-3-319-40367-0\_5},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/XiaYXH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/XuMYZT16,
  author       = {Rui Xu and
                  Kirill Morozov and
                  Yanjiang Yang and
                  Jianying Zhou and
                  Tsuyoshi Takagi},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Privacy-Preserving k-Nearest Neighbour Query on Outsourced Database},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9722},
  pages        = {181--197},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40253-6\_11},
  doi          = {10.1007/978-3-319-40253-6\_11},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/XuMYZT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/XuYMM16,
  author       = {Shengmin Xu and
                  Guomin Yang and
                  Yi Mu and
                  Sha Ma},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Proxy Signature with Revocation},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {21--36},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_2},
  doi          = {10.1007/978-3-319-40367-0\_2},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/XuYMM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YamakawaHK16,
  author       = {Takashi Yamakawa and
                  Goichiro Hanaoka and
                  Noboru Kunihiro},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Generalized Hardness Assumption for Self-bilinear Map with Auxiliary
                  Information},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {269--284},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_17},
  doi          = {10.1007/978-3-319-40367-0\_17},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YamakawaHK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YanPZZ16,
  author       = {Shen Yan and
                  Shiran Pan and
                  Yuhang Zhao and
                  Wen Tao Zhu},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Towards Privacy-Preserving Data Mining in Online Social Networks:
                  Distance-Grained and Item-Grained Differential Privacy},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9722},
  pages        = {141--157},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40253-6\_9},
  doi          = {10.1007/978-3-319-40253-6\_9},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YanPZZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YangCWLC16,
  author       = {Yanjiang Yang and
                  Haibin Cai and
                  Zhuo Wei and
                  Haibing Lu and
                  Kim{-}Kwang Raymond Choo},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Towards Lightweight Anonymous Entity Authentication for IoT Applications},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9722},
  pages        = {265--280},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40253-6\_16},
  doi          = {10.1007/978-3-319-40253-6\_16},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YangCWLC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YangXC16,
  author       = {Min Yang and
                  Fei Xu and
                  Kam{-}Pui Chow},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Interest Profiling for Security Monitoring and Forensic Investigation},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {457--464},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_30},
  doi          = {10.1007/978-3-319-40367-0\_30},
  timestamp    = {Fri, 26 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/YangXC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YiYFHS16,
  author       = {Xun Yi and
                  Xuechao Yang and
                  Yong Feng and
                  Fengling Han and
                  Ron G. van Schyndel},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {CTM-sp: {A} Family of Cryptographic Hash Functions from Chaotic Tent
                  Maps},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9722},
  pages        = {329--342},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40253-6\_20},
  doi          = {10.1007/978-3-319-40253-6\_20},
  timestamp    = {Fri, 03 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YiYFHS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YuAXYH16,
  author       = {Zuoxia Yu and
                  Man Ho Au and
                  Qiuliang Xu and
                  Rupeng Yang and
                  Jinguang Han},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Leakage-Resilient Functional Encryption via Pair Encodings},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9722},
  pages        = {443--460},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40253-6\_27},
  doi          = {10.1007/978-3-319-40253-6\_27},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YuAXYH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YuLASCZ16,
  author       = {Yong Yu and
                  Yannan Li and
                  Man Ho Au and
                  Willy Susilo and
                  Kim{-}Kwang Raymond Choo and
                  Xinpeng Zhang},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Public Cloud Data Auditing with Practical Key Update and Zero Knowledge
                  Privacy},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9722},
  pages        = {389--405},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40253-6\_24},
  doi          = {10.1007/978-3-319-40253-6\_24},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/YuLASCZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhangCLWW16,
  author       = {Peng Zhang and
                  Zehong Chen and
                  Kaitai Liang and
                  Shulan Wang and
                  Ting Wang},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {A Cloud-Based Access Control Scheme with User Revocation and Attribute
                  Update},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9722},
  pages        = {525--540},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40253-6\_32},
  doi          = {10.1007/978-3-319-40253-6\_32},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhangCLWW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhangLZ0016,
  author       = {Yinghui Zhang and
                  Jin Li and
                  Dong Zheng and
                  Xiaofeng Chen and
                  Hui Li},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Accountable Large-Universe Attribute-Based Encryption Supporting Any
                  Monotone Access Structures},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9722},
  pages        = {509--524},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40253-6\_31},
  doi          = {10.1007/978-3-319-40253-6\_31},
  timestamp    = {Wed, 15 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhangLZ0016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhangYM16,
  author       = {Shiwei Zhang and
                  Guomin Yang and
                  Yi Mu},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Linear Encryption with Keyword Search},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {187--203},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_12},
  doi          = {10.1007/978-3-319-40367-0\_12},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhangYM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhaoLBMZQA16,
  author       = {Shuang Zhao and
                  Xiapu Luo and
                  Bo Bai and
                  Xiaobo Ma and
                  Wei Zou and
                  Xinliang Qiu and
                  Man Ho Au},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {I Know Where You All Are! Exploiting Mobile Social Apps for Large-Scale
                  Location Privacy Probing},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9722},
  pages        = {3--19},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40253-6\_1},
  doi          = {10.1007/978-3-319-40253-6\_1},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhaoLBMZQA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZuoSWXJ16,
  author       = {Cong Zuo and
                  Jun Shao and
                  Guiyi Wei and
                  Mande Xie and
                  Min Ji},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Chosen Ciphertext Secure Attribute-Based Encryption with Outsourced
                  Decryption},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9722},
  pages        = {495--508},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40253-6\_30},
  doi          = {10.1007/978-3-319-40253-6\_30},
  timestamp    = {Tue, 02 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ZuoSWXJ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2016-1,
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9722},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40253-6},
  doi          = {10.1007/978-3-319-40253-6},
  isbn         = {978-3-319-40252-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/2016-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2016-2,
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0},
  doi          = {10.1007/978-3-319-40367-0},
  isbn         = {978-3-319-40366-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/2016-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AgrawalCS15,
  author       = {Megha Agrawal and
                  Donghoon Chang and
                  Somitra Sanadhya},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {sp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained
                  Devices},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {451--468},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_26},
  doi          = {10.1007/978-3-319-19962-7\_26},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/AgrawalCS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AlissaRDS15,
  author       = {Khalid Alissa and
                  Jason Reid and
                  Ed Dawson and
                  Farzad Salim},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {{BP-XACML} an Authorisation Policy Language for Business Processes},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {307--325},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_18},
  doi          = {10.1007/978-3-319-19962-7\_18},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/AlissaRDS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AvoineBC15,
  author       = {Gildas Avoine and
                  Adrien Bourgeois and
                  Xavier Carpent},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Analysis of Rainbow Tables with Fingerprints},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {356--374},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_21},
  doi          = {10.1007/978-3-319-19962-7\_21},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/AvoineBC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BansalCS15,
  author       = {Tarun Kumar Bansal and
                  Donghoon Chang and
                  Somitra Kumar Sanadhya},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Sponge Based {CCA2} Secure Asymmetric Encryption for Arbitrary Length
                  Message},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {93--106},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_6},
  doi          = {10.1007/978-3-319-19962-7\_6},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BansalCS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BernsteinHLN15,
  author       = {Daniel J. Bernstein and
                  Andreas H{\"{u}}lsing and
                  Tanja Lange and
                  Ruben Niederhagen},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Bad Directions in Cryptographic Hash Functions},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {488--508},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_28},
  doi          = {10.1007/978-3-319-19962-7\_28},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/BernsteinHLN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Bose0R15,
  author       = {Priyanka Bose and
                  Dipanjan Das and
                  Chandrasekaran Pandu Rangan},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Constant Size Ring Signature Without Random Oracle},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {230--247},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_14},
  doi          = {10.1007/978-3-319-19962-7\_14},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Bose0R15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChenMYGW15,
  author       = {Rongmao Chen and
                  Yi Mu and
                  Guomin Yang and
                  Fuchun Guo and
                  Xiaofen Wang},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {A New General Framework for Secure Public Key Encryption with Keyword
                  Search},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {59--76},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_4},
  doi          = {10.1007/978-3-319-19962-7\_4},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ChenMYGW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DattaY15,
  author       = {Nilanjan Datta and
                  Kan Yasuda},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Generalizing {PMAC} Under Weaker Assumptions},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {433--450},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_25},
  doi          = {10.1007/978-3-319-19962-7\_25},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/DattaY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DowlingS15,
  author       = {Benjamin Dowling and
                  Douglas Stebila},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Modelling Ciphersuite and Version Negotiation in the {TLS} Protocol},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {270--288},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_16},
  doi          = {10.1007/978-3-319-19962-7\_16},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/DowlingS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/EgertFGJST15,
  author       = {Rolf Egert and
                  Marc Fischlin and
                  David Gens and
                  Sven Jacob and
                  Matthias Senker and
                  J{\"{o}}rn Tillmanns},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Privately Computing Set-Union and Set-Intersection Cardinality via
                  Bloom Filters},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {413--430},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_24},
  doi          = {10.1007/978-3-319-19962-7\_24},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/EgertFGJST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/FengMYL15,
  author       = {Yiteng Feng and
                  Yi Mu and
                  Guomin Yang and
                  Joseph K. Liu},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {A New Public Remote Integrity Checking Scheme with User Privacy},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {377--394},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_22},
  doi          = {10.1007/978-3-319-19962-7\_22},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/FengMYL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GhoshSSC15,
  author       = {Shamit Ghosh and
                  Dhiman Saha and
                  Abhrajit Sengupta and
                  Dipanwita Roy Chowdhury},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Preventing Fault Attacks Using Fault Randomization with a Case Study
                  on {AES}},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {343--355},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_20},
  doi          = {10.1007/978-3-319-19962-7\_20},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/GhoshSSC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GrittiSP15,
  author       = {Cl{\'{e}}mentine Gritti and
                  Willy Susilo and
                  Thomas Plantard},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Efficient Dynamic Provable Data Possession with Public Verifiability
                  and Data Privacy},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {395--412},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_23},
  doi          = {10.1007/978-3-319-19962-7\_23},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/GrittiSP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GuntherP15,
  author       = {Felix G{\"{u}}nther and
                  Bertram Poettering},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Linkable Message Tagging: Solving the Key Distribution Problem of
                  Signature Schemes},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {195--212},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_12},
  doi          = {10.1007/978-3-319-19962-7\_12},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/GuntherP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/IshidaWS15,
  author       = {Yuu Ishida and
                  Yohei Watanabe and
                  Junji Shikata},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Constructions of CCA-Secure Revocable Identity-Based Encryption},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {174--191},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_11},
  doi          = {10.1007/978-3-319-19962-7\_11},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/IshidaWS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ItoM15,
  author       = {Ryoma Ito and
                  Atsuko Miyaji},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {How {TKIP} Induces Biases of Internal States of Generic {RC4}},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {329--342},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_19},
  doi          = {10.1007/978-3-319-19962-7\_19},
  timestamp    = {Mon, 26 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ItoM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KurosawaP15,
  author       = {Kaoru Kurosawa and
                  Le Trieu Phong},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {{IBE} Under k k -LIN with Shorter Ciphertexts and Private Keys},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {145--159},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_9},
  doi          = {10.1007/978-3-319-19962-7\_9},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KurosawaP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LaiMGS15,
  author       = {Jianchang Lai and
                  Yi Mu and
                  Fuchun Guo and
                  Willy Susilo},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Improved Identity-Based Online/Offline Encryption},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {160--173},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_10},
  doi          = {10.1007/978-3-319-19962-7\_10},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LaiMGS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MaLHL15,
  author       = {Bingke Ma and
                  Bao Li and
                  Ronglin Hao and
                  Xiaoqian Li},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Cryptanalysis of Reduced-Round Whirlwind},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {20--38},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_2},
  doi          = {10.1007/978-3-319-19962-7\_2},
  timestamp    = {Thu, 08 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MaLHL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/NegreP15,
  author       = {Christophe N{\`{e}}gre and
                  Guilherme Perin},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Trade-Off Approaches for Leak Resistant Modular Arithmetic in {RNS}},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {107--124},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_7},
  doi          = {10.1007/978-3-319-19962-7\_7},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/NegreP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SakaiESHO15,
  author       = {Yusuke Sakai and
                  Keita Emura and
                  Jacob C. N. Schuldt and
                  Goichiro Hanaoka and
                  Kazuo Ohta},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Dynamic Threshold Public-Key Encryption with Decryption Consistency
                  from Static Assumptions},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {77--92},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_5},
  doi          = {10.1007/978-3-319-19962-7\_5},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SakaiESHO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SunWZ15,
  author       = {Zhelei Sun and
                  Peng Wang and
                  Liting Zhang},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering
                  Schemes},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {3--19},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_1},
  doi          = {10.1007/978-3-319-19962-7\_1},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SunWZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Tang15,
  author       = {Qiang Tang},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Towards Forward Security Properties for {PEKS} and {IBE}},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {127--144},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_8},
  doi          = {10.1007/978-3-319-19962-7\_8},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Tang15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TaoW15,
  author       = {Biaoshuai Tao and
                  Hongjun Wu},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Improving the Biclique Cryptanalysis of {AES}},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {39--56},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_3},
  doi          = {10.1007/978-3-319-19962-7\_3},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/TaoW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TrethowenAMW15,
  author       = {Leliel Trethowen and
                  Craig Anslow and
                  Stuart Marshall and
                  Ian Welch},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {VisRAID: Visualizing Remote Access for Intrusion Detection},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {289--306},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_17},
  doi          = {10.1007/978-3-319-19962-7\_17},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/TrethowenAMW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WangT15,
  author       = {Yuyu Wang and
                  Keisuke Tanaka},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Generic Transformation to Strongly Existentially Unforgeable Signature
                  Schemes with Continuous Leakage Resiliency},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {213--229},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_13},
  doi          = {10.1007/978-3-319-19962-7\_13},
  timestamp    = {Mon, 21 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WangT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YasudaSKYK15,
  author       = {Masaya Yasuda and
                  Takeshi Shimoyama and
                  Jun Kogure and
                  Kazuhiro Yokoyama and
                  Takeshi Koshiba},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Secure Statistical Analysis Using RLWE-Based Homomorphic Encryption},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {471--487},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_27},
  doi          = {10.1007/978-3-319-19962-7\_27},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/YasudaSKYK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhangLH15,
  author       = {Tingting Zhang and
                  Hongda Li and
                  Guifang Huang},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Constant-Round Leakage-Resilient Zero-Knowledge Argument for {NP}
                  from the Knowledge-of-Exponent Assumption},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {251--269},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_15},
  doi          = {10.1007/978-3-319-19962-7\_15},
  timestamp    = {Mon, 12 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhangLH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2015,
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7},
  doi          = {10.1007/978-3-319-19962-7},
  isbn         = {978-3-319-19961-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/2015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AlawatugodaBS14,
  author       = {Janaka Alawatugoda and
                  Colin Boyd and
                  Douglas Stebila},
  editor       = {Willy Susilo and
                  Yi Mu},
  title        = {Continuous After-the-Fact Leakage-Resilient Key Exchange},
  booktitle    = {Information Security and Privacy - 19th Australasian Conference, {ACISP}
                  2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8544},
  pages        = {258--273},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08344-5\_17},
  doi          = {10.1007/978-3-319-08344-5\_17},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/AlawatugodaBS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AlneyadiSM14,
  author       = {Sultan Alneyadi and
                  Elankayer Sithirasenan and
                  Vallipuram Muthukkumarasamy},
  editor       = {Willy Susilo and
                  Yi Mu},
  title        = {A Semantics-Aware Classification Approach for Data Leakage Prevention},
  booktitle    = {Information Security and Privacy - 19th Australasian Conference, {ACISP}
                  2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8544},
  pages        = {413--421},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08344-5\_27},
  doi          = {10.1007/978-3-319-08344-5\_27},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/AlneyadiSM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BaiG14,
  author       = {Shi Bai and
                  Steven D. Galbraith},
  editor       = {Willy Susilo and
                  Yi Mu},
  title        = {Lattice Decoding Attacks on Binary {LWE}},
  booktitle    = {Information Security and Privacy - 19th Australasian Conference, {ACISP}
                  2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8544},
  pages        = {322--337},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08344-5\_21},
  doi          = {10.1007/978-3-319-08344-5\_21},
  timestamp    = {Tue, 30 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BaiG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Banik14,
  author       = {Subhadeep Banik},
  editor       = {Willy Susilo and
                  Yi Mu},
  title        = {Some Insights into Differential Cryptanalysis of Grain v1},
  booktitle    = {Information Security and Privacy - 19th Australasian Conference, {ACISP}
                  2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8544},
  pages        = {34--49},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08344-5\_3},
  doi          = {10.1007/978-3-319-08344-5\_3},
  timestamp    = {Mon, 29 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Banik14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChenHZ14,
  author       = {Yu Chen and
                  Qiong Huang and
                  Zongyang Zhang},
  editor       = {Willy Susilo and
                  Yi Mu},
  title        = {Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange
                  Scheme, Revisited},
  booktitle    = {Information Security and Privacy - 19th Australasian Conference, {ACISP}
                  2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8544},
  pages        = {274--289},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08344-5\_18},
  doi          = {10.1007/978-3-319-08344-5\_18},
  timestamp    = {Wed, 20 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ChenHZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/CuiYCHYQ14,
  author       = {Xingmin Cui and
                  Da Yu and
                  Patrick P. F. Chan and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu and
                  Sihan Qing},
  editor       = {Willy Susilo and
                  Yi Mu},
  title        = {CoChecker: Detecting Capability and Sensitive Data Leaks from Component
                  Chains in Android},
  booktitle    = {Information Security and Privacy - 19th Australasian Conference, {ACISP}
                  2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8544},
  pages        = {446--453},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08344-5\_31},
  doi          = {10.1007/978-3-319-08344-5\_31},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/CuiYCHYQ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DattaDM14,
  author       = {Pratish Datta and
                  Ratna Dutta and
                  Sourav Mukhopadhyay},
  editor       = {Willy Susilo and
                  Yi Mu},
  title        = {Universally Composable Efficient Priced Oblivious Transfer from a
                  Flexible Membership Encryption},
  booktitle    = {Information Security and Privacy - 19th Australasian Conference, {ACISP}
                  2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8544},
  pages        = {98--114},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08344-5\_7},
  doi          = {10.1007/978-3-319-08344-5\_7},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/DattaDM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DattaN14,
  author       = {Nilanjan Datta and
                  Mridul Nandi},
  editor       = {Willy Susilo and
                  Yi Mu},
  title        = {ELmE: {A} Misuse Resistant Parallel Authenticated Encryption},
  booktitle    = {Information Security and Privacy - 19th Australasian Conference, {ACISP}
                  2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8544},
  pages        = {306--321},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08344-5\_20},
  doi          = {10.1007/978-3-319-08344-5\_20},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/DattaN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DingGSWG14,
  author       = {Zhaojing Ding and
                  Wei Guo and
                  Liangjian Su and
                  Jizeng Wei and
                  Haihua Gu},
  editor       = {Willy Susilo and
                  Yi Mu},
  title        = {Further Research on {N-1} Attack against Exponentiation Algorithms},
  booktitle    = {Information Security and Privacy - 19th Australasian Conference, {ACISP}
                  2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8544},
  pages        = {162--175},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08344-5\_11},
  doi          = {10.1007/978-3-319-08344-5\_11},
  timestamp    = {Sun, 27 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/DingGSWG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/FukumitsuHIS14,
  author       = {Masayuki Fukumitsu and
                  Shingo Hasegawa and
                  Shuji Isobe and
                  Hiroki Shizuya},
  editor       = {Willy Susilo and
                  Yi Mu},
  title        = {On the Impossibility of Proving Security of Strong-RSA Signatures
                  via the {RSA} Assumption},
  booktitle    = {Information Security and Privacy - 19th Australasian Conference, {ACISP}
                  2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8544},
  pages        = {290--305},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08344-5\_19},
  doi          = {10.1007/978-3-319-08344-5\_19},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/FukumitsuHIS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KhanM14,
  author       = {Mohammed Shafiul Alam Khan and
                  Chris J. Mitchell},
  editor       = {Willy Susilo and
                  Yi Mu},
  title        = {Another Look at Privacy Threats in 3G Mobile Telephony},
  booktitle    = {Information Security and Privacy - 19th Australasian Conference, {ACISP}
                  2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8544},
  pages        = {386--396},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08344-5\_25},
  doi          = {10.1007/978-3-319-08344-5\_25},
  timestamp    = {Mon, 29 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KhanM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiuCL14,
  author       = {Liang Liu and
                  Xiaofeng Chen and
                  Wenjing Lou},
  editor       = {Willy Susilo and
                  Yi Mu},
  title        = {A Secure Three-Party Computational Protocol for Triangle Area},
  booktitle    = {Information Security and Privacy - 19th Australasian Conference, {ACISP}
                  2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8544},
  pages        = {82--97},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08344-5\_6},
  doi          = {10.1007/978-3-319-08344-5\_6},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LiuCL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiuLCYJ14,
  author       = {Zheli Liu and
                  Jin Li and
                  Xiaofeng Chen and
                  Jun Yang and
                  Chunfu Jia},
  editor       = {Willy Susilo and
                  Yi Mu},
  title        = {{TMDS:} Thin-Model Data Sharing Scheme Supporting Keyword Search in
                  Cloud Storage},
  booktitle    = {Information Security and Privacy - 19th Australasian Conference, {ACISP}
                  2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8544},
  pages        = {115--130},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08344-5\_8},
  doi          = {10.1007/978-3-319-08344-5\_8},
  timestamp    = {Tue, 26 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/LiuLCYJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiuLWQ14,
  author       = {Weiran Liu and
                  Jianwei Liu and
                  Qianhong Wu and
                  Bo Qin},
  editor       = {Willy Susilo and
                  Yi Mu},
  title        = {Hierarchical Identity-Based Broadcast Encryption},
  booktitle    = {Information Security and Privacy - 19th Australasian Conference, {ACISP}
                  2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8544},
  pages        = {242--257},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08344-5\_16},
  doi          = {10.1007/978-3-319-08344-5\_16},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/LiuLWQ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PanD14,
  author       = {Yanbin Pan and
                  Yingpu Deng},
  editor       = {Willy Susilo and
                  Yi Mu},
  title        = {A New Attack against the Selvi-Vivek-Rangan Deterministic Identity
                  Based Signature Scheme from {ACISP} 2012},
  booktitle    = {Information Security and Privacy - 19th Australasian Conference, {ACISP}
                  2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8544},
  pages        = {148--161},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08344-5\_10},
  doi          = {10.1007/978-3-319-08344-5\_10},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PanD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/RahulamathavanMBSR14,
  author       = {Yogachandran Rahulamathavan and
                  Veelasha Moonsamy and
                  Lynn Margaret Batten and
                  Su Shunliang and
                  Muttukrishnan Rajarajan},
  editor       = {Willy Susilo and
                  Yi Mu},
  title        = {An Analysis of Tracking Settings in Blackberry 10 and Windows Phone
                  8 Smartphones},
  booktitle    = {Information Security and Privacy - 19th Australasian Conference, {ACISP}
                  2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8544},
  pages        = {430--437},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08344-5\_29},
  doi          = {10.1007/978-3-319-08344-5\_29},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/RahulamathavanMBSR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/RaoD14,
  author       = {Y. Sreenivasa Rao and
                  Ratna Dutta},
  editor       = {Willy Susilo and
                  Yi Mu},
  title        = {Expressive Bandwidth-Efficient Attribute Based Signature and Signcryption
                  in Standard Model},
  booktitle    = {Information Security and Privacy - 19th Australasian Conference, {ACISP}
                  2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8544},
  pages        = {209--225},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08344-5\_14},
  doi          = {10.1007/978-3-319-08344-5\_14},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/RaoD14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SusilSV14,
  author       = {Petr Susil and
                  Pouyan Sepehrdad and
                  Serge Vaudenay},
  editor       = {Willy Susilo and
                  Yi Mu},
  title        = {On Selection of Samples in Algebraic Attacks and a New Technique to
                  Find Hidden Low Degree Equations},
  booktitle    = {Information Security and Privacy - 19th Australasian Conference, {ACISP}
                  2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8544},
  pages        = {50--65},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08344-5\_4},
  doi          = {10.1007/978-3-319-08344-5\_4},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SusilSV14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TagaMA14,
  author       = {Bungo Taga and
                  Shiho Moriai and
                  Kazumaro Aoki},
  editor       = {Willy Susilo and
                  Yi Mu},
  title        = {Differential and Impossible Differential Related-Key Attacks on Hierocrypt-L1},
  booktitle    = {Information Security and Privacy - 19th Australasian Conference, {ACISP}
                  2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8544},
  pages        = {17--33},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08344-5\_2},
  doi          = {10.1007/978-3-319-08344-5\_2},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/TagaMA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TakayasuK14,
  author       = {Atsushi Takayasu and
                  Noboru Kunihiro},
  editor       = {Willy Susilo and
                  Yi Mu},
  title        = {Cryptanalysis of {RSA} with Multiple Small Secret Exponents},
  booktitle    = {Information Security and Privacy - 19th Australasian Conference, {ACISP}
                  2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8544},
  pages        = {176--191},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08344-5\_12},
  doi          = {10.1007/978-3-319-08344-5\_12},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/TakayasuK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/VejreB14,
  author       = {Philip S. Vejre and
                  Andrey Bogdanov},
  editor       = {Willy Susilo and
                  Yi Mu},
  title        = {Route 66: Passively Breaking All {GSM} Channels},
  booktitle    = {Information Security and Privacy - 19th Australasian Conference, {ACISP}
                  2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8544},
  pages        = {422--429},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08344-5\_28},
  doi          = {10.1007/978-3-319-08344-5\_28},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/VejreB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WangFQSXC14,
  author       = {Weijin Wang and
                  Dengguo Feng and
                  Yu Qin and
                  Jianxiong Shao and
                  Li Xi and
                  XiaoBo Chu},
  editor       = {Willy Susilo and
                  Yi Mu},
  title        = {ExBLACR: Extending {BLACR} System},
  booktitle    = {Information Security and Privacy - 19th Australasian Conference, {ACISP}
                  2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8544},
  pages        = {397--412},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08344-5\_26},
  doi          = {10.1007/978-3-319-08344-5\_26},
  timestamp    = {Mon, 29 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WangFQSXC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WangT14,
  author       = {Yuyu Wang and
                  Keisuke Tanaka},
  editor       = {Willy Susilo and
                  Yi Mu},
  title        = {Strongly Simulation-Extractable Leakage-Resilient {NIZK}},
  booktitle    = {Information Security and Privacy - 19th Australasian Conference, {ACISP}
                  2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8544},
  pages        = {66--81},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08344-5\_5},
  doi          = {10.1007/978-3-319-08344-5\_5},
  timestamp    = {Mon, 21 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WangT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WangW14,
  author       = {Yanfeng Wang and
                  Wenling Wu},
  editor       = {Willy Susilo and
                  Yi Mu},
  title        = {Improved Multidimensional Zero-Correlation Linear Cryptanalysis and
                  Applications to LBlock and {TWINE}},
  booktitle    = {Information Security and Privacy - 19th Australasian Conference, {ACISP}
                  2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8544},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08344-5\_1},
  doi          = {10.1007/978-3-319-08344-5\_1},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WangW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WenW14,
  author       = {Long Wen and
                  Meiqin Wang},
  editor       = {Willy Susilo and
                  Yi Mu},
  title        = {Integral Zero-Correlation Distinguisher for {ARX} Block Cipher, with
                  Application to {SHACAL-2}},
  booktitle    = {Information Security and Privacy - 19th Australasian Conference, {ACISP}
                  2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8544},
  pages        = {454--461},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08344-5\_32},
  doi          = {10.1007/978-3-319-08344-5\_32},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WenW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YamamotoSF14,
  author       = {Dan Yamamoto and
                  Hisayoshi Sato and
                  Yasuko Fukuzawa},
  editor       = {Willy Susilo and
                  Yi Mu},
  title        = {Incrementally Executable Signcryptions},
  booktitle    = {Information Security and Privacy - 19th Australasian Conference, {ACISP}
                  2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8544},
  pages        = {226--241},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08344-5\_15},
  doi          = {10.1007/978-3-319-08344-5\_15},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YamamotoSF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YasudaSKYK14,
  author       = {Masaya Yasuda and
                  Takeshi Shimoyama and
                  Jun Kogure and
                  Kazuhiro Yokoyama and
                  Takeshi Koshiba},
  editor       = {Willy Susilo and
                  Yi Mu},
  title        = {Privacy-Preserving Wildcards Pattern Matching Using Symmetric Somewhat
                  Homomorphic Encryption},
  booktitle    = {Information Security and Privacy - 19th Australasian Conference, {ACISP}
                  2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8544},
  pages        = {338--353},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08344-5\_22},
  doi          = {10.1007/978-3-319-08344-5\_22},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/YasudaSKYK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Zhang14,
  author       = {Mingwu Zhang},
  editor       = {Willy Susilo and
                  Yi Mu},
  title        = {New Model and Construction of {ABE:} Achieving Key Resilient-Leakage
                  and Attribute Direct-Revocation},
  booktitle    = {Information Security and Privacy - 19th Australasian Conference, {ACISP}
                  2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8544},
  pages        = {192--208},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08344-5\_13},
  doi          = {10.1007/978-3-319-08344-5\_13},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Zhang14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhangLLXJ14,
  author       = {Qinglong Zhang and
                  Zongbin Liu and
                  Miao Li and
                  Ji Xiang and
                  Jiwu Jing},
  editor       = {Willy Susilo and
                  Yi Mu},
  title        = {A High-Throughput Unrolled {ZUC} Core for 100Gbps Data Transmission},
  booktitle    = {Information Security and Privacy - 19th Australasian Conference, {ACISP}
                  2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8544},
  pages        = {370--385},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08344-5\_24},
  doi          = {10.1007/978-3-319-08344-5\_24},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhangLLXJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhangWJWL14,
  author       = {Zhongwen Zhang and
                  Yuewu Wang and
                  Jiwu Jing and
                  Qiongxiao Wang and
                  Lingguang Lei},
  editor       = {Willy Susilo and
                  Yi Mu},
  title        = {Once Root Always a Threat: Analyzing the Security Threats of Android
                  Permission System},
  booktitle    = {Information Security and Privacy - 19th Australasian Conference, {ACISP}
                  2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8544},
  pages        = {354--369},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08344-5\_23},
  doi          = {10.1007/978-3-319-08344-5\_23},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhangWJWL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhangZCS14,
  author       = {Zhijiao Zhang and
                  Lei Zhang and
                  Yu Chen and
                  Yuanchun Shi},
  editor       = {Willy Susilo and
                  Yi Mu},
  title        = {Running Multiple Androids on One {ARM} Platform},
  booktitle    = {Information Security and Privacy - 19th Australasian Conference, {ACISP}
                  2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8544},
  pages        = {438--445},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08344-5\_30},
  doi          = {10.1007/978-3-319-08344-5\_30},
  timestamp    = {Thu, 10 Aug 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhangZCS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhongWZW14,
  author       = {Xiao Zhong and
                  Mingsheng Wang and
                  Bin Zhang and
                  Shengbao Wu},
  editor       = {Willy Susilo and
                  Yi Mu},
  title        = {Low Data Complexity Inversion Attacks on Stream Ciphers via Truncated
                  Compressed Preimage Sets},
  booktitle    = {Information Security and Privacy - 19th Australasian Conference, {ACISP}
                  2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8544},
  pages        = {131--147},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08344-5\_9},
  doi          = {10.1007/978-3-319-08344-5\_9},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhongWZW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2014,
  editor       = {Willy Susilo and
                  Yi Mu},
  title        = {Information Security and Privacy - 19th Australasian Conference, {ACISP}
                  2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8544},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08344-5},
  doi          = {10.1007/978-3-319-08344-5},
  isbn         = {978-3-319-08343-8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/2014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AnadaAHI13,
  author       = {Hiroaki Anada and
                  Seiko Arita and
                  Sari Handa and
                  Yosuke Iwabuchi},
  editor       = {Colin Boyd and
                  Leonie Simpson},
  title        = {Attribute-Based Identification: Definitions and Efficient Constructions},
  booktitle    = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
                  2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7959},
  pages        = {168--186},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39059-3\_12},
  doi          = {10.1007/978-3-642-39059-3\_12},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/AnadaAHI13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Aono13,
  author       = {Yoshinori Aono},
  editor       = {Colin Boyd and
                  Leonie Simpson},
  title        = {Minkowski Sum Based Lattice Construction for Multivariate Simultaneous
                  Coppersmith's Technique and Applications to {RSA}},
  booktitle    = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
                  2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7959},
  pages        = {88--103},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39059-3\_7},
  doi          = {10.1007/978-3-642-39059-3\_7},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Aono13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BaiYWW13,
  author       = {Dongxia Bai and
                  Hongbo Yu and
                  Gaoli Wang and
                  Xiaoyun Wang},
  editor       = {Colin Boyd and
                  Leonie Simpson},
  title        = {Improved Boomerang Attacks on {SM3}},
  booktitle    = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
                  2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7959},
  pages        = {251--266},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39059-3\_17},
  doi          = {10.1007/978-3-642-39059-3\_17},
  timestamp    = {Mon, 25 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/BaiYWW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BanikMST13,
  author       = {Subhadeep Banik and
                  Subhamoy Maitra and
                  Santanu Sarkar and
                  Meltem S{\"{o}}nmez Turan},
  editor       = {Colin Boyd and
                  Leonie Simpson},
  title        = {A Chosen {IV} Related Key Attack on Grain-128a},
  booktitle    = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
                  2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7959},
  pages        = {13--26},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39059-3\_2},
  doi          = {10.1007/978-3-642-39059-3\_2},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/BanikMST13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Boyen13,
  author       = {Xavier Boyen},
  editor       = {Colin Boyd and
                  Leonie Simpson},
  title        = {Expressive Cryptography: Lattice Perspectives},
  booktitle    = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
                  2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7959},
  pages        = {267},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39059-3\_18},
  doi          = {10.1007/978-3-642-39059-3\_18},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Boyen13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BuldasL13,
  author       = {Ahto Buldas and
                  Risto Laanoja},
  editor       = {Colin Boyd and
                  Leonie Simpson},
  title        = {Security Proofs for Hash Tree Time-Stamping Using Hash Functions with
                  Small Output Size},
  booktitle    = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
                  2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7959},
  pages        = {235--250},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39059-3\_16},
  doi          = {10.1007/978-3-642-39059-3\_16},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BuldasL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BuldasN13,
  author       = {Ahto Buldas and
                  Margus Niitsoo},
  editor       = {Colin Boyd and
                  Leonie Simpson},
  title        = {Black-Box Separations and Their Adaptability to the Non-uniform Model},
  booktitle    = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
                  2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7959},
  pages        = {152--167},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39059-3\_11},
  doi          = {10.1007/978-3-642-39059-3\_11},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BuldasN13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Camtepe13,
  author       = {Seyit Ahmet {\c{C}}amtepe},
  editor       = {Colin Boyd and
                  Leonie Simpson},
  title        = {Complexity of Increasing the Secure Connectivity in Wireless Ad Hoc
                  Networks},
  booktitle    = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
                  2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7959},
  pages        = {363--378},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39059-3\_25},
  doi          = {10.1007/978-3-642-39059-3\_25},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Camtepe13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/FouqueJT13,
  author       = {Pierre{-}Alain Fouque and
                  Antoine Joux and
                  Mehdi Tibouchi},
  editor       = {Colin Boyd and
                  Leonie Simpson},
  title        = {Injective Encodings to Elliptic Curves},
  booktitle    = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
                  2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7959},
  pages        = {203--218},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39059-3\_14},
  doi          = {10.1007/978-3-642-39059-3\_14},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/FouqueJT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/FukumitsuHIKS13,
  author       = {Masayuki Fukumitsu and
                  Shingo Hasegawa and
                  Shuji Isobe and
                  Eisuke Koizumi and
                  Hiroki Shizuya},
  editor       = {Colin Boyd and
                  Leonie Simpson},
  title        = {Toward Separating the Strong Adaptive Pseudo-freeness from the Strong
                  {RSA} Assumption},
  booktitle    = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
                  2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7959},
  pages        = {72--87},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39059-3\_6},
  doi          = {10.1007/978-3-642-39059-3\_6},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/FukumitsuHIKS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Ghadafi13,
  author       = {Essam Ghadafi},
  editor       = {Colin Boyd and
                  Leonie Simpson},
  title        = {Formalizing Group Blind Signatures and Practical Constructions without
                  Random Oracles},
  booktitle    = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
                  2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7959},
  pages        = {330--346},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39059-3\_23},
  doi          = {10.1007/978-3-642-39059-3\_23},
  timestamp    = {Sat, 16 Sep 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Ghadafi13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GjosteenPS13,
  author       = {Kristian Gj{\o}steen and
                  George Petrides and
                  Asgeir Steine},
  editor       = {Colin Boyd and
                  Leonie Simpson},
  title        = {Towards Privacy Preserving Mobile Internet Communications - How Close
                  Can We Get?},
  booktitle    = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
                  2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7959},
  pages        = {379--387},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39059-3\_26},
  doi          = {10.1007/978-3-642-39059-3\_26},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/GjosteenPS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GuoMSV13,
  author       = {Fuchun Guo and
                  Yi Mu and
                  Willy Susilo and
                  Vijay Varadharajan},
  editor       = {Colin Boyd and
                  Leonie Simpson},
  title        = {Membership Encryption and Its Applications},
  booktitle    = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
                  2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7959},
  pages        = {219--234},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39059-3\_15},
  doi          = {10.1007/978-3-642-39059-3\_15},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/GuoMSV13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/IsobeSC13,
  author       = {Takanori Isobe and
                  Yu Sasaki and
                  Jiageng Chen},
  editor       = {Colin Boyd and
                  Leonie Simpson},
  title        = {Related-Key Boomerang Attacks on {KATAN32/48/64}},
  booktitle    = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
                  2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7959},
  pages        = {268--285},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39059-3\_19},
  doi          = {10.1007/978-3-642-39059-3\_19},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/IsobeSC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KikuchiCIHT13,
  author       = {Ryo Kikuchi and
                  Koji Chida and
                  Dai Ikarashi and
                  Koki Hamada and
                  Katsumi Takahashi},
  editor       = {Colin Boyd and
                  Leonie Simpson},
  title        = {Secret Sharing Schemes with Conversion Protocol to Achieve Short Share-Size
                  and Extendibility to Multiparty Computation},
  booktitle    = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
                  2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7959},
  pages        = {419--434},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39059-3\_29},
  doi          = {10.1007/978-3-642-39059-3\_29},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KikuchiCIHT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KimH13,
  author       = {Byoung{-}Il Kim and
                  Jin Hong},
  editor       = {Colin Boyd and
                  Leonie Simpson},
  title        = {Analysis of the Non-perfect Table Fuzzy Rainbow Tradeoff},
  booktitle    = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
                  2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7959},
  pages        = {347--362},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39059-3\_24},
  doi          = {10.1007/978-3-642-39059-3\_24},
  timestamp    = {Mon, 29 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KimH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LuZL13,
  author       = {Yao Lu and
                  Rui Zhang and
                  Dongdai Lin},
  editor       = {Colin Boyd and
                  Leonie Simpson},
  title        = {Factoring Multi-power {RSA} Modulus {N} = p r q with Partial Known
                  Bits},
  booktitle    = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
                  2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7959},
  pages        = {57--71},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39059-3\_5},
  doi          = {10.1007/978-3-642-39059-3\_5},
  timestamp    = {Wed, 06 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LuZL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Mitchell13,
  author       = {Chris J. Mitchell},
  editor       = {Colin Boyd and
                  Leonie Simpson},
  title        = {Analysing the {IOBC} Authenticated Encryption Mode},
  booktitle    = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
                  2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7959},
  pages        = {1--12},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39059-3\_1},
  doi          = {10.1007/978-3-642-39059-3\_1},
  timestamp    = {Mon, 29 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Mitchell13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PlantardSZ13,
  author       = {Thomas Plantard and
                  Willy Susilo and
                  Zhenfei Zhang},
  editor       = {Colin Boyd and
                  Leonie Simpson},
  title        = {Adaptive Precision Floating Point {LLL}},
  booktitle    = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
                  2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7959},
  pages        = {104--117},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39059-3\_8},
  doi          = {10.1007/978-3-642-39059-3\_8},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PlantardSZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/QinLH13,
  author       = {Baodong Qin and
                  Shengli Liu and
                  Zhengan Huang},
  editor       = {Colin Boyd and
                  Leonie Simpson},
  title        = {Key-Dependent Message Chosen-Ciphertext Security of the Cramer-Shoup
                  Cryptosystem},
  booktitle    = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
                  2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7959},
  pages        = {136--151},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39059-3\_10},
  doi          = {10.1007/978-3-642-39059-3\_10},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/QinLH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Shi0F13,
  author       = {Zhenqing Shi and
                  Bin Zhang and
                  Dengguo Feng},
  editor       = {Colin Boyd and
                  Leonie Simpson},
  title        = {Cryptanalysis of Helix and Phelix Revisited},
  booktitle    = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
                  2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7959},
  pages        = {27--40},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39059-3\_3},
  doi          = {10.1007/978-3-642-39059-3\_3},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Shi0F13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SouthS13,
  author       = {Leah F. South and
                  Douglas Stebila},
  editor       = {Colin Boyd and
                  Leonie Simpson},
  title        = {Count-Min Sketches for Estimating Password Frequency within Hamming
                  Distance Two},
  booktitle    = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
                  2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7959},
  pages        = {388--402},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39059-3\_27},
  doi          = {10.1007/978-3-642-39059-3\_27},
  timestamp    = {Mon, 21 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/SouthS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SusiloAWW13,
  author       = {Willy Susilo and
                  Man Ho Au and
                  Yang Wang and
                  Duncan S. Wong},
  editor       = {Colin Boyd and
                  Leonie Simpson},
  title        = {Fairness in Concurrent Signatures Revisited},
  booktitle    = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
                  2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7959},
  pages        = {318--329},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39059-3\_22},
  doi          = {10.1007/978-3-642-39059-3\_22},
  timestamp    = {Tue, 09 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SusiloAWW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TakahashiFAF13,
  author       = {Junko Takahashi and
                  Toshinori Fukunaga and
                  Kazumaro Aoki and
                  Hitoshi Fuji},
  editor       = {Colin Boyd and
                  Leonie Simpson},
  title        = {Highly Accurate Key Extraction Method for Access-Driven Cache Attacks
                  Using Correlation Coefficient},
  booktitle    = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
                  2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7959},
  pages        = {286--301},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39059-3\_20},
  doi          = {10.1007/978-3-642-39059-3\_20},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/TakahashiFAF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TakayasuK13,
  author       = {Atsushi Takayasu and
                  Noboru Kunihiro},
  editor       = {Colin Boyd and
                  Leonie Simpson},
  title        = {Better Lattice Constructions for Solving Multivariate Linear Equations
                  Modulo Unknown Divisors},
  booktitle    = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
                  2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7959},
  pages        = {118--135},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39059-3\_9},
  doi          = {10.1007/978-3-642-39059-3\_9},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/TakayasuK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Todo13,
  author       = {Yosuke Todo},
  editor       = {Colin Boyd and
                  Leonie Simpson},
  title        = {Upper Bounds for the Security of Several Feistel Networks},
  booktitle    = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
                  2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7959},
  pages        = {302--317},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39059-3\_21},
  doi          = {10.1007/978-3-642-39059-3\_21},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Todo13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WangMAS13,
  author       = {Yang Wang and
                  Mark Manulis and
                  Man Ho Au and
                  Willy Susilo},
  editor       = {Colin Boyd and
                  Leonie Simpson},
  title        = {Relations among Privacy Notions for Signcryption and Key Invisible
                  "Sign-then-Encrypt"},
  booktitle    = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
                  2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7959},
  pages        = {187--202},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39059-3\_13},
  doi          = {10.1007/978-3-642-39059-3\_13},
  timestamp    = {Tue, 09 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WangMAS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YuZ13,
  author       = {Yang Yu and
                  Zhanfei Zhou},
  editor       = {Colin Boyd and
                  Leonie Simpson},
  title        = {A Rational Secret Sharing Protocol with Unconditional Security in
                  the Synchronous Setting},
  booktitle    = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
                  2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7959},
  pages        = {403--418},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39059-3\_28},
  doi          = {10.1007/978-3-642-39059-3\_28},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YuZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhangT13,
  author       = {Hui Zhang and
                  Tsuyoshi Takagi},
  editor       = {Colin Boyd and
                  Leonie Simpson},
  title        = {Attacks on Multi-Prime {RSA} with Small Prime Difference},
  booktitle    = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
                  2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7959},
  pages        = {41--56},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39059-3\_4},
  doi          = {10.1007/978-3-642-39059-3\_4},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhangT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Zheng13,
  author       = {Yuliang Zheng},
  editor       = {Colin Boyd and
                  Leonie Simpson},
  title        = {Public Key Cryptography for Mobile Cloud},
  booktitle    = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
                  2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7959},
  pages        = {435},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39059-3\_30},
  doi          = {10.1007/978-3-642-39059-3\_30},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/Zheng13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2013,
  editor       = {Colin Boyd and
                  Leonie Simpson},
  title        = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
                  2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7959},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39059-3},
  doi          = {10.1007/978-3-642-39059-3},
  isbn         = {978-3-642-39058-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AlMashrafiBSDW12,
  author       = {Mufeed Juma AlMashrafi and
                  Harry Bartlett and
                  Leonie Simpson and
                  Ed Dawson and
                  Kenneth Koon{-}Ho Wong},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {Analysis of Indirect Message Injection for {MAC} Generation Using
                  Stream Ciphers},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {138--151},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_11},
  doi          = {10.1007/978-3-642-31448-3\_11},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/AlMashrafiBSDW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AonoASW12,
  author       = {Yoshinori Aono and
                  Manindra Agrawal and
                  Takakazu Satoh and
                  Osamu Watanabe},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {On the Optimality of Lattices for the Coppersmith Technique},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {376--389},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_28},
  doi          = {10.1007/978-3-642-31448-3\_28},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/AonoASW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChenL12,
  author       = {Jiazhe Chen and
                  Leibo Li},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {Low Data Complexity Attack on Reduced Camellia-256},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {101--114},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_8},
  doi          = {10.1007/978-3-642-31448-3\_8},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ChenL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChenLLWN12,
  author       = {Jie Chen and
                  Hoon Wei Lim and
                  San Ling and
                  Huaxiong Wang and
                  Khoa Nguyen},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {Revocable Identity-Based Encryption from Lattices},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {390--403},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_29},
  doi          = {10.1007/978-3-642-31448-3\_29},
  timestamp    = {Sat, 17 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ChenLLWN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DingPD12,
  author       = {Jintai Ding and
                  Yanbin Pan and
                  Yingpu Deng},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {An Algebraic Broadcast Attack against {NTRU}},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {124--137},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_10},
  doi          = {10.1007/978-3-642-31448-3\_10},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/DingPD12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/FleischmannFLW12,
  author       = {Ewan Fleischmann and
                  Christian Forler and
                  Stefan Lucks and
                  Jakob Wenzel},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {Weimar-DM: {A} Highly Secure Double-Length Compression Function},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {152--165},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_12},
  doi          = {10.1007/978-3-642-31448-3\_12},
  timestamp    = {Thu, 21 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/FleischmannFLW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/FujiokaMSU12,
  author       = {Atsushi Fujioka and
                  Mark Manulis and
                  Koutarou Suzuki and
                  Berkant Ustaoglu},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite
                  Key Exchange},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {15--28},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_2},
  doi          = {10.1007/978-3-642-31448-3\_2},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/FujiokaMSU12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GeZCMZ12,
  author       = {Aijun Ge and
                  Rui Zhang and
                  Cheng Chen and
                  Chuangui Ma and
                  Zhenfeng Zhang},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {Threshold Ciphertext Policy Attribute-Based Encryption with Constant
                  Size Ciphertexts},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {336--349},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_25},
  doi          = {10.1007/978-3-642-31448-3\_25},
  timestamp    = {Tue, 15 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/GeZCMZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HigoTYY12,
  author       = {Haruna Higo and
                  Keisuke Tanaka and
                  Akihiro Yamada and
                  Kenji Yasunaga},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {A Game-Theoretic Perspective on Oblivious Transfer},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {29--42},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_3},
  doi          = {10.1007/978-3-642-31448-3\_3},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HigoTYY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/IsobeS12,
  author       = {Takanori Isobe and
                  Kyoji Shibutani},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {Security Analysis of the Lightweight Block Ciphers XTEA, {LED} and
                  Piccolo},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {71--86},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_6},
  doi          = {10.1007/978-3-642-31448-3\_6},
  timestamp    = {Fri, 03 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/IsobeS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/JingXL12,
  author       = {Wenpan Jing and
                  Haixia Xu and
                  Bao Li},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {Non-malleable Instance-Dependent Commitment in the Standard Model},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {450--457},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_35},
  doi          = {10.1007/978-3-642-31448-3\_35},
  timestamp    = {Thu, 08 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/JingXL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KayesHC12,
  author       = {A. S. M. Kayes and
                  Jun Han and
                  Alan W. Colman},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {{ICAF:} {A} Context-Aware Framework for Access Control},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {442--449},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_34},
  doi          = {10.1007/978-3-642-31448-3\_34},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KayesHC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KurosawaNP12,
  author       = {Kaoru Kurosawa and
                  Ryo Nojima and
                  Le Trieu Phong},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {Relation between Verifiable Random Functions and Convertible Undeniable
                  Signatures, and New Constructions},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {235--246},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_18},
  doi          = {10.1007/978-3-642-31448-3\_18},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KurosawaNP12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LeeBN12,
  author       = {Kaleb Lee and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {Minimizing Information Leakage of Tree-Based {RFID} Authentication
                  Protocols Using Alternate Tree-Walking},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {434--441},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_33},
  doi          = {10.1007/978-3-642-31448-3\_33},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LeeBN12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LoryL12,
  author       = {Peter Lory and
                  Manuel Liedel},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {Accelerating the Secure Distributed Computation of the Mean by a Chebyshev
                  Expansion},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {57--70},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_5},
  doi          = {10.1007/978-3-642-31448-3\_5},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LoryL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MathewVVR12,
  author       = {K. Preetha Mathew and
                  Sachin Vasant and
                  Sridhar Venkatesan and
                  C. Pandu Rangan},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {An Efficient {IND-CCA2} Secure Variant of the Niederreiter Encryption
                  Scheme in the Standard Model},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {166--179},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_13},
  doi          = {10.1007/978-3-642-31448-3\_13},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MathewVVR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MengZ12,
  author       = {Xianmeng Meng and
                  Xuexin Zheng},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {Cryptanalysis of {RSA} with a Small Parameter},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {115--123},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_9},
  doi          = {10.1007/978-3-642-31448-3\_9},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MengZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MorozovT12,
  author       = {Kirill Morozov and
                  Tsuyoshi Takagi},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {Zero-Knowledge Protocols for the McEliece Encryption},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {180--193},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_14},
  doi          = {10.1007/978-3-642-31448-3\_14},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MorozovT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/NagashimaK12,
  author       = {Yuji Nagashima and
                  Noboru Kunihiro},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {Faster Algorithm for Solving Hard Knapsacks for Moderate Message Length},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {43--56},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_4},
  doi          = {10.1007/978-3-642-31448-3\_4},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/NagashimaK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/NguyenTY12,
  author       = {Manh Ha Nguyen and
                  Keisuke Tanaka and
                  Kenji Yasunaga},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {Leakage-Resilience of Stateless/Stateful Public-Key Encryption from
                  Hash Proofs},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {208--222},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_16},
  doi          = {10.1007/978-3-642-31448-3\_16},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/NguyenTY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/NietoMS12,
  author       = {Juan Manuel Gonz{\'{a}}lez Nieto and
                  Mark Manulis and
                  Dongdong Sun},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {Fully Private Revocable Predicate Encryption},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {350--363},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_26},
  doi          = {10.1007/978-3-642-31448-3\_26},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/NietoMS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PengH12,
  author       = {Kun Peng and
                  Matt Henricksen},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {How to Fix Two RSA-Based {PVSS} Schemes - Exploration and Solution},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {223--234},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_17},
  doi          = {10.1007/978-3-642-31448-3\_17},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PengH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PhanPSS12,
  author       = {Duong Hieu Phan and
                  David Pointcheval and
                  Siamak Fayyaz Shahandashti and
                  Mario Strefler},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {Adaptive {CCA} Broadcast Encryption with Constant-Size Secret Keys
                  and Ciphertexts},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {308--321},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_23},
  doi          = {10.1007/978-3-642-31448-3\_23},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PhanPSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PoschmannR12,
  author       = {Axel Poschmann and
                  Matthew J. B. Robshaw},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {On Area, Time, and the Right Trade-Off},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {404--418},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_30},
  doi          = {10.1007/978-3-642-31448-3\_30},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PoschmannR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/RangasamySBNK12,
  author       = {Jothi Rangasamy and
                  Douglas Stebila and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Lakshmi Kuppusamy},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {Effort-Release Public-Key Encryption from Cryptographic Puzzles},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {194--207},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_15},
  doi          = {10.1007/978-3-642-31448-3\_15},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/RangasamySBNK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SasakiEHK12,
  author       = {Yu Sasaki and
                  Sareh Emami and
                  Deukjo Hong and
                  Ashish Kumar},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {Improved Known-Key Distinguishers on Feistel-SP Ciphers and Application
                  to Camellia},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {87--100},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_7},
  doi          = {10.1007/978-3-642-31448-3\_7},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SasakiEHK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SelviVR12,
  author       = {S. Sharmila Deva Selvi and
                  S. Sree Vivek and
                  C. Pandu Rangan},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {Deterministic Identity Based Signature Scheme and Its Application
                  for Aggregate Signatures},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {280--293},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_21},
  doi          = {10.1007/978-3-642-31448-3\_21},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SelviVR12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ShahandashtiSO12,
  author       = {Siamak Fayyaz Shahandashti and
                  Reihaneh Safavi{-}Naini and
                  Philip Ogunbona},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {Private Fingerprint Matching},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {426--433},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_32},
  doi          = {10.1007/978-3-642-31448-3\_32},
  timestamp    = {Mon, 29 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ShahandashtiSO12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Shao12,
  author       = {Jun Shao},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {Anonymous ID-Based Proxy Re-Encryption},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {364--375},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_27},
  doi          = {10.1007/978-3-642-31448-3\_27},
  timestamp    = {Sat, 20 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Shao12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/StankovskiHJ12,
  author       = {Paul Stankovski and
                  Martin Hell and
                  Thomas Johansson},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {Analysis of Xorrotation with Application to an {HC-128} Variant},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {419--425},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_31},
  doi          = {10.1007/978-3-642-31448-3\_31},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/StankovskiHJ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TanW12,
  author       = {Xiao Tan and
                  Duncan S. Wong},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {Generalized First Pre-image Tractable Random Oracle Model and Signature
                  Schemes},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {247--260},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_19},
  doi          = {10.1007/978-3-642-31448-3\_19},
  timestamp    = {Mon, 21 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/TanW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TianCL12,
  author       = {Haibo Tian and
                  Xiaofeng Chen and
                  Jin Li},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {A Short Non-delegatable Strong Designated Verifier Signature},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {261--279},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_20},
  doi          = {10.1007/978-3-642-31448-3\_20},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/TianCL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TosuK12,
  author       = {Kaori Tosu and
                  Noboru Kunihiro},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {Optimal Bounds for Multi-Prime {\(\Phi\)}-Hiding Assumption},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {1--14},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_1},
  doi          = {10.1007/978-3-642-31448-3\_1},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/TosuK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YuenYH12,
  author       = {Tsz Hon Yuen and
                  Siu{-}Ming Yiu and
                  Lucas Chi Kwong Hui},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {Fully Leakage-Resilient Signatures with Auxiliary Inputs},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {294--307},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_22},
  doi          = {10.1007/978-3-642-31448-3\_22},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YuenYH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhouDC12,
  author       = {Xuhua Zhou and
                  Xuhua Ding and
                  Kefei Chen},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {A Generic Construction of Accountable Decryption and Its Applications},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {322--335},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_24},
  doi          = {10.1007/978-3-642-31448-3\_24},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhouDC12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2012,
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3},
  doi          = {10.1007/978-3-642-31448-3},
  isbn         = {978-3-642-31447-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AkramMM11,
  author       = {Raja Naeem Akram and
                  Konstantinos Markantonakis and
                  Keith Mayes},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {Application-Binding Protocol in the User Centric Smart Card Ownership
                  Model},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {208--225},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_14},
  doi          = {10.1007/978-3-642-22497-3\_14},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/AkramMM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AuSM11,
  author       = {Man Ho Au and
                  Willy Susilo and
                  Yi Mu},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {Electronic Cash with Anonymous User Suspension},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {172--188},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_12},
  doi          = {10.1007/978-3-642-22497-3\_12},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/AuSM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BogdanovS11,
  author       = {Andrey Bogdanov and
                  Kyoji Shibutani},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {Double SP-Functions: Enhanced Generalized Feistel Networks - Extended
                  Abstract},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {106--119},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_8},
  doi          = {10.1007/978-3-642-22497-3\_8},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BogdanovS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Carlet11,
  author       = {Claude Carlet},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {On Known and New Differentially Uniform Functions},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_1},
  doi          = {10.1007/978-3-642-22497-3\_1},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Carlet11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChatterjeeMU11,
  author       = {Sanjit Chatterjee and
                  Alfred Menezes and
                  Berkant Ustaoglu},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {A Generic Variant of NIST's {KAS2} Key Agreement Protocol},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {353--370},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_23},
  doi          = {10.1007/978-3-642-22497-3\_23},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ChatterjeeMU11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChenJYW11,
  author       = {Jiazhe Chen and
                  Keting Jia and
                  Hongbo Yu and
                  Xiaoyun Wang},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {New Impossible Differential Attacks of Reduced-Round Camellia-192
                  and Camellia-256},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {16--33},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_2},
  doi          = {10.1007/978-3-642-22497-3\_2},
  timestamp    = {Mon, 25 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ChenJYW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/CorniauxG11,
  author       = {Christian L. F. Corniaux and
                  Hossein Ghodosi},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {A Verifiable Distributed Oblivious Transfer Protocol},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {444--450},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_33},
  doi          = {10.1007/978-3-642-22497-3\_33},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/CorniauxG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DuZ11,
  author       = {Yusong Du and
                  Fangguo Zhang},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {Finding More Boolean Functions with Maximum Algebraic Immunity Based
                  on Univariate Polynomial Representation},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {47--60},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_4},
  doi          = {10.1007/978-3-642-22497-3\_4},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/DuZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/EmuraMR11,
  author       = {Keita Emura and
                  Atsuko Miyaji and
                  Mohammad Shahriar Rahman},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {Toward Dynamic Attribute-Based Signcryption (Poster)},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {439--443},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_32},
  doi          = {10.1007/978-3-642-22497-3\_32},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/EmuraMR11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/FanZT11,
  author       = {Jia Fan and
                  Yuliang Zheng and
                  Xiaohu Tang},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {A Single Key Pair is Adequate for the Zheng Signcryption},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {371--388},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_24},
  doi          = {10.1007/978-3-642-22497-3\_24},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/FanZT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/FreireP11,
  author       = {Eduarda S. V. Freire and
                  Kenneth G. Paterson},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {Provably Secure Key Assignment Schemes from Factoring},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {292--309},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_19},
  doi          = {10.1007/978-3-642-22497-3\_19},
  timestamp    = {Wed, 22 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/FreireP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/FujiokaOS11,
  author       = {Atsushi Fujioka and
                  Yoshiaki Okamoto and
                  Taiichi Saito},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {Generic Construction of Strongly Secure Timed-Release Public-Key Encryption},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {319--336},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_21},
  doi          = {10.1007/978-3-642-22497-3\_21},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/FujiokaOS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GauravaramKBW11,
  author       = {Praveen Gauravaram and
                  Lars R. Knudsen and
                  Nasour Bagheri and
                  Lei Wei},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {Improved Security Analysis of Fugue-256 (Poster)},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {428--432},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_30},
  doi          = {10.1007/978-3-642-22497-3\_30},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/GauravaramKBW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HatanoMS11,
  author       = {Tetsuya Hatano and
                  Atsuko Miyaji and
                  Takashi Sato},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {\emph{T}-Robust Scalable Group Key Exchange Protocol with \emph{O}(log\emph{n})
                  Complexity},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {189--207},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_13},
  doi          = {10.1007/978-3-642-22497-3\_13},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HatanoMS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LagishettySS11,
  author       = {Shashank Lagishetty and
                  Pruthvi Reddy Sabbu and
                  Kannan Srinathan},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {{DMIPS} - Defensive Mechanism against {IP} Spoofing},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {276--291},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_18},
  doi          = {10.1007/978-3-642-22497-3\_18},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LagishettySS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiuCZ11,
  author       = {Joseph K. Liu and
                  Cheng{-}Kang Chu and
                  Jianying Zhou},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {Identity-Based Server-Aided Decryption},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {337--352},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_22},
  doi          = {10.1007/978-3-642-22497-3\_22},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LiuCZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiuLLJ11,
  author       = {Yamin Liu and
                  Bao Li and
                  Xianhui Lu and
                  Dingding Jia},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {Efficient CCA-Secure {CDH} Based {KEM} Balanced between Ciphertext
                  and Key},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {310--318},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_20},
  doi          = {10.1007/978-3-642-22497-3\_20},
  timestamp    = {Wed, 07 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LiuLLJ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiuLP11,
  author       = {Meicheng Liu and
                  Dongdai Lin and
                  Dingyi Pei},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {Results on the Immunity of Boolean Functions against Probabilistic
                  Algebraic Attacks},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {34--46},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_3},
  doi          = {10.1007/978-3-642-22497-3\_3},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LiuLP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiuTG11,
  author       = {Hongying Liu and
                  Yukiyasu Tsunoo and
                  Satoshi Goto},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {Electromagnetic Analysis Enhancement with Signal Processing Techniques
                  (Poster)},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {456--461},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_35},
  doi          = {10.1007/978-3-642-22497-3\_35},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LiuTG11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Long11,
  author       = {Benjamin W. Long},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {Security in Depth through Smart Space Cascades},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {226--240},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_15},
  doi          = {10.1007/978-3-642-22497-3\_15},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Long11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MinematsuSS11,
  author       = {Kazuhiko Minematsu and
                  Tomoyasu Suzaki and
                  Maki Shigeri},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {On Maximum Differential Probability of Generalized Feistel},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {89--105},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_7},
  doi          = {10.1007/978-3-642-22497-3\_7},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MinematsuSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/NguyenWW11,
  author       = {Phuong Ha Nguyen and
                  Hongjun Wu and
                  Huaxiong Wang},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {Improving the Algorithm 2 in Multidimensional Linear Cryptanalysis},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {61--74},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_5},
  doi          = {10.1007/978-3-642-22497-3\_5},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/NguyenWW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/OhtaharaOSS11,
  author       = {Chiaki Ohtahara and
                  Keita Okada and
                  Yu Sasaki and
                  Takeshi Shimoyama},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {Preimage Attacks on Full-ARIRANG (Poster)},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {417--422},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_28},
  doi          = {10.1007/978-3-642-22497-3\_28},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/OhtaharaOSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Peng11,
  author       = {Kun Peng},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {Impracticality of Efficient {PVSS} in Real Life Security Standard
                  (Poster)},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {451--455},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_34},
  doi          = {10.1007/978-3-642-22497-3\_34},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Peng11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PreneelYW11,
  author       = {Bart Preneel and
                  Hirotaka Yoshida and
                  Dai Watanabe},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {Finding Collisions for Reduced \emph{Luffa}-256 v2 (Poster)},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {423--427},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_29},
  doi          = {10.1007/978-3-642-22497-3\_29},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PreneelYW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Sarinay11,
  author       = {Juraj Sarinay},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {Faster and Smoother - {VSH} Revisited},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {142--156},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_10},
  doi          = {10.1007/978-3-642-22497-3\_10},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Sarinay11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SepahiSP11,
  author       = {Reza Sepahi and
                  Ron Steinfeld and
                  Josef Pieprzyk},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {Lattice-Based Completely Non-malleable {PKE} in the Standard Model
                  (Poster)},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {407--411},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_26},
  doi          = {10.1007/978-3-642-22497-3\_26},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SepahiSP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Tang11,
  author       = {Qiang Tang},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {Towards Public Key Encryption Scheme Supporting Equality Test with
                  Fine-Grained Authorization},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {389--406},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_25},
  doi          = {10.1007/978-3-642-22497-3\_25},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Tang11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TeoABSWD11,
  author       = {Sui{-}Guan Teo and
                  Ali Al{-}Hamdan and
                  Harry Bartlett and
                  Leonie Simpson and
                  Kenneth Koon{-}Ho Wong and
                  Ed Dawson},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {State Convergence in the Initialisation of Stream Ciphers},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {75--88},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_6},
  doi          = {10.1007/978-3-642-22497-3\_6},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/TeoABSWD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WangSMP11,
  author       = {Meiqin Wang and
                  Yue Sun and
                  Nicky Mouha and
                  Bart Preneel},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {Algebraic Techniques in Differential Cryptanalysis Revisited},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {120--141},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_9},
  doi          = {10.1007/978-3-642-22497-3\_9},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WangSMP11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WeiRGWWL11,
  author       = {Lei Wei and
                  Christian Rechberger and
                  Jian Guo and
                  Hongjun Wu and
                  Huaxiong Wang and
                  San Ling},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {Improved Meet-in-the-Middle Cryptanalysis of {KTANTAN} (Poster)},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {433--438},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_31},
  doi          = {10.1007/978-3-642-22497-3\_31},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/WeiRGWWL11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Wright11,
  author       = {Craig S. Wright},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {Compliance or Security, What Cost? (Poster)},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {412--416},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_27},
  doi          = {10.1007/978-3-642-22497-3\_27},
  timestamp    = {Tue, 27 Feb 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/Wright11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YuW11,
  author       = {Hongbo Yu and
                  Xiaoyun Wang},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {Cryptanalysis of the Compression Function of {SIMD}},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {157--171},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_11},
  doi          = {10.1007/978-3-642-22497-3\_11},
  timestamp    = {Mon, 25 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/YuW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhangT11,
  author       = {Mingwu Zhang and
                  Tsuyoshi Takagi},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {GeoEnc: Geometric Area Based Keys and Policies in Functional Encryption
                  Systems},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {241--258},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_16},
  doi          = {10.1007/978-3-642-22497-3\_16},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhangT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhangTW11,
  author       = {Yun Zhang and
                  Christophe Tartary and
                  Huaxiong Wang},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder
                  Theorem},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {259--275},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_17},
  doi          = {10.1007/978-3-642-22497-3\_17},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhangTW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2011,
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3},
  doi          = {10.1007/978-3-642-22497-3},
  isbn         = {978-3-642-22496-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AuSM10,
  author       = {Man Ho Au and
                  Willy Susilo and
                  Yi Mu},
  editor       = {Ron Steinfeld and
                  Philip Hawkes},
  title        = {Proof-of-Knowledge of Representation of Committed Value and Its Applications},
  booktitle    = {Information Security and Privacy - 15th Australasian Conference, {ACISP}
                  2010, Sydney, Australia, July 5-7, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6168},
  pages        = {352--369},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14081-5\_22},
  doi          = {10.1007/978-3-642-14081-5\_22},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/AuSM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AumassonKKMOPS10,
  author       = {Jean{-}Philippe Aumasson and
                  Emilia K{\"{a}}sper and
                  Lars R. Knudsen and
                  Krystian Matusiewicz and
                  Rune Steinsmo {\O}deg{\aa}rd and
                  Thomas Peyrin and
                  Martin Schl{\"{a}}ffer},
  editor       = {Ron Steinfeld and
                  Philip Hawkes},
  title        = {Distinguishers for the Compression Function and Output Transformation
                  of Hamsi-256},
  booktitle    = {Information Security and Privacy - 15th Australasian Conference, {ACISP}
                  2010, Sydney, Australia, July 5-7, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6168},
  pages        = {87--103},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14081-5\_6},
  doi          = {10.1007/978-3-642-14081-5\_6},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/AumassonKKMOPS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BarbosaF10,
  author       = {Manuel Barbosa and
                  Pooya Farshim},
  editor       = {Ron Steinfeld and
                  Philip Hawkes},
  title        = {Relations among Notions of Complete Non-malleability: Indistinguishability
                  Characterisation and Efficient Construction without Random Oracles},
  booktitle    = {Information Security and Privacy - 15th Australasian Conference, {ACISP}
                  2010, Sydney, Australia, July 5-7, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6168},
  pages        = {145--163},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14081-5\_10},
  doi          = {10.1007/978-3-642-14081-5\_10},
  timestamp    = {Mon, 29 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BarbosaF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BarbosaF10a,
  author       = {Manuel Barbosa and
                  Pooya Farshim},
  editor       = {Ron Steinfeld and
                  Philip Hawkes},
  title        = {Strong Knowledge Extractors for Public-Key Encryption Schemes},
  booktitle    = {Information Security and Privacy - 15th Australasian Conference, {ACISP}
                  2010, Sydney, Australia, July 5-7, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6168},
  pages        = {164--181},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14081-5\_11},
  doi          = {10.1007/978-3-642-14081-5\_11},
  timestamp    = {Mon, 29 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BarbosaF10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BiasseJS10,
  author       = {Jean{-}Fran{\c{c}}ois Biasse and
                  Michael J. Jacobson Jr. and
                  Alan K. Silvester},
  editor       = {Ron Steinfeld and
                  Philip Hawkes},
  title        = {Security Estimates for Quadratic Field Based Cryptosystems},
  booktitle    = {Information Security and Privacy - 15th Australasian Conference, {ACISP}
                  2010, Sydney, Australia, July 5-7, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6168},
  pages        = {233--247},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14081-5\_15},
  doi          = {10.1007/978-3-642-14081-5\_15},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BiasseJS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BirkettS10,
  author       = {James Birkett and
                  Douglas Stebila},
  editor       = {Ron Steinfeld and
                  Philip Hawkes},
  title        = {Predicate-Based Key Exchange},
  booktitle    = {Information Security and Privacy - 15th Australasian Conference, {ACISP}
                  2010, Sydney, Australia, July 5-7, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6168},
  pages        = {282--299},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14081-5\_18},
  doi          = {10.1007/978-3-642-14081-5\_18},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BirkettS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BuldasN10,
  author       = {Ahto Buldas and
                  Margus Niitsoo},
  editor       = {Ron Steinfeld and
                  Philip Hawkes},
  title        = {Optimally Tight Security Proofs for Hash-Then-Publish Time-Stamping},
  booktitle    = {Information Security and Privacy - 15th Australasian Conference, {ACISP}
                  2010, Sydney, Australia, July 5-7, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6168},
  pages        = {318--335},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14081-5\_20},
  doi          = {10.1007/978-3-642-14081-5\_20},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BuldasN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChaabouniLS10,
  author       = {Rafik Chaabouni and
                  Helger Lipmaa and
                  Abhi Shelat},
  editor       = {Ron Steinfeld and
                  Philip Hawkes},
  title        = {Additive Combinatorics and Discrete Logarithm Based Range Protocols},
  booktitle    = {Information Security and Privacy - 15th Australasian Conference, {ACISP}
                  2010, Sydney, Australia, July 5-7, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6168},
  pages        = {336--351},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14081-5\_21},
  doi          = {10.1007/978-3-642-14081-5\_21},
  timestamp    = {Mon, 29 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ChaabouniLS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChenZSTLK10,
  author       = {Xiaofeng Chen and
                  Fangguo Zhang and
                  Willy Susilo and
                  Haibo Tian and
                  Jin Li and
                  Kwangjo Kim},
  editor       = {Ron Steinfeld and
                  Philip Hawkes},
  title        = {Identity-Based Chameleon Hash Scheme without Key Exposure},
  booktitle    = {Information Security and Privacy - 15th Australasian Conference, {ACISP}
                  2010, Sydney, Australia, July 5-7, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6168},
  pages        = {200--215},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14081-5\_13},
  doi          = {10.1007/978-3-642-14081-5\_13},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ChenZSTLK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/EtrogR10,
  author       = {Jonathan Etrog and
                  Matthew J. B. Robshaw},
  editor       = {Ron Steinfeld and
                  Philip Hawkes},
  title        = {On Unbiased Linear Approximations},
  booktitle    = {Information Security and Privacy - 15th Australasian Conference, {ACISP}
                  2010, Sydney, Australia, July 5-7, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6168},
  pages        = {74--86},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14081-5\_5},
  doi          = {10.1007/978-3-642-14081-5\_5},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/EtrogR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/FleischmannGL10,
  author       = {Ewan Fleischmann and
                  Michael Gorski and
                  Stefan Lucks},
  editor       = {Ron Steinfeld and
                  Philip Hawkes},
  title        = {Some Observations on Indifferentiability},
  booktitle    = {Information Security and Privacy - 15th Australasian Conference, {ACISP}
                  2010, Sydney, Australia, July 5-7, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6168},
  pages        = {117--134},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14081-5\_8},
  doi          = {10.1007/978-3-642-14081-5\_8},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/FleischmannGL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GorantlaBN10,
  author       = {M. Choudary Gorantla and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  editor       = {Ron Steinfeld and
                  Philip Hawkes},
  title        = {Attribute-Based Authenticated Key Exchange},
  booktitle    = {Information Security and Privacy - 15th Australasian Conference, {ACISP}
                  2010, Sydney, Australia, July 5-7, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6168},
  pages        = {300--317},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14081-5\_19},
  doi          = {10.1007/978-3-642-14081-5\_19},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/GorantlaBN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HenricksenYYKT10,
  author       = {Matthew Henricksen and
                  Wun{-}She Yap and
                  Chee Hoo Yian and
                  Shinsaku Kiyomoto and
                  Toshiaki Tanaka},
  editor       = {Ron Steinfeld and
                  Philip Hawkes},
  title        = {Side-Channel Analysis of the {K2} Stream Cipher},
  booktitle    = {Information Security and Privacy - 15th Australasian Conference, {ACISP}
                  2010, Sydney, Australia, July 5-7, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6168},
  pages        = {53--73},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14081-5\_4},
  doi          = {10.1007/978-3-642-14081-5\_4},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/HenricksenYYKT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KlonowskiKK10,
  author       = {Marek Klonowski and
                  Michal Koza and
                  Miroslaw Kutylowski},
  editor       = {Ron Steinfeld and
                  Philip Hawkes},
  title        = {Repelling Sybil-Type Attacks in Wireless Ad Hoc Systems},
  booktitle    = {Information Security and Privacy - 15th Australasian Conference, {ACISP}
                  2010, Sydney, Australia, July 5-7, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6168},
  pages        = {391--402},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14081-5\_24},
  doi          = {10.1007/978-3-642-14081-5\_24},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KlonowskiKK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Kunihiro10,
  author       = {Noboru Kunihiro},
  editor       = {Ron Steinfeld and
                  Philip Hawkes},
  title        = {Solving Generalized Small Inverse Problems},
  booktitle    = {Information Security and Privacy - 15th Australasian Conference, {ACISP}
                  2010, Sydney, Australia, July 5-7, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6168},
  pages        = {248--263},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14081-5\_16},
  doi          = {10.1007/978-3-642-14081-5\_16},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Kunihiro10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiSLQ10,
  author       = {Ruilin Li and
                  Bing Sun and
                  Chao Li and
                  Longjiang Qu},
  editor       = {Ron Steinfeld and
                  Philip Hawkes},
  title        = {Cryptanalysis of a Generalized Unbalanced Feistel Network Structure},
  booktitle    = {Information Security and Privacy - 15th Australasian Conference, {ACISP}
                  2010, Sydney, Australia, July 5-7, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6168},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14081-5\_1},
  doi          = {10.1007/978-3-642-14081-5\_1},
  timestamp    = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/LiSLQ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/NguyenWWL10,
  author       = {Phuong Ha Nguyen and
                  Lei Wei and
                  Huaxiong Wang and
                  San Ling},
  editor       = {Ron Steinfeld and
                  Philip Hawkes},
  title        = {On Multidimensional Linear Cryptanalysis},
  booktitle    = {Information Security and Privacy - 15th Australasian Conference, {ACISP}
                  2010, Sydney, Australia, July 5-7, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6168},
  pages        = {37--52},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14081-5\_3},
  doi          = {10.1007/978-3-642-14081-5\_3},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/NguyenWWL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/NishimakiFT10,
  author       = {Ryo Nishimaki and
                  Eiichiro Fujisaki and
                  Keisuke Tanaka},
  editor       = {Ron Steinfeld and
                  Philip Hawkes},
  title        = {A Multi-trapdoor Commitment Scheme from the {RSA} Assumption},
  booktitle    = {Information Security and Privacy - 15th Australasian Conference, {ACISP}
                  2010, Sydney, Australia, July 5-7, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6168},
  pages        = {182--199},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14081-5\_12},
  doi          = {10.1007/978-3-642-14081-5\_12},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/NishimakiFT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PatersonS10,
  author       = {Kenneth G. Paterson and
                  Douglas Stebila},
  editor       = {Ron Steinfeld and
                  Philip Hawkes},
  title        = {One-Time-Password-Authenticated Key Exchange},
  booktitle    = {Information Security and Privacy - 15th Australasian Conference, {ACISP}
                  2010, Sydney, Australia, July 5-7, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6168},
  pages        = {264--281},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14081-5\_17},
  doi          = {10.1007/978-3-642-14081-5\_17},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PatersonS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Rechberger10,
  author       = {Christian Rechberger},
  editor       = {Ron Steinfeld and
                  Philip Hawkes},
  title        = {Second-Preimage Analysis of Reduced {SHA-1}},
  booktitle    = {Information Security and Privacy - 15th Australasian Conference, {ACISP}
                  2010, Sydney, Australia, July 5-7, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6168},
  pages        = {104--116},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14081-5\_7},
  doi          = {10.1007/978-3-642-14081-5\_7},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Rechberger10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ShaoFZCL10,
  author       = {Jun Shao and
                  Min Feng and
                  Bin B. Zhu and
                  Zhenfu Cao and
                  Peng Liu},
  editor       = {Ron Steinfeld and
                  Philip Hawkes},
  title        = {The Security Model of Unidirectional Proxy Re-Signature with Private
                  Re-Signature Key},
  booktitle    = {Information Security and Privacy - 15th Australasian Conference, {ACISP}
                  2010, Sydney, Australia, July 5-7, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6168},
  pages        = {216--232},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14081-5\_14},
  doi          = {10.1007/978-3-642-14081-5\_14},
  timestamp    = {Sat, 20 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ShaoFZCL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SunVBY10,
  author       = {Li Sun and
                  Steven Versteeg and
                  Serdar Boztas and
                  Trevor Yann},
  editor       = {Ron Steinfeld and
                  Philip Hawkes},
  title        = {Pattern Recognition Techniques for the Classification of Malware Packers},
  booktitle    = {Information Security and Privacy - 15th Australasian Conference, {ACISP}
                  2010, Sydney, Australia, July 5-7, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6168},
  pages        = {370--390},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14081-5\_23},
  doi          = {10.1007/978-3-642-14081-5\_23},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SunVBY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WongB10,
  author       = {Kenneth Koon{-}Ho Wong and
                  Gregory V. Bard},
  editor       = {Ron Steinfeld and
                  Philip Hawkes},
  title        = {Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph
                  Partitioning on Equation Systems},
  booktitle    = {Information Security and Privacy - 15th Australasian Conference, {ACISP}
                  2010, Sydney, Australia, July 5-7, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6168},
  pages        = {19--36},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14081-5\_2},
  doi          = {10.1007/978-3-642-14081-5\_2},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/WongB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhuANS10,
  author       = {Huafei Zhu and
                  Tadashi Araragi and
                  Takashi Nishide and
                  Kouichi Sakurai},
  editor       = {Ron Steinfeld and
                  Philip Hawkes},
  title        = {Adaptive and Composable Non-committing Encryptions},
  booktitle    = {Information Security and Privacy - 15th Australasian Conference, {ACISP}
                  2010, Sydney, Australia, July 5-7, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6168},
  pages        = {135--144},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14081-5\_9},
  doi          = {10.1007/978-3-642-14081-5\_9},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhuANS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2010,
  editor       = {Ron Steinfeld and
                  Philip Hawkes},
  title        = {Information Security and Privacy - 15th Australasian Conference, {ACISP}
                  2010, Sydney, Australia, July 5-7, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6168},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14081-5},
  doi          = {10.1007/978-3-642-14081-5},
  isbn         = {978-3-642-14080-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AhmedLSH09,
  author       = {Irfan Ahmed and
                  Kyung{-}suk Lhee and
                  Hyunjung Shin and
                  Manpyo Hong},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {On Improving the Accuracy and Performance of Content-Based File Type
                  Identification},
  booktitle    = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
                  2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5594},
  pages        = {44--59},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02620-1\_4},
  doi          = {10.1007/978-3-642-02620-1\_4},
  timestamp    = {Fri, 19 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/AhmedLSH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AumassonBMNP09,
  author       = {Jean{-}Philippe Aumasson and
                  Eric Brier and
                  Willi Meier and
                  Mar{\'{\i}}a Naya{-}Plasencia and
                  Thomas Peyrin},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Inside the Hypercube},
  booktitle    = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
                  2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5594},
  pages        = {202--213},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02620-1\_14},
  doi          = {10.1007/978-3-642-02620-1\_14},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/AumassonBMNP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BoztasPT09,
  author       = {Serdar Boztas and
                  Simon J. Puglisi and
                  Andrew Turpin},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Testing Stream Ciphers by Finding the Longest Substring of a Given
                  Density},
  booktitle    = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
                  2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5594},
  pages        = {122--133},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02620-1\_9},
  doi          = {10.1007/978-3-642-02620-1\_9},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BoztasPT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BuldasJN09,
  author       = {Ahto Buldas and
                  Aivo J{\"{u}}rgenson and
                  Margus Niitsoo},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Efficiency Bounds for Adversary Constructions in Black-Box Reductions},
  booktitle    = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
                  2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5594},
  pages        = {264--275},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02620-1\_19},
  doi          = {10.1007/978-3-642-02620-1\_19},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BuldasJN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Camp09,
  author       = {L. Jean Camp},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Hardening the Network from the Friend Within},
  booktitle    = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
                  2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5594},
  pages        = {249},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02620-1\_17},
  doi          = {10.1007/978-3-642-02620-1\_17},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Camp09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/CheongKN09,
  author       = {Kai{-}Yuen Cheong and
                  Takeshi Koshiba and
                  Shohei Nishiyama},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Strengthening the Security of Distributed Oblivious Transfer},
  booktitle    = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
                  2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5594},
  pages        = {377--388},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02620-1\_26},
  doi          = {10.1007/978-3-642-02620-1\_26},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/CheongKN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChoyCKY09,
  author       = {Jiali Choy and
                  Guanhan Chew and
                  Khoongming Khoo and
                  Huihui Yap},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Cryptographic Properties and Application of a Generalized Unbalanced
                  Feistel Network Structure},
  booktitle    = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
                  2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5594},
  pages        = {73--89},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02620-1\_6},
  doi          = {10.1007/978-3-642-02620-1\_6},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ChoyCKY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChuWCZD09,
  author       = {Cheng{-}Kang Chu and
                  Jian Weng and
                  Sherman S. M. Chow and
                  Jianying Zhou and
                  Robert H. Deng},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Conditional Proxy Broadcast Re-Encryption},
  booktitle    = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
                  2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5594},
  pages        = {327--342},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02620-1\_23},
  doi          = {10.1007/978-3-642-02620-1\_23},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ChuWCZD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/FleischmannGL09,
  author       = {Ewan Fleischmann and
                  Michael Gorski and
                  Stefan Lucks},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Attacking 9 and 10 Rounds of {AES-256}},
  booktitle    = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
                  2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5594},
  pages        = {60--72},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02620-1\_5},
  doi          = {10.1007/978-3-642-02620-1\_5},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/FleischmannGL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HisilWCD09,
  author       = {H{\"{u}}seyin Hisil and
                  Kenneth Koon{-}Ho Wong and
                  Gary Carter and
                  Ed Dawson},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Jacobi Quartic Curves Revisited},
  booktitle    = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
                  2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5594},
  pages        = {452--468},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02620-1\_31},
  doi          = {10.1007/978-3-642-02620-1\_31},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/HisilWCD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HiwatariTAS09,
  author       = {Harunaga Hiwatari and
                  Keisuke Tanaka and
                  Tomoyuki Asano and
                  Koichi Sakumoto},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Multi-recipient Public-Key Encryption from Simulators in Security
                  Proofs},
  booktitle    = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
                  2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5594},
  pages        = {293--308},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02620-1\_21},
  doi          = {10.1007/978-3-642-02620-1\_21},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HiwatariTAS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HongKKFP09,
  author       = {Jeongdae Hong and
                  Jinil Kim and
                  Jihye Kim and
                  Matthew K. Franklin and
                  Kunsoo Park},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Fair Threshold Decryption with Semi-Trusted Third Parties},
  booktitle    = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
                  2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5594},
  pages        = {309--326},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02620-1\_22},
  doi          = {10.1007/978-3-642-02620-1\_22},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/HongKKFP09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Lory09,
  author       = {Peter Lory},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Reducing the Complexity in the Distributed Computation of Private
                  {RSA} Keys},
  booktitle    = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
                  2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5594},
  pages        = {250--263},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02620-1\_18},
  doi          = {10.1007/978-3-642-02620-1\_18},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Lory09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MatsudaNNT09,
  author       = {Toshihide Matsuda and
                  Ryo Nishimaki and
                  Akira Numayama and
                  Keisuke Tanaka},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Security on Hybrid Encryption with the Tag-KEM/DEM Framework},
  booktitle    = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
                  2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5594},
  pages        = {343--359},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02620-1\_24},
  doi          = {10.1007/978-3-642-02620-1\_24},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MatsudaNNT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MiyajiS09,
  author       = {Atsuko Miyaji and
                  Masahiro Sukegawa},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {New Correlations of {RC4} {PRGA} Using Nonzero-Bit Differences},
  booktitle    = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
                  2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5594},
  pages        = {134--152},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02620-1\_10},
  doi          = {10.1007/978-3-642-02620-1\_10},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MiyajiS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MrabetN09,
  author       = {Nadia El Mrabet and
                  Christophe N{\`{e}}gre},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Finite Field Multiplication Combining {AMNS} and {DFT} Approach for
                  Pairing Cryptography},
  booktitle    = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
                  2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5594},
  pages        = {422--436},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02620-1\_29},
  doi          = {10.1007/978-3-642-02620-1\_29},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MrabetN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Nandi09,
  author       = {Mridul Nandi},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Characterizing Padding Rules of {MD} Hash Functions Preserving Collision
                  Security},
  booktitle    = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
                  2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5594},
  pages        = {171--184},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02620-1\_12},
  doi          = {10.1007/978-3-642-02620-1\_12},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/Nandi09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/NumayamaT09,
  author       = {Akira Numayama and
                  Keisuke Tanaka},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {On the Weak Ideal Compression Functions},
  booktitle    = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
                  2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5594},
  pages        = {232--248},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02620-1\_16},
  doi          = {10.1007/978-3-642-02620-1\_16},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/NumayamaT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/OzenVTK09,
  author       = {Onur {\"{O}}zen and
                  Kerem Varici and
                  Cihangir Tezcan and
                  {\c{C}}elebi Kocair},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round
                  {PRESENT} and {HIGHT}},
  booktitle    = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
                  2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5594},
  pages        = {90--107},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02620-1\_7},
  doi          = {10.1007/978-3-642-02620-1\_7},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/OzenVTK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PatersonS09,
  author       = {Kenneth G. Paterson and
                  Sriramkrishnan Srinivasan},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Building Key-Private Public-Key Encryption Schemes},
  booktitle    = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
                  2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5594},
  pages        = {276--292},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02620-1\_20},
  doi          = {10.1007/978-3-642-02620-1\_20},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PatersonS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PhamK09,
  author       = {Dang Vinh Pham and
                  Dogan Kesdogan},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {A Combinatorial Approach for an Anonymity Metric},
  booktitle    = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
                  2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5594},
  pages        = {26--43},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02620-1\_3},
  doi          = {10.1007/978-3-642-02620-1\_3},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PhamK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ReyhanitabarSM09,
  author       = {Mohammad Reza Reyhanitabar and
                  Willy Susilo and
                  Yi Mu},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Analysis of Property-Preservation Capabilities of the {ROX} and ESh
                  Hash Domain Extenders},
  booktitle    = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
                  2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5594},
  pages        = {153--170},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02620-1\_11},
  doi          = {10.1007/978-3-642-02620-1\_11},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ReyhanitabarSM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SasakiA09,
  author       = {Yu Sasaki and
                  Kazumaro Aoki},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions:
                  Application to {RIPEMD} and Others},
  booktitle    = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
                  2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5594},
  pages        = {214--231},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02620-1\_15},
  doi          = {10.1007/978-3-642-02620-1\_15},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SasakiA09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SeifertDKSW09,
  author       = {Christian Seifert and
                  Vipul Delwadia and
                  Peter Komisarczuk and
                  David Stirling and
                  Ian Welch},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Measurement Study on Malicious Web Servers in the .nz Domain},
  booktitle    = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
                  2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5594},
  pages        = {8--25},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02620-1\_2},
  doi          = {10.1007/978-3-642-02620-1\_2},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SeifertDKSW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SimpsonHY09,
  author       = {Leonie Simpson and
                  Matthew Henricksen and
                  Wun{-}She Yap},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Improved Cryptanalysis of the Common Scrambling Algorithm Stream Cipher},
  booktitle    = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
                  2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5594},
  pages        = {108--121},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02620-1\_8},
  doi          = {10.1007/978-3-642-02620-1\_8},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/SimpsonHY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Solms09,
  author       = {Basie von Solms},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Is the Information Security King Naked?},
  booktitle    = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
                  2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5594},
  pages        = {1--7},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02620-1\_1},
  doi          = {10.1007/978-3-642-02620-1\_1},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Solms09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/StebilaU09,
  author       = {Douglas Stebila and
                  Berkant Ustaoglu},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Towards Denial-of-Service-Resilient Key Agreement Protocols},
  booktitle    = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
                  2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5594},
  pages        = {389--406},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02620-1\_27},
  doi          = {10.1007/978-3-642-02620-1\_27},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/StebilaU09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Tunstall09,
  author       = {Michael Tunstall},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Random Order m-ary Exponentiation},
  booktitle    = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
                  2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5594},
  pages        = {437--451},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02620-1\_30},
  doi          = {10.1007/978-3-642-02620-1\_30},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/Tunstall09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Wikstrom09,
  author       = {Douglas Wikstr{\"{o}}m},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {A Commitment-Consistent Proof of a Shuffle},
  booktitle    = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
                  2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5594},
  pages        = {407--421},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02620-1\_28},
  doi          = {10.1007/978-3-642-02620-1\_28},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Wikstrom09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WuS09,
  author       = {Jiang Wu and
                  Douglas R. Stinson},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {A Highly Scalable {RFID} Authentication Protocol},
  booktitle    = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
                  2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5594},
  pages        = {360--376},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02620-1\_25},
  doi          = {10.1007/978-3-642-02620-1\_25},
  timestamp    = {Fri, 23 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WuS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YuW09,
  author       = {Hongbo Yu and
                  Xiaoyun Wang},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Distinguishing Attack on the Secret-Prefix {MAC} Based on the 39-Step
                  {SHA-256}},
  booktitle    = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
                  2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5594},
  pages        = {185--201},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02620-1\_13},
  doi          = {10.1007/978-3-642-02620-1\_13},
  timestamp    = {Mon, 25 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/YuW09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2009,
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Information Security and Privacy, 14th Australasian Conference, {ACISP}
                  2009, Brisbane, Australia, July 1-3, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5594},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-02620-1},
  doi          = {10.1007/978-3-642-02620-1},
  isbn         = {978-3-642-02619-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BarbosaBCS08,
  author       = {Manuel Barbosa and
                  Thierry Brouard and
                  St{\'{e}}phane Cauchie and
                  Sim{\~{a}}o Melo de Sousa},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {Secure Biometric Authentication with Improved Accuracy},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {21--36},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_3},
  doi          = {10.1007/978-3-540-70500-0\_3},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BarbosaBCS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BilletRSY08,
  author       = {Olivier Billet and
                  Matthew J. B. Robshaw and
                  Yannick Seurin and
                  Yiqun Lisa Yin},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {Looking Back at a New Hash Function},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {239--253},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_18},
  doi          = {10.1007/978-3-540-70500-0\_18},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BilletRSY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BoydCNP08,
  author       = {Colin Boyd and
                  Yvonne Cliff and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Kenneth G. Paterson},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {Efficient One-Round Key Exchange in the Standard Model},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {69--83},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_6},
  doi          = {10.1007/978-3-540-70500-0\_6},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BoydCNP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Boyen08,
  author       = {Xavier Boyen},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {New Paradigms for Password Security},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {1--5},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_1},
  doi          = {10.1007/978-3-540-70500-0\_1},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Boyen08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/CichonKK08,
  author       = {Jacek Cichon and
                  Marek Klonowski and
                  Miroslaw Kutylowski},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {Distributed Verification of Mixing - Local Forking Proofs Model},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {128--140},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_10},
  doi          = {10.1007/978-3-540-70500-0\_10},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/CichonKK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/CookYK08,
  author       = {Debra L. Cook and
                  Moti Yung and
                  Angelos D. Keromytis},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {Methods for Linear and Differential Cryptanalysis of Elastic Block
                  Ciphers},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {187--202},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_14},
  doi          = {10.1007/978-3-540-70500-0\_14},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/CookYK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DocheH08,
  author       = {Christophe Doche and
                  Laurent Habsieger},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {A Tree-Based Approach for Computing Double-Base Chains},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {433--446},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_32},
  doi          = {10.1007/978-3-540-70500-0\_32},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/DocheH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Farashahi08,
  author       = {Reza Rezaeian Farashahi},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {Extractors for Jacobians of Binary Genus-2 Hyperelliptic Curves},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {447--462},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_33},
  doi          = {10.1007/978-3-540-70500-0\_33},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Farashahi08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GajekMS08,
  author       = {Sebastian Gajek and
                  Mark Manulis and
                  J{\"{o}}rg Schwenk},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {Enforcing User-Aware Browser-Based Mutual Authentication with Strong
                  Locked Same Origin Policy},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {6--20},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_2},
  doi          = {10.1007/978-3-540-70500-0\_2},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/GajekMS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HakalaN08,
  author       = {Risto M. Hakala and
                  Kaisa Nyberg},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {Linear Distinguishing Attack on Shannon},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {297--305},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_22},
  doi          = {10.1007/978-3-540-70500-0\_22},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HakalaN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HermelinCN08,
  author       = {Miia Hermelin and
                  Joo Yeon Cho and
                  Kaisa Nyberg},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {Multidimensional Linear Cryptanalysis of Reduced Round Serpent},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {203--215},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_15},
  doi          = {10.1007/978-3-540-70500-0\_15},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HermelinCN08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HiranoWT08,
  author       = {Takato Hirano and
                  Koichiro Wada and
                  Keisuke Tanaka},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {Public-Key Cryptosystems with Primitive Power Roots of Unity},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {98--112},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_8},
  doi          = {10.1007/978-3-540-70500-0\_8},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HiranoWT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KimL08,
  author       = {Sunghyun Kim and
                  Heejo Lee},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {Reducing Payload Scans for Attack Signature Matching Using Rule Classification},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {350--360},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_26},
  doi          = {10.1007/978-3-540-70500-0\_26},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KimL08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KohliB08,
  author       = {Pankaj Kohli and
                  Bezawada Bruhadeshwar},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {FormatShield: {A} Binary Rewriting Defense against Format String Attacks},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {376--390},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_28},
  doi          = {10.1007/978-3-540-70500-0\_28},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KohliB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LeeJSH08,
  author       = {Yuseop Lee and
                  Kitae Jeong and
                  Jaechul Sung and
                  Seokhie Hong},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {Related-Key Chosen {IV} Attacks on Grain-v1 and Grain-128},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {321--335},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_24},
  doi          = {10.1007/978-3-540-70500-0\_24},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LeeJSH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiWPY08,
  author       = {Min Li and
                  Hua Wang and
                  Ashley W. Plank and
                  Jianming Yong},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {Advanced Permission-Role Relationship in Role-Based Access Control},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {391--403},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_29},
  doi          = {10.1007/978-3-540-70500-0\_29},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/LiWPY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MaitraP08,
  author       = {Subhamoy Maitra and
                  Goutam Paul},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {Recovering {RC4} Permutation from 2048 Keystream Bytes if jIs Stuck},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {306--320},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_23},
  doi          = {10.1007/978-3-540-70500-0\_23},
  timestamp    = {Sun, 17 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/MaitraP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MedosB08,
  author       = {Silvana Medos and
                  Serdar Boztas},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {Montgomery Residue Representation Fault-Tolerant Computation in GF(2k)},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {419--432},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_31},
  doi          = {10.1007/978-3-540-70500-0\_31},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MedosB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MendelS08,
  author       = {Florian Mendel and
                  Martin Schl{\"{a}}ffer},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {Collisions for Round-Reduced {LAKE}},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {267--281},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_20},
  doi          = {10.1007/978-3-540-70500-0\_20},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/MendelS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MenezesU08,
  author       = {Alfred Menezes and
                  Berkant Ustaoglu},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {Comparing the Pre- and Post-specified Peer Models for Key Agreement},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {53--68},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_5},
  doi          = {10.1007/978-3-540-70500-0\_5},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/MenezesU08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/NegreP08,
  author       = {Christophe N{\`{e}}gre and
                  Thomas Plantard},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {Efficient Modular Arithmetic in Adapted Modular Number System Using
                  Lagrange Representation},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {463--477},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_34},
  doi          = {10.1007/978-3-540-70500-0\_34},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/NegreP08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/OommenF08,
  author       = {B. John Oommen and
                  Ebaa Fayyoumi},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {Enhancing Micro-Aggregation Technique by Utilizing Dependence-Based
                  Information in Secure Statistical Databases},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {404--418},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_30},
  doi          = {10.1007/978-3-540-70500-0\_30},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/OommenF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PatraCVR08,
  author       = {Arpita Patra and
                  Ashish Choudhary and
                  Madhu Vaidyanathan and
                  C. Pandu Rangan},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {Efficient Perfectly Reliable and Secure Message Transmission Tolerating
                  Mobile Adversary},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {170--186},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_13},
  doi          = {10.1007/978-3-540-70500-0\_13},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PatraCVR08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SanadhyaS08,
  author       = {Somitra Kumar Sanadhya and
                  Palash Sarkar},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {Non-linear Reduced Round Attacks against {SHA-2} Hash Family},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {254--266},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_19},
  doi          = {10.1007/978-3-540-70500-0\_19},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SanadhyaS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SasakiA08,
  author       = {Yu Sasaki and
                  Kazumaro Aoki},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {Preimage Attacks on Step-Reduced {MD5}},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {282--296},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_21},
  doi          = {10.1007/978-3-540-70500-0\_21},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SasakiA08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SathyanarayanKB08,
  author       = {V. Sai Sathyanarayan and
                  Pankaj Kohli and
                  Bezawada Bruhadeshwar},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {Signature Generation and Detection of Malware Families},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {336--349},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_25},
  doi          = {10.1007/978-3-540-70500-0\_25},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SathyanarayanKB08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SuiS08,
  author       = {Jiayuan Sui and
                  Douglas R. Stinson},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {A Critical Analysis and Improvement of {AACS} Drive-Host Authentication},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {37--52},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_4},
  doi          = {10.1007/978-3-540-70500-0\_4},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SuiS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SunWWG08,
  author       = {Hung{-}Min Sun and
                  Mu{-}En Wu and
                  Huaxiong Wang and
                  Jian Guo},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {On the Improvement of the {BDF} Attack on {LSBS-RSA}},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {84--97},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_7},
  doi          = {10.1007/978-3-540-70500-0\_7},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SunWWG08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TeranishiO08,
  author       = {Isamu Teranishi and
                  Wakaha Ogata},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {Relationship between Two Approaches for Defining the Standard Model
                  PA-ness},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {113--127},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_9},
  doi          = {10.1007/978-3-540-70500-0\_9},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/TeranishiO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WangFWZ08,
  author       = {Peng Wang and
                  Dengguo Feng and
                  Wenling Wu and
                  Liting Zhang},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {On the Unprovable Security of 2-Key {XCBC}},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {230--238},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_17},
  doi          = {10.1007/978-3-540-70500-0\_17},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WangFWZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WenZWC08,
  author       = {Yan Wen and
                  Jinjing Zhao and
                  Huaimin Wang and
                  Jiannong Cao},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {Implicit Detection of Hidden Processes with a Feather-Weight Hardware-Assisted
                  Virtual Machine Monitor},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {361--375},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_27},
  doi          = {10.1007/978-3-540-70500-0\_27},
  timestamp    = {Tue, 14 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WenZWC08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YeWPZ08,
  author       = {Qingsong Ye and
                  Huaxiong Wang and
                  Josef Pieprzyk and
                  Xian{-}Mo Zhang},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {Efficient Disjointness Tests for Private Datasets},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {155--169},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_12},
  doi          = {10.1007/978-3-540-70500-0\_12},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/YeWPZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhangZW08,
  author       = {Lei Zhang and
                  Wentao Zhang and
                  Wenling Wu},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {Cryptanalysis of Reduced-Round {SMS4} Block Cipher},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {216--229},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_16},
  doi          = {10.1007/978-3-540-70500-0\_16},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhangZW08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Zhu08,
  author       = {Huafei Zhu},
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {Fully-Simulatable Oblivious Set Transfer},
  booktitle    = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  pages        = {141--154},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0\_11},
  doi          = {10.1007/978-3-540-70500-0\_11},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Zhu08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2008,
  editor       = {Yi Mu and
                  Willy Susilo and
                  Jennifer Seberry},
  title        = {Information Security and Privacy, 13th Australasian Conference, {ACISP}
                  2008, Wollongong, Australia, July 7-9, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5107},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-70500-0},
  doi          = {10.1007/978-3-540-70500-0},
  isbn         = {978-3-540-69971-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/2008.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Al-HinaiDHS07,
  author       = {Sultan Al{-}Hinai and
                  Ed Dawson and
                  Matthew Henricksen and
                  Leonie Ruth Simpson},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {On the Security of the {LILI} Family of Stream Ciphers Against Algebraic
                  Attacks},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {11--28},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_2},
  doi          = {10.1007/978-3-540-73458-1\_2},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/Al-HinaiDHS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Araki07,
  author       = {Toshinori Araki},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {Efficient (\emph{k}, \emph{n}) Threshold Secret Sharing Schemes Secure
                  Against Cheating from \emph{n}-1 Cheaters},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {133--142},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_11},
  doi          = {10.1007/978-3-540-73458-1\_11},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Araki07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ArakiO07,
  author       = {Toshinori Araki and
                  Satoshi Obana},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {Flaws in Some Secret Sharing Schemes Against Cheating},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {122--132},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_10},
  doi          = {10.1007/978-3-540-73458-1\_10},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ArakiO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AuSM07,
  author       = {Man Ho Au and
                  Willy Susilo and
                  Yi Mu},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {Practical Compact E-Cash},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {431--445},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_31},
  doi          = {10.1007/978-3-540-73458-1\_31},
  timestamp    = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/AuSM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AumassonFMV07,
  author       = {Jean{-}Philippe Aumasson and
                  Matthieu Finiasz and
                  Willi Meier and
                  Serge Vaudenay},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {\emph{TCH}\emph{o}: {A} Hardware-Oriented Trapdoor Cipher},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {184--199},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_15},
  doi          = {10.1007/978-3-540-73458-1\_15},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/AumassonFMV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BabbageCPR07,
  author       = {Steve Babbage and
                  Carlos Cid and
                  Norbert Pramstaller and
                  H{\aa}vard Raddum},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {An Analysis of the Hermes8 Stream Ciphers},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {1--10},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_1},
  doi          = {10.1007/978-3-540-73458-1\_1},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BabbageCPR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BhattacharyaMSC07,
  author       = {Debojyoti Bhattacharya and
                  Debdeep Mukhopadhyay and
                  Dhiman Saha and
                  Dipanwita Roy Chowdhury},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {Strengthening {NLS} Against Crossword Puzzle Attack},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {29--44},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_3},
  doi          = {10.1007/978-3-540-73458-1\_3},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BhattacharyaMSC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BilletRP07,
  author       = {Olivier Billet and
                  Matthew J. B. Robshaw and
                  Thomas Peyrin},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {On Building Hash Functions from Multivariate Quadratic Equations},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {82--95},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_7},
  doi          = {10.1007/978-3-540-73458-1\_7},
  timestamp    = {Mon, 29 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BilletRP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BirkettDNS07,
  author       = {James Birkett and
                  Alexander W. Dent and
                  Gregory Neven and
                  Jacob C. N. Schuldt},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {Efficient Chosen-Ciphertext Secure Identity-Based Encryption with
                  Wildcards},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {274--292},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_21},
  doi          = {10.1007/978-3-540-73458-1\_21},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BirkettDNS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BrandsDD07,
  author       = {Stefan Brands and
                  Liesje Demuynck and
                  Bart De Decker},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {A Practical System for Globally Revoking the Unlinkable Pseudonyms
                  of Unknown Users},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {400--415},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_29},
  doi          = {10.1007/978-3-540-73458-1\_29},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BrandsDD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BringerCIPTZ07,
  author       = {Julien Bringer and
                  Herv{\'{e}} Chabanne and
                  Malika Izabach{\`{e}}ne and
                  David Pointcheval and
                  Qiang Tang and
                  S{\'{e}}bastien Zimmer},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {An Application of the Goldwasser-Micali Cryptosystem to Biometric
                  Authentication},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {96--106},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_8},
  doi          = {10.1007/978-3-540-73458-1\_8},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/BringerCIPTZ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChangYSHL07,
  author       = {Donghoon Chang and
                  Moti Yung and
                  Jaechul Sung and
                  Seokhie Hong and
                  Sangjin Lee},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {Preimage Attack on the Parallel FFT-Hashing Function},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {59--67},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_5},
  doi          = {10.1007/978-3-540-73458-1\_5},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ChangYSHL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChuT07,
  author       = {Cheng{-}Kang Chu and
                  Wen{-}Guey Tzeng},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {Identity-Committable Signatures and Their Extension to Group-Oriented
                  Ring Signatures},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {323--337},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_24},
  doi          = {10.1007/978-3-540-73458-1\_24},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ChuT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DahmenOS07,
  author       = {Erik Dahmen and
                  Katsuyuki Okeya and
                  Daniel Schepers},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {245--258},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_19},
  doi          = {10.1007/978-3-540-73458-1\_19},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/DahmenOS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DamgardGK07,
  author       = {Ivan Damg{\aa}rd and
                  Martin Geisler and
                  Mikkel Kr{\o}igaard},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {Efficient and Secure Comparison for On-Line Auctions},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {416--430},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_30},
  doi          = {10.1007/978-3-540-73458-1\_30},
  timestamp    = {Fri, 02 Mar 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/DamgardGK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GolicB07,
  author       = {Jovan Dj. Golic and
                  Madalina Baltatu},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {Soft Generation of Secure Biometric Keys},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {107--121},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_9},
  doi          = {10.1007/978-3-540-73458-1\_9},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/GolicB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HayashiT07,
  author       = {Ryotaro Hayashi and
                  Keisuke Tanaka},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {Anonymity on Paillier's Trap-Door Permutation},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {200--214},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_16},
  doi          = {10.1007/978-3-540-73458-1\_16},
  timestamp    = {Thu, 29 Mar 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HayashiT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HuangMSWW07,
  author       = {Xinyi Huang and
                  Yi Mu and
                  Willy Susilo and
                  Duncan S. Wong and
                  Wei Wu},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {Certificateless Signature Revisited},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {308--322},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_23},
  doi          = {10.1007/978-3-540-73458-1\_23},
  timestamp    = {Mon, 25 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HuangMSWW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HuangW07,
  author       = {Qiong Huang and
                  Duncan S. Wong},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {Generic Certificateless Key Encapsulation Mechanism},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {215--229},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_17},
  doi          = {10.1007/978-3-540-73458-1\_17},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/HuangW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/IshiharaAHS07,
  author       = {Takeru Ishihara and
                  Hiroshi Aono and
                  Sadayuki Hongo and
                  Junji Shikata},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {Construction of Threshold (Hybrid) Encryption in the Random Oracle
                  Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure
                  Threshold {KEM}},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {259--273},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_20},
  doi          = {10.1007/978-3-540-73458-1\_20},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/IshiharaAHS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/JeongLSHL07,
  author       = {Kitae Jeong and
                  Changhoon Lee and
                  Jaechul Sung and
                  Seokhie Hong and
                  Jongin Lim},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64
                  and Eagle-128},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {143--157},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_12},
  doi          = {10.1007/978-3-540-73458-1\_12},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/JeongLSHL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiuJHDLPW07,
  author       = {Fen Liu and
                  Wen Ji and
                  Lei Hu and
                  Jintai Ding and
                  Shuwang Lv and
                  Andrei Pyshkin and
                  Ralf{-}Philipp Weinmann},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {Analysis of the {SMS4} Block Cipher},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {158--170},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_13},
  doi          = {10.1007/978-3-540-73458-1\_13},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LiuJHDLPW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PanigrahiKSM07,
  author       = {Suvasini Panigrahi and
                  Amlan Kundu and
                  Shamik Sural and
                  Arun K. Majumdar},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {Use of Dempster-Shafer Theory and Bayesian Inferencing for Fraud Detection
                  in Mobile Communication Networks},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {446--460},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_32},
  doi          = {10.1007/978-3-540-73458-1\_32},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PanigrahiKSM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PasiniV07,
  author       = {Sylvain Pasini and
                  Serge Vaudenay},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {Hash-and-Sign with Weak Hashing Made Secure},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {338--354},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_25},
  doi          = {10.1007/978-3-540-73458-1\_25},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PasiniV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PramstallerLR07,
  author       = {Norbert Pramstaller and
                  Mario Lamberger and
                  Vincent Rijmen},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {Second Preimages for Iterated Hash Functions and Their Implications
                  on MACs},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {68--81},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_6},
  doi          = {10.1007/978-3-540-73458-1\_6},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PramstallerLR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ReyhanitabarWS07,
  author       = {Mohammad Reza Reyhanitabar and
                  Shuhong Wang and
                  Reihaneh Safavi{-}Naini},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {Non-interactive Manual Channel Message Authentication Based on eTCR
                  Hash Functions},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {385--399},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_28},
  doi          = {10.1007/978-3-540-73458-1\_28},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ReyhanitabarWS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SrinathanRC07,
  author       = {Kannan Srinathan and
                  Prasad Raghavendra and
                  C. Pandu Rangan},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {On Proactive Perfectly Secure Message Transmission},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {461--473},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_33},
  doi          = {10.1007/978-3-540-73458-1\_33},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SrinathanRC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TartaryW07,
  author       = {Christophe Tartary and
                  Huaxiong Wang},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {Combining Prediction Hashing and {MDS} Codes for Efficient Multicast
                  Stream Authentication},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {293--307},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_22},
  doi          = {10.1007/978-3-540-73458-1\_22},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/TartaryW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WuBD07,
  author       = {Yongdong Wu and
                  Feng Bao and
                  Robert H. Deng},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {171--183},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_14},
  doi          = {10.1007/978-3-540-73458-1\_14},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WuBD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YajimaSNISKO07,
  author       = {Jun Yajima and
                  Yu Sasaki and
                  Yusuke Naito and
                  Terutoshi Iwasaki and
                  Takeshi Shimoyama and
                  Noboru Kunihiro and
                  Kazuo Ohta},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {A New Strategy for Finding a Differential Path of {SHA-1}},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {45--58},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_4},
  doi          = {10.1007/978-3-540-73458-1\_4},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YajimaSNISKO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YamamuraKN07,
  author       = {Akihiro Yamamura and
                  Takashi Kurokawa and
                  Junji Nakazato},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {Threshold Anonymous Group Identification and Zero-Knowledge Proof},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {370--384},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_27},
  doi          = {10.1007/978-3-540-73458-1\_27},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YamamuraKN07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Yasuda07,
  author       = {Kan Yasuda},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {"Sandwich" Is Indeed Secure: How to Authenticate a Message with Just
                  One Hashing},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {355--369},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_26},
  doi          = {10.1007/978-3-540-73458-1\_26},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Yasuda07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YoshinoOV07,
  author       = {Masayuki Yoshino and
                  Katsuyuki Okeya and
                  Camille Vuillaume},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {Double-Size Bipartite Modular Multiplication},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {230--244},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_18},
  doi          = {10.1007/978-3-540-73458-1\_18},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YoshinoOV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2007,
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1},
  doi          = {10.1007/978-3-540-73458-1},
  isbn         = {978-3-540-73457-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AbeCIK06,
  author       = {Masayuki Abe and
                  Yang Cui and
                  Hideki Imai and
                  Kaoru Kurosawa},
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {Tag-KEM from Set Partial Domain One-Way Permutations},
  booktitle    = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  pages        = {360--370},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656\_30},
  doi          = {10.1007/11780656\_30},
  timestamp    = {Wed, 08 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/AbeCIK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AdelsbachHS06,
  author       = {Andr{\'{e}} Adelsbach and
                  Ulrich Huber and
                  Ahmad{-}Reza Sadeghi},
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages},
  booktitle    = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  pages        = {136--147},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656\_12},
  doi          = {10.1007/11780656\_12},
  timestamp    = {Sat, 02 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/AdelsbachHS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AgudoLM06,
  author       = {Isaac Agudo and
                  Javier L{\'{o}}pez and
                  Jos{\'{e}} A. Montenegro},
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {Graphical Representation of Authorization Policies for Weighted Credentials},
  booktitle    = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  pages        = {383--394},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656\_32},
  doi          = {10.1007/11780656\_32},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/AgudoLM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Al-HinaiBCW06,
  author       = {Sultan Al{-}Hinai and
                  Lynn Margaret Batten and
                  Bernard D. Colbert and
                  Kenneth Koon{-}Ho Wong},
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {Algebraic Attacks on Clock-Controlled Stream Ciphers},
  booktitle    = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656\_1},
  doi          = {10.1007/11780656\_1},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/Al-HinaiBCW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AuSY06,
  author       = {Man Ho Au and
                  Willy Susilo and
                  Siu{-}Ming Yiu},
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {Event-Oriented \emph{k}-Times Revocable-iff-Linked Group Signatures},
  booktitle    = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  pages        = {223--234},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656\_19},
  doi          = {10.1007/11780656\_19},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/AuSY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BoydCM06,
  author       = {Colin Boyd and
                  Kim{-}Kwang Raymond Choo and
                  Anish Mathuria},
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {An Extension to Bellare and Rogaway {(1993)} Model: Resetting Compromised
                  Long-Term Keys},
  booktitle    = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  pages        = {371--382},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656\_31},
  doi          = {10.1007/11780656\_31},
  timestamp    = {Mon, 29 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BoydCM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BraekenLP06,
  author       = {An Braeken and
                  Joseph Lano and
                  Bart Preneel},
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {Evaluating the Resistance of Stream Ciphers with Linear Feedback Against
                  Fast Algebraic Attacks},
  booktitle    = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  pages        = {40--51},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656\_4},
  doi          = {10.1007/11780656\_4},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BraekenLP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BurmesterLM06,
  author       = {Mike Burmester and
                  Tri Van Le and
                  Breno de Medeiros},
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {Towards Provable Security for Ubiquitous Applications},
  booktitle    = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  pages        = {295--312},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656\_25},
  doi          = {10.1007/11780656\_25},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BurmesterLM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChoP06,
  author       = {Joo Yeon Cho and
                  Josef Pieprzyk},
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {Distinguishing Attack on {SOBER-128} with Linear Masking},
  booktitle    = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  pages        = {29--39},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656\_3},
  doi          = {10.1007/11780656\_3},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ChoP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/CourtoisDG06,
  author       = {Nicolas T. Courtois and
                  Blandine Debraize and
                  Eric Garrido},
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {On Exact Algebraic [Non-]Immunity of S-Boxes Based on Power Functions},
  booktitle    = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  pages        = {76--86},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656\_7},
  doi          = {10.1007/11780656\_7},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/CourtoisDG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DuanC06,
  author       = {Shanshan Duan and
                  Zhenfu Cao},
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {Efficient and Provably Secure Multi-receiver Identity-Based Signcryption},
  booktitle    = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  pages        = {195--206},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656\_17},
  doi          = {10.1007/11780656\_17},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/DuanC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/FayyoumiO06,
  author       = {Ebaa Fayyoumi and
                  B. John Oommen},
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {On Optimizing the \emph{k}-Ward Micro-aggregation Technique for Secure
                  Statistical Databases},
  booktitle    = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  pages        = {324--335},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656\_27},
  doi          = {10.1007/11780656\_27},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/FayyoumiO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/FournierT06,
  author       = {Jacques J. A. Fournier and
                  Michael Tunstall},
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {Cache Based Power Analysis Attacks on {AES}},
  booktitle    = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  pages        = {17--28},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656\_2},
  doi          = {10.1007/11780656\_2},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/FournierT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GauravaramMDV06,
  author       = {Praveen Gauravaram and
                  William Millan and
                  Ed Dawson and
                  Kapali Viswanathan},
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {Constructing Secure Hash Functions by Enhancing Merkle-Damg{\aa}rd
                  Construction},
  booktitle    = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  pages        = {407--420},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656\_34},
  doi          = {10.1007/11780656\_34},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/GauravaramMDV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HayashiT06,
  author       = {Ryotaro Hayashi and
                  Keisuke Tanaka},
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {{PA} in the Two-Key Setting and a Generic Conversion for Encryption
                  with Anonymity},
  booktitle    = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  pages        = {271--282},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656\_23},
  doi          = {10.1007/11780656\_23},
  timestamp    = {Thu, 29 Mar 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HayashiT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HenricksenD06,
  author       = {Matthew Henricksen and
                  Ed Dawson},
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium
                  4 and Beyond},
  booktitle    = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  pages        = {52--63},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656\_5},
  doi          = {10.1007/11780656\_5},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HenricksenD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HolfordC06,
  author       = {John W. Holford and
                  William J. Caelli},
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {The Role of the Self-Defending Object Concept in Developing Distributed
                  Security-Aware Applications},
  booktitle    = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  pages        = {183--194},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656\_16},
  doi          = {10.1007/11780656\_16},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HolfordC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HuWZD06,
  author       = {Bessie C. Hu and
                  Duncan S. Wong and
                  Zhenfeng Zhang and
                  Xiaotie Deng},
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {Key Replacement Attack Against a Generic Construction of Certificateless
                  Signature},
  booktitle    = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  pages        = {235--246},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656\_20},
  doi          = {10.1007/11780656\_20},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HuWZD06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Jiang06,
  author       = {Shaoquan Jiang},
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {Efficient Primitives from Exponentiation in Z\({}_{\mbox{p}}\)},
  booktitle    = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  pages        = {259--270},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656\_22},
  doi          = {10.1007/11780656\_22},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Jiang06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KiltzG06,
  author       = {Eike Kiltz and
                  David Galindo},
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without
                  Random Oracles},
  booktitle    = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  pages        = {336--347},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656\_28},
  doi          = {10.1007/11780656\_28},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KiltzG06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KitagawaYHZWMI06,
  author       = {Takashi Kitagawa and
                  Peng Yang and
                  Goichiro Hanaoka and
                  Rui Zhang and
                  Hajime Watanabe and
                  Kanta Matsuura and
                  Hideki Imai},
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {Generic Transforms to Acquire CCA-Security for Identity Based Encryption:
                  The Cases of FOpkc and {REACT}},
  booktitle    = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  pages        = {348--359},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656\_29},
  doi          = {10.1007/11780656\_29},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KitagawaYHZWMI06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LakshminarayananL06,
  author       = {Anantharaman Lakshminarayanan and
                  Tong{-}Lee Lim},
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {Augmented Certificate Revocation Lists},
  booktitle    = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  pages        = {87--98},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656\_8},
  doi          = {10.1007/11780656\_8},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LakshminarayananL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LeeKSHL06,
  author       = {Changhoon Lee and
                  Jongsung Kim and
                  Jaechul Sung and
                  Seokhie Hong and
                  Sangjin Lee},
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {Forgery and Key Recovery Attacks on {PMAC} and Mitchell's {TMAC} Variant},
  booktitle    = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  pages        = {421--431},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656\_35},
  doi          = {10.1007/11780656\_35},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LeeKSHL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/OgawaHI06,
  author       = {Kazuto Ogawa and
                  Goichiro Hanaoka and
                  Hideki Imai},
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {Adaptively Secure Traitor Tracing Against Key Exposure and Its Application
                  to Anywhere {TV} Service},
  booktitle    = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  pages        = {123--135},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656\_11},
  doi          = {10.1007/11780656\_11},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/OgawaHI06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Okeya06,
  author       = {Katsuyuki Okeya},
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {Side Channel Attacks Against HMACs Based on Block-Cipher Based Hash
                  Functions},
  booktitle    = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  pages        = {432--443},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656\_36},
  doi          = {10.1007/11780656\_36},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Okeya06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Overbeck06,
  author       = {Raphael Overbeck},
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {Statistical Decoding Revisited},
  booktitle    = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  pages        = {283--294},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656\_24},
  doi          = {10.1007/11780656\_24},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Overbeck06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PatersonS06,
  author       = {Kenneth G. Paterson and
                  Jacob C. N. Schuldt},
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {Efficient Identity-Based Signatures Secure in the Standard Model},
  booktitle    = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  pages        = {207--222},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656\_18},
  doi          = {10.1007/11780656\_18},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PatersonS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PengBDO06,
  author       = {Kun Peng and
                  Colin Boyd and
                  Ed Dawson and
                  Eiji Okamoto},
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {A Novel Range Test},
  booktitle    = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  pages        = {247--258},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656\_21},
  doi          = {10.1007/11780656\_21},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PengBDO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/QuynhT06,
  author       = {Anh{-}Quynh Nguyen and
                  Yoshiyasu Takefuji},
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {Towards an Invisible Honeypot Monitoring System},
  booktitle    = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  pages        = {111--122},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656\_10},
  doi          = {10.1007/11780656\_10},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/QuynhT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SimpsonH06,
  author       = {Leonie Ruth Simpson and
                  Matthew Henricksen},
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {Improved Cryptanalysis of {MAG}},
  booktitle    = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  pages        = {64--75},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656\_6},
  doi          = {10.1007/11780656\_6},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/SimpsonH06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SunLW06,
  author       = {Hung{-}Min Sun and
                  Yue{-}Hsun Lin and
                  Ming{-}Fung Wu},
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {{API} Monitoring System for Defeating Worms and Exploits in MS-Windows
                  System},
  booktitle    = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  pages        = {159--170},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656\_14},
  doi          = {10.1007/11780656\_14},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SunLW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/XuMS06,
  author       = {Shidi Xu and
                  Yi Mu and
                  Willy Susilo},
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {Online/Offline Signatures and Multisignatures for {AODV} and {DSR}
                  Routing Security},
  booktitle    = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  pages        = {99--110},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656\_9},
  doi          = {10.1007/11780656\_9},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/XuMS06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YinB06,
  author       = {Yin Yin and
                  Bao Li},
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {Secure Cross-Realm {C2C-PAKE} Protocol},
  booktitle    = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  pages        = {395--406},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656\_33},
  doi          = {10.1007/11780656\_33},
  timestamp    = {Thu, 08 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YinB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YuLP06,
  author       = {Yu Yu and
                  Jussipekka Leiwo and
                  A. Benjamin Premkumar},
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {Hiding Circuit Topology from Unbounded Reverse Engineers},
  booktitle    = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  pages        = {171--182},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656\_15},
  doi          = {10.1007/11780656\_15},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YuLP06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhuB06,
  author       = {Huafei Zhu and
                  Feng Bao},
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {More on Stand-Alone and Setup-Free Verifiably Committed Signatures},
  booktitle    = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  pages        = {148--158},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656\_13},
  doi          = {10.1007/11780656\_13},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhuB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhuB06a,
  author       = {Huafei Zhu and
                  Feng Bao},
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {Oblivious Scalar-Product Protocols},
  booktitle    = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  pages        = {313--323},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656\_26},
  doi          = {10.1007/11780656\_26},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhuB06a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2006,
  editor       = {Lynn Margaret Batten and
                  Reihaneh Safavi{-}Naini},
  title        = {Information Security and Privacy, 11th Australasian Conference, {ACISP}
                  2006, Melbourne, Australia, July 3-5, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4058},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11780656},
  doi          = {10.1007/11780656},
  isbn         = {3-540-35458-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/2006.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AngSM05,
  author       = {Russell Ang and
                  Reihaneh Safavi{-}Naini and
                  Luke McAven},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Cancelable Key-Based Fingerprint Templates},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {242--252},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_21},
  doi          = {10.1007/11506157\_21},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/AngSM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AsanoK05,
  author       = {Tomoyuki Asano and
                  Kazuya Kamio},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {A Tree Based One-Key Broadcast Encryption Scheme with Low Computational
                  Overhead},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {89--100},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_8},
  doi          = {10.1007/11506157\_8},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/AsanoK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AuraNG05,
  author       = {Tuomas Aura and
                  Aarthi Nagarajan and
                  Andrei V. Gurtov},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Analysis of the {HIP} Base Exchange Protocol},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {481--493},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_40},
  doi          = {10.1007/11506157\_40},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/AuraNG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Bevan05,
  author       = {R{\'{e}}gis Bevan},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Improved Zero Value Attack on {XTR}},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {207--217},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_18},
  doi          = {10.1007/11506157\_18},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Bevan05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BicakciCT05,
  author       = {Kemal Bicakci and
                  Bruno Crispo and
                  Andrew S. Tanenbaum},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Counting Abuses Using Flexible Off-line Credentials},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {548--559},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_46},
  doi          = {10.1007/11506157\_46},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BicakciCT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BlakleyB05,
  author       = {Bob Blakley and
                  G. R. Blakley},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {All Sail, No Anchor {III:} Risk Aggregation and Time's Arrow},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_1},
  doi          = {10.1007/11506157\_1},
  timestamp    = {Thu, 09 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BlakleyB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChoiHLS05,
  author       = {Kyu Young Choi and
                  Jung Yeon Hwang and
                  Dong Hoon Lee and
                  In Seog Seo},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {ID-based Authenticated Key Agreement for Low-Power Mobile Devices},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {494--505},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_41},
  doi          = {10.1007/11506157\_41},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ChoiHLS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChooH05,
  author       = {Kim{-}Kwang Raymond Choo and
                  Yvonne Hitchcock},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Security Requirements for Key Establishment Proof Models: Revisiting
                  Bellare-Rogaway and Jeong-Katz-Lee Protocols},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {429--442},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_36},
  doi          = {10.1007/11506157\_36},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ChooH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChowHYC05,
  author       = {Sherman S. M. Chow and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu and
                  Kam{-}Pui Chow},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Two Improved Partially Blind Signature Schemes from Bilinear Pairings},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {316--328},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_27},
  doi          = {10.1007/11506157\_27},
  timestamp    = {Wed, 10 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ChowHYC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ContiniS05,
  author       = {Scott Contini and
                  Igor E. Shparlinski},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {On Stern's Attack Against Secret Truncated Linear Congruential Generators},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {52--60},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_5},
  doi          = {10.1007/11506157\_5},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ContiniS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Dent05,
  author       = {Alexander W. Dent},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Hybrid Signcryption Schemes with Insider Security},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {253--266},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_22},
  doi          = {10.1007/11506157\_22},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Dent05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Desmedt05,
  author       = {Yvo Desmedt},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Potential Impacts of a Growing Gap Between Theory and Practice in
                  Information Security},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {532--536},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_44},
  doi          = {10.1007/11506157\_44},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Desmedt05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Doche05,
  author       = {Christophe Doche},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Redundant Trinomials for Finite Fields of Characteristic 2},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {122--133},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_11},
  doi          = {10.1007/11506157\_11},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Doche05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DuttaB05,
  author       = {Ratna Dutta and
                  Rana Barua},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Dynamic Group Key Agreement in Tree-Based Setting},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {101--112},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_9},
  doi          = {10.1007/11506157\_9},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/DuttaB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/FurukawaI05,
  author       = {Jun Furukawa and
                  Hideki Imai},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {An Efficient Group Signature Scheme from Bilinear Maps},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {455--467},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_38},
  doi          = {10.1007/11506157\_38},
  timestamp    = {Sat, 30 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/FurukawaI05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GalbraithHM05,
  author       = {Steven D. Galbraith and
                  Chris Heneghan and
                  James F. McKee},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Tunable Balancing of {RSA}},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {280--292},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_24},
  doi          = {10.1007/11506157\_24},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/GalbraithHM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GiansiracusaRCH05,
  author       = {Michelangelo Giansiracusa and
                  Selwyn Russell and
                  Andrew J. Clark and
                  John Hynd},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {An Improved Execution Integrity Solution for Mobile Agents},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {170--183},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_15},
  doi          = {10.1007/11506157\_15},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/GiansiracusaRCH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GoyalT05,
  author       = {Vipul Goyal and
                  Rohit Tripathy},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {An Efficient Solution to the {ARP} Cache Poisoning Problem},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {40--51},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_4},
  doi          = {10.1007/11506157\_4},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/GoyalT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GuoZT05,
  author       = {Xingyang Guo and
                  Quan Zhang and
                  Chaojing Tang},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {On the Security of Two Key-Updating Signature Schemes},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {506--517},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_42},
  doi          = {10.1007/11506157\_42},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/GuoZT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/IsshikiT05,
  author       = {Toshiyuki Isshiki and
                  Keisuke Tanaka},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {An (n-t)-out-of-n Threshold Ring Signature Scheme},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {406--416},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_34},
  doi          = {10.1007/11506157\_34},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/IsshikiT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/JinQSZ05,
  author       = {Hai Jin and
                  Weizhong Qiang and
                  Xuanhua Shi and
                  Deqing Zou},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {VO-Sec: An Access Control Framework for Dynamic Virtual Organization},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {370--381},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_31},
  doi          = {10.1007/11506157\_31},
  timestamp    = {Thu, 24 May 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/JinQSZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/King05,
  author       = {Brian King},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {An Efficient Implementation of a Threshold {RSA} Signature Scheme},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {382--393},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_32},
  doi          = {10.1007/11506157\_32},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/King05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KitamuraKT05,
  author       = {Izuru Kitamura and
                  Masanobu Katagi and
                  Tsuyoshi Takagi},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve
                  Cryptosystems of Genus Two},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {146--157},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_13},
  doi          = {10.1007/11506157\_13},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KitamuraKT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Kwon05,
  author       = {Soonhak Kwon},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Efficient Tate Pairing Computation for Elliptic Curves over Binary
                  Fields},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {134--145},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_12},
  doi          = {10.1007/11506157\_12},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Kwon05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LenstraW05,
  author       = {Arjen K. Lenstra and
                  Benne de Weger},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {On the Possibility of Constructing Meaningful Hash Collisions for
                  Public Keys},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {267--279},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_23},
  doi          = {10.1007/11506157\_23},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LenstraW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiYC05,
  author       = {Celia Li and
                  Cungang Yang and
                  Richard Cheung},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Key Management for Role Hierarchy in Distributed Systems},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {293--302},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_25},
  doi          = {10.1007/11506157\_25},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LiYC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LuiCHY05,
  author       = {Richard W. C. Lui and
                  Sherman S. M. Chow and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Role Activation Management in Role Based Access Control},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {358--369},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_30},
  doi          = {10.1007/11506157\_30},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/LuiCHY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LvH05,
  author       = {Jiqiang Lv and
                  Yongfei Han},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Enhanced {DES} Implementation Secure Against High-Order Differential
                  Power Analysis in Smartcards},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {195--206},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_17},
  doi          = {10.1007/11506157\_17},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LvH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/McCombW05,
  author       = {Tim McComb and
                  Luke Wildman},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {{SIFA:} {A} Tool for Evaluation of High-Grade Security Devices},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {230--241},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_20},
  doi          = {10.1007/11506157\_20},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/McCombW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/McCullaghC05,
  author       = {Adrian McCullagh and
                  William J. Caelli},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Who Goes There? Internet Banking: {A} Matter of Risk and Reward},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {336--357},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_29},
  doi          = {10.1007/11506157\_29},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/McCullaghC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Millan05,
  author       = {William Millan},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {New Cryptographic Applications of Boolean Function Equivalence Classes},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {572--583},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_48},
  doi          = {10.1007/11506157\_48},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Millan05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Mitchell05,
  author       = {Chris J. Mitchell},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Cryptanalysis of Two Variants of {PCBC} Mode When Used for Message
                  Integrity},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {560--571},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_47},
  doi          = {10.1007/11506157\_47},
  timestamp    = {Mon, 29 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Mitchell05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MiyajiT05,
  author       = {Atsuko Miyaji and
                  Yuuki Takano},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {On the Success Probability of chi\({}^{\mbox{2}}\)-attack on {RC6}},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {61--74},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_6},
  doi          = {10.1007/11506157\_6},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MiyajiT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/NakanishiKHF05,
  author       = {Toru Nakanishi and
                  Fumiaki Kubooka and
                  Naoto Hamada and
                  Nobuo Funabiki},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Group Signature Schemes with Membership Revocation for Large Groups},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {443--454},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_37},
  doi          = {10.1007/11506157\_37},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/NakanishiKHF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/OkeyaTV05,
  author       = {Katsuyuki Okeya and
                  Tsuyoshi Takagi and
                  Camille Vuillaume},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Efficient Representations on Koblitz Curves with Resistance to Side
                  Channel Attacks},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {218--229},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_19},
  doi          = {10.1007/11506157\_19},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/OkeyaTV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PaulP05,
  author       = {Souradyuti Paul and
                  Bart Preneel},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Solving Systems of Differential Equations of Addition},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {75--88},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_7},
  doi          = {10.1007/11506157\_7},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PaulP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PudneyS05,
  author       = {Phillip Pudney and
                  Jill Slay},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {An Investigation of Unauthorised Use of Wireless Networks in Adelaide,
                  South Australia},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {29--39},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_3},
  doi          = {10.1007/11506157\_3},
  timestamp    = {Thu, 26 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PudneyS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/RiebackCT05,
  author       = {Melanie R. Rieback and
                  Bruno Crispo and
                  Andrew S. Tanenbaum},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {{RFID} Guardian: {A} Battery-Powered Mobile Device for {RFID} Privacy
                  Management},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {184--194},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_16},
  doi          = {10.1007/11506157\_16},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/RiebackCT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SteketeeBNM05,
  author       = {Chris Steketee and
                  Jaimee Brown and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Paul Montague},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {{GBD} Threshold Cryptography with an Application to {RSA} Key Recovery},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {394--405},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_33},
  doi          = {10.1007/11506157\_33},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SteketeeBNM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SusiloM05,
  author       = {Willy Susilo and
                  Yi Mu},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {On the Security of Nominative Signatures},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {329--335},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_28},
  doi          = {10.1007/11506157\_28},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SusiloM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TschofenigGYNS05,
  author       = {Hannes Tschofenig and
                  Andrei V. Gurtov and
                  Jukka Ylitalo and
                  Aarthi Nagarajan and
                  Murugaraj Shanmugam},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Traversing Middleboxes with the Host Identity Protocol},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {17--28},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_2},
  doi          = {10.1007/11506157\_2},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/TschofenigGYNS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WangZ05,
  author       = {Shujing Wang and
                  Yan Zhang},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {A Formalization of Distributed Authorization with Delegation},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {303--315},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_26},
  doi          = {10.1007/11506157\_26},
  timestamp    = {Wed, 27 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WangZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WeiYZ05,
  author       = {Victor K. Wei and
                  Tsz Hon Yuen and
                  Fangguo Zhang},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Group Signature Where Group Manager, Members and Open Authority Are
                  Identity-Based},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {468--480},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_39},
  doi          = {10.1007/11506157\_39},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/WeiYZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WongC05,
  author       = {C. K. Wong and
                  Agnes Chan},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Immediate Data Authentication for Multicast in Resource Constrained
                  Network},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {113--121},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_10},
  doi          = {10.1007/11506157\_10},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WongC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YangBD05,
  author       = {Yanjiang Yang and
                  Feng Bao and
                  Robert H. Deng},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Security Analysis and Fix of an Anonymous Credential System},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {537--547},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_45},
  doi          = {10.1007/11506157\_45},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/YangBD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YangC05,
  author       = {Bo{-}Yin Yang and
                  Jiun{-}Ming Chen},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Building Secure Tame-like Multivariate Public-Key Cryptosystems: The
                  New {TTS}},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {518--531},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_43},
  doi          = {10.1007/11506157\_43},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YangC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YangWD05,
  author       = {Guomin Yang and
                  Duncan S. Wong and
                  Xiaotie Deng},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Deposit-Case Attack Against Secure Roaming},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {417--428},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_35},
  doi          = {10.1007/11506157\_35},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YangWD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YaoPD05,
  author       = {Ming Yao and
                  Kun Peng and
                  Ed Dawson},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Using "Fair Forfeit" to Prevent Truncation Attacks on Mobile Agents},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {158--169},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_14},
  doi          = {10.1007/11506157\_14},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YaoPD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2005,
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/b137750},
  doi          = {10.1007/B137750},
  isbn         = {3-540-26547-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AndersonBDST04,
  author       = {Erik Anderson and
                  Cheryl L. Beaver and
                  Timothy Draelos and
                  Richard Schroeppel and
                  Mark Torgerson},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {ManTiCore: Encryption with Joint Cipher-State Authentication},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {440--453},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_38},
  doi          = {10.1007/978-3-540-27800-9\_38},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/AndersonBDST04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Asano04,
  author       = {Tomoyuki Asano},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {Secure and Insecure Modifications of the Subset Difference Broadcast
                  Encryption Scheme},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {12--23},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_2},
  doi          = {10.1007/978-3-540-27800-9\_2},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Asano04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AvoineV04,
  author       = {Gildas Avoine and
                  Serge Vaudenay},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {Optimistic Fair Exchange Based on Publicly Verifiable Secret Sharing},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {74--85},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_7},
  doi          = {10.1007/978-3-540-27800-9\_7},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/AvoineV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Bao04,
  author       = {Feng Bao},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {Analysis of a Conference Scheme Under Active and Passive Attacks},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {157--163},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_14},
  doi          = {10.1007/978-3-540-27800-9\_14},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/Bao04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BaoWZZ04,
  author       = {Feng Bao and
                  Guilin Wang and
                  Jianying Zhou and
                  Huafei Zhu},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {Analysis and Improvement of Micali's Fair Contract Signing Protocol},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {176--187},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_16},
  doi          = {10.1007/978-3-540-27800-9\_16},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/BaoWZZ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Chang04,
  author       = {Yan{-}Cheng Chang},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {Single Database Private Information Retrieval with Logarithmic Communication},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {50--61},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_5},
  doi          = {10.1007/978-3-540-27800-9\_5},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Chang04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/CrispoPT04,
  author       = {Bruno Crispo and
                  Bogdan C. Popescu and
                  Andrew S. Tanenbaum},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {Symmetric Key Authentication Services Revisited},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {248--261},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_22},
  doi          = {10.1007/978-3-540-27800-9\_22},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/CrispoPT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GalbraithHS04,
  author       = {Steven D. Galbraith and
                  Herbie J. Hopkins and
                  Igor E. Shparlinski},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {Secure Bilinear Diffie-Hellman Bits},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {370--378},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_32},
  doi          = {10.1007/978-3-540-27800-9\_32},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/GalbraithHS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GiraudK04,
  author       = {Christophe Giraud and
                  Erik Woodward Knudsen},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {Fault Attacks on Signature Schemes},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {478--491},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_41},
  doi          = {10.1007/978-3-540-27800-9\_41},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/GiraudK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HanLS04,
  author       = {Dong{-}Guk Han and
                  Jongin Lim and
                  Kouichi Sakurai},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {On Security of {XTR} Public Key Cryptosystems Against Side Channel
                  Attacks},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {454--465},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_39},
  doi          = {10.1007/978-3-540-27800-9\_39},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/HanLS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HanaokaIMNOW04,
  author       = {Goichiro Hanaoka and
                  Hideki Imai and
                  J{\"{o}}rn M{\"{u}}ller{-}Quade and
                  Anderson C. A. Nascimento and
                  Akira Otsuka and
                  Andreas J. Winter},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {Information Theoretically Secure Oblivious Polynomial Evaluation:
                  Model, Bounds, and Constructions},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {62--73},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_6},
  doi          = {10.1007/978-3-540-27800-9\_6},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HanaokaIMNOW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HuangW04,
  author       = {Zhenjie Huang and
                  Yumin Wang},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {Convertible Nominative Signatures},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {348--357},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_30},
  doi          = {10.1007/978-3-540-27800-9\_30},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/HuangW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/IwataK04,
  author       = {Tetsu Iwata and
                  Kaoru Kurosawa},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {How to Re-use Round Function in Super-Pseudorandom Permutation},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {224--235},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_20},
  doi          = {10.1007/978-3-540-27800-9\_20},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/IwataK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Jacobson04,
  author       = {Michael J. Jacobson Jr.},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {The Security of Cryptosystems Based on Class Semigroups of Imaginary
                  Quadratic Non-maximal Orders},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {149--156},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_13},
  doi          = {10.1007/978-3-540-27800-9\_13},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Jacobson04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KimHL04,
  author       = {Chong Hee Kim and
                  Yong Ho Hwang and
                  Pil Joong Lee},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {{TTS} without Revocation Capability Secure Against {CCA2}},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {36--49},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_4},
  doi          = {10.1007/978-3-540-27800-9\_4},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KimHL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KimKHLH04,
  author       = {Jongsung Kim and
                  Guil Kim and
                  Seokhie Hong and
                  Sangjin Lee and
                  Dowon Hong},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {The Related-Key Rectangle Attack - Application to {SHACAL-1}},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {123--136},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_11},
  doi          = {10.1007/978-3-540-27800-9\_11},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KimKHLH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KingR04,
  author       = {Brian King and
                  Ben Rubin},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {Improvements to the Point Halving Algorithm},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {262--276},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_23},
  doi          = {10.1007/978-3-540-27800-9\_23},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KingR04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KoLHL04,
  author       = {Youngdai Ko and
                  Changhoon Lee and
                  Seokhie Hong and
                  Sangjin Lee},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {Related Key Differential Cryptanalysis of Full-Round {SPECTR-H64}
                  and {CIKS-1}},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {137--148},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_12},
  doi          = {10.1007/978-3-540-27800-9\_12},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KoLHL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KurosawaM04,
  author       = {Kaoru Kurosawa and
                  Toshihiko Matsuo},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {How to Remove {MAC} from {DHIES}},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {236--247},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_21},
  doi          = {10.1007/978-3-540-27800-9\_21},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KurosawaM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LeeNSCLS04,
  author       = {Wonil Lee and
                  Mridul Nandi and
                  Palash Sarkar and
                  Donghoon Chang and
                  Sangjin Lee and
                  Kouichi Sakurai},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {Pseudorandomness of SPN-Type Transformations},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {212--223},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_19},
  doi          = {10.1007/978-3-540-27800-9\_19},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LeeNSCLS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LenstraV04,
  author       = {Arjen K. Lenstra and
                  Tim Voss},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {Information Security Risk Assessment, Aggregation, and Mitigation},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {391--401},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_34},
  doi          = {10.1007/978-3-540-27800-9\_34},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LenstraV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Lim04,
  author       = {Chae Hoon Lim},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {A New Method for Securing Elliptic Scalar Multiplication Against Side-Channel
                  Attacks},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {289--300},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_25},
  doi          = {10.1007/978-3-540-27800-9\_25},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Lim04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiuWW04,
  author       = {Joseph K. Liu and
                  Victor K. Wei and
                  Duncan S. Wong},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended
                  Abstract)},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {325--335},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_28},
  doi          = {10.1007/978-3-540-27800-9\_28},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LiuWW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/McAvenSY04,
  author       = {Luke McAven and
                  Reihaneh Safavi{-}Naini and
                  Moti Yung},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {Unconditionally Secure Encryption Under Strong Attacks},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {427--439},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_37},
  doi          = {10.1007/978-3-540-27800-9\_37},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/McAvenSY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MinYK04,
  author       = {SungJun Min and
                  Go Yamamoto and
                  Kwangjo Kim},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {Weak Property of Malleability in NTRUSign},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {379--390},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_33},
  doi          = {10.1007/978-3-540-27800-9\_33},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MinYK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/NakaharaPV04,
  author       = {Jorge Nakahara Jr. and
                  Bart Preneel and
                  Joos Vandewalle},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {The Biryukov-Demirci Attack on Reduced-Round Versions of {IDEA} and
                  {MESH} Ciphers},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {98--109},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_9},
  doi          = {10.1007/978-3-540-27800-9\_9},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/NakaharaPV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/NakanishiS04,
  author       = {Toru Nakanishi and
                  Yuji Sugiyama},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {A Group Signature Scheme with Efficient Membership Revocation for
                  Reasonable Groups},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {336--347},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_29},
  doi          = {10.1007/978-3-540-27800-9\_29},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/NakanishiS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/OkeyaTV04,
  author       = {Katsuyuki Okeya and
                  Tsuyoshi Takagi and
                  Camille Vuillaume},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {On the Exact Flexibility of the Flexible Countermeasure Against Side
                  Channel Attacks},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {466--477},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_40},
  doi          = {10.1007/978-3-540-27800-9\_40},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/OkeyaTV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PeinadoCEM04,
  author       = {Marcus Peinado and
                  Yuqun Chen and
                  Paul England and
                  John Manferdelli},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {{NGSCB:} {A} Trusted Open System},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {86--97},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_8},
  doi          = {10.1007/978-3-540-27800-9\_8},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PeinadoCEM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/RuanV04,
  author       = {Chun Ruan and
                  Vijay Varadharajan},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {A Weighted Graph Approach to Authorization Delegation and Conflict
                  Resolution},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {402--413},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_35},
  doi          = {10.1007/978-3-540-27800-9\_35},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/RuanV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ShaoquanG04,
  author       = {Shaoquan Jiang and
                  Guang Gong},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {Multi-service Oriented Broadcast Encryption},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {1--11},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_1},
  doi          = {10.1007/978-3-540-27800-9\_1},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ShaoquanG04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ShinKKHL04,
  author       = {YongSup Shin and
                  Jongsung Kim and
                  Guil Kim and
                  Seokhie Hong and
                  Sangjin Lee},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {Differential-Linear Type Attacks on Reduced Rounds of {SHACAL-2}},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {110--122},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_10},
  doi          = {10.1007/978-3-540-27800-9\_10},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ShinKKHL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SusiloZM04,
  author       = {Willy Susilo and
                  Fangguo Zhang and
                  Yi Mu},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {Identity-Based Strong Designated Verifier Signature Schemes},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {313--324},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_27},
  doi          = {10.1007/978-3-540-27800-9\_27},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/SusiloZM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TinVBN04,
  author       = {Yiu Shing Terry Tin and
                  Harikrishna Vasanta and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {Protocols with Security Proofs for Mobile Applications},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {358--369},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_31},
  doi          = {10.1007/978-3-540-27800-9\_31},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/TinVBN04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ToS04,
  author       = {Vu Dong T{\^{o}} and
                  Reihaneh Safavi{-}Naini},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {Linear Code Implies Public-Key Traitor Tracing with Revocation},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {24--35},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_3},
  doi          = {10.1007/978-3-540-27800-9\_3},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ToS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Vaudenay04,
  author       = {Serge Vaudenay},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {Digital Signature Schemes with Domain Parameters: Yet Another Parameter
                  Issue in {ECDSA}},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {188--199},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_17},
  doi          = {10.1007/978-3-540-27800-9\_17},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Vaudenay04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WanW04,
  author       = {Zhiguo Wan and
                  Shuhong Wang},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {Cryptanalysis of Two Password-Authenticated Key Exchange Protocols},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {164--175},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_15},
  doi          = {10.1007/978-3-540-27800-9\_15},
  timestamp    = {Sat, 14 Apr 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WanW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YangC04,
  author       = {Bo{-}Yin Yang and
                  Jiun{-}Ming Chen},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {Theoretical Analysis of {XL} over Small Fields},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {277--288},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_24},
  doi          = {10.1007/978-3-540-27800-9\_24},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YangC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YaoHMFD04,
  author       = {Ming Yao and
                  Matthew Henricksen and
                  Greg Maitland and
                  Ernest Foo and
                  Ed Dawson},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {A Mobile Agent System Providing Offer Privacy},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {301--312},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_26},
  doi          = {10.1007/978-3-540-27800-9\_26},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YaoHMFD04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YumL04,
  author       = {Dae Hyun Yum and
                  Pil Joong Lee},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {Generic Construction of Certificateless Signature},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {200--211},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_18},
  doi          = {10.1007/978-3-540-27800-9\_18},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YumL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhaoLCGS04,
  author       = {Xibin Zhao and
                  Kwok{-}Yan Lam and
                  Siu Leung Chung and
                  Ming Gu and
                  Jia{-}Guang Sun},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {Authorization Mechanisms for Virtual Organizations in Distributed
                  Computing Systems},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {414--426},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_36},
  doi          = {10.1007/978-3-540-27800-9\_36},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhaoLCGS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2004,
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/b98755},
  doi          = {10.1007/B98755},
  isbn         = {3-540-22379-7},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AbeI03,
  author       = {Masayuki Abe and
                  Hideki Imai},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Flaws in Some Robust Optimistic Mix-Nets},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {39--50},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_4},
  doi          = {10.1007/3-540-45067-X\_4},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/AbeI03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Arita03,
  author       = {Seigo Arita},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {An Addition Algorithm in Jacobian of C\({}_{\mbox{34}}\) Curve},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {93--105},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_9},
  doi          = {10.1007/3-540-45067-X\_9},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Arita03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Bao03,
  author       = {Feng Bao},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Cryptanalysis of a New Cellular Automata Cryptosystem},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {416--427},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_36},
  doi          = {10.1007/3-540-45067-X\_36},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/Bao03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BullSNZ03,
  author       = {Laurence Bull and
                  David McG. Squire and
                  Jan Newmarch and
                  Yuliang Zheng},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Grouping Verifiable Content for Selective Disclosure},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {1--12},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_1},
  doi          = {10.1007/3-540-45067-X\_1},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/BullSNZ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/CanardT03,
  author       = {S{\'{e}}bastien Canard and
                  Jacques Traor{\'{e}}},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {On Fair E-cash Systems Based on Group Signature Schemes},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {237--248},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_21},
  doi          = {10.1007/3-540-45067-X\_21},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/CanardT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChenY03,
  author       = {Chien{-}Ning Chen and
                  Sung{-}Ming Yen},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Differential Fault Analysis on {AES} Key Schedule and Some Coutnermeasures},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {118--129},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_11},
  doi          = {10.1007/3-540-45067-X\_11},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ChenY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DamgardJ03,
  author       = {Ivan Damg{\aa}rd and
                  Mads Jurik},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {A Length-Flexible Threshold Cryptosystem with Applications},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {350--364},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_30},
  doi          = {10.1007/3-540-45067-X\_30},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/DamgardJ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DazaHS03,
  author       = {Vanesa Daza and
                  Javier Herranz and
                  Germ{\'{a}}n S{\'{a}}ez},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Constructing General Dynamic Group Key Distribution Schemes with Decentralized
                  User Join},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {464--475},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_40},
  doi          = {10.1007/3-540-45067-X\_40},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/DazaHS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Gong03,
  author       = {Li Gong},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Is Cross-Platform Security Possible?},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {402},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_34},
  doi          = {10.1007/3-540-45067-X\_34},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Gong03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GuPSLNS03,
  author       = {Jabeom Gu and
                  Sehyun Park and
                  Ohyoung Song and
                  Jaeil Lee and
                  Jaehoon Nah and
                  Sung Won Sohn},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Mobile {PKI:} {A} PKI-Based Authentication Framework for the Next
                  Generation Mobile Communications},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {180--191},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_16},
  doi          = {10.1007/3-540-45067-X\_16},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/GuPSLNS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HanCJPKR03,
  author       = {Dong{-}Guk Han and
                  Nam Su Chang and
                  Seok Won Jung and
                  Young{-}Ho Park and
                  Chang Han Kim and
                  Heuisu Ryu},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Cryptanalysis of the Full Version Randomized Addition-Subtraction
                  Chains},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {67--78},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_7},
  doi          = {10.1007/3-540-45067-X\_7},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/HanCJPKR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HanHHK03,
  author       = {Daewan Han and
                  Jin Hong and
                  Jae Woo Han and
                  Daesung Kwon},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Key Recovery Attacks on {NTRU} without Ciphertext Validation Routine},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {274--284},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_24},
  doi          = {10.1007/3-540-45067-X\_24},
  timestamp    = {Mon, 29 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HanHHK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HanaokaOMOMOGNI03,
  author       = {Goichiro Hanaoka and
                  Kazuto Ogawa and
                  Itsuro Murota and
                  Go Ohtake and
                  Keigo Majima and
                  Kimiyuki Oyamada and
                  Seiichi Gohshi and
                  Seiichi Namba and
                  Hideki Imai},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Separating Encryption and Key Issuance in Digital Rights Management
                  Systems},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {365--376},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_31},
  doi          = {10.1007/3-540-45067-X\_31},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HanaokaOMOMOGNI03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HengK03,
  author       = {Swee{-}Huay Heng and
                  Kaoru Kurosawa},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Square Hash with a Small Key Size},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {522--531},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_45},
  doi          = {10.1007/3-540-45067-X\_45},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HengK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HitchcockMCD03,
  author       = {Yvonne Hitchcock and
                  Paul Montague and
                  Gary Carter and
                  Ed Dawson},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {The Security of Fixed versus Random Elliptic Curves in Cryptography},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {55--66},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_6},
  doi          = {10.1007/3-540-45067-X\_6},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HitchcockMCD03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HwangKL03,
  author       = {Yong Ho Hwang and
                  Chong Hee Kim and
                  Pil Joong Lee},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {An Efficient Revocation Scheme with Minimal Message Length for Stateless
                  Receivers},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {377--386},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_32},
  doi          = {10.1007/3-540-45067-X\_32},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HwangKL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HwangKLL03,
  author       = {Jung Yeon Hwang and
                  Hyun{-}Jeong Kim and
                  Dong Hoon Lee and
                  Jong In Lim},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Digital Signature Schemes with Restriction on Signing Capability},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {324--335},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_28},
  doi          = {10.1007/3-540-45067-X\_28},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/HwangKLL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HwangYL03,
  author       = {Yong Ho Hwang and
                  Dae Hyun Yum and
                  Pil Joong Lee},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {{EPA:} An Efficient Password-Based Protocal for Authenticated Key
                  Exchange},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {452--463},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_39},
  doi          = {10.1007/3-540-45067-X\_39},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HwangYL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/IwataYK03,
  author       = {Tetsu Iwata and
                  Tohru Yagi and
                  Kaoru Kurosawa},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {On the Pseudorandomness of {KASUMI} Type Permutations},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {130--141},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_12},
  doi          = {10.1007/3-540-45067-X\_12},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/IwataYK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Kanso03,
  author       = {Ali Kanso},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Clock-Controlled Shrinking Generator of Feedback Shift Registers},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {443--451},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_38},
  doi          = {10.1007/3-540-45067-X\_38},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Kanso03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KawauchiT03,
  author       = {Kei Kawauchi and
                  Mitsuru Tada},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {On the Extract Security of Multi-signature Schemes Based on {RSA}},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {336--349},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_29},
  doi          = {10.1007/3-540-45067-X\_29},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KawauchiT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KhooG03,
  author       = {Khoongming Khoo and
                  Guang Gong},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {New Constructions for Resilient and Highly Nonlinear Boolean Functions},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {498--509},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_43},
  doi          = {10.1007/3-540-45067-X\_43},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KhooG03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KimM03,
  author       = {Hwankoo Kim and
                  Sang{-}Jae Moon},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Public-Key Cryptosystems Based on Class Semigroups of Imaginary Quadratic
                  Non-maximal Orders},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {488--497},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_42},
  doi          = {10.1007/3-540-45067-X\_42},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KimM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KitazawaSM03,
  author       = {Shigeki Kitazawa and
                  Masakazu Soshi and
                  Atsuko Miyaji},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Evaluation of Anonymity of Practical Anonymous Communication Networks},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {13--26},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_2},
  doi          = {10.1007/3-540-45067-X\_2},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KitazawaSM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Kwon03,
  author       = {Taekyoung Kwon},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Robust Software Tokens - Yet Another Method for Securing User's Digital
                  Identity},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {476--487},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_41},
  doi          = {10.1007/3-540-45067-X\_41},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Kwon03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MatsuoK03,
  author       = {Toshihiko Matsuo and
                  Kaoru Kurosawa},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {On Parallel Hash Functions Based on Block-Cipher},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {510--521},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_44},
  doi          = {10.1007/3-540-45067-X\_44},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MatsuoK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/NarayananRK03,
  author       = {Arvind Narayanan and
                  C. Pandu Rangan and
                  Kwangjo Kim},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Practical Pay {TV} Schemes},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {192--203},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_17},
  doi          = {10.1007/3-540-45067-X\_17},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/NarayananRK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Odlyzko03,
  author       = {Andrew M. Odlyzko},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {The Unsolvable Privacy Problem and Its Implications for Security Technologies},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {51--54},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_5},
  doi          = {10.1007/3-540-45067-X\_5},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Odlyzko03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PashalidisM03,
  author       = {Andreas Pashalidis and
                  Chris J. Mitchell},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {A Taxonomy of Single Sign-On Systems},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {249--264},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_22},
  doi          = {10.1007/3-540-45067-X\_22},
  timestamp    = {Mon, 29 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PashalidisM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PengLR03,
  author       = {Tao Peng and
                  Christopher Leckie and
                  Kotagiri Ramamohanarao},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Detecting Distributed Denial of Service Attacks by Sharing Distributed
                  Beliefs},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {214--225},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_19},
  doi          = {10.1007/3-540-45067-X\_19},
  timestamp    = {Mon, 29 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PengLR03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Persiano03,
  author       = {Pino Persiano and
                  Ivan Visconti},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {An Anonymous Credential System and a Privacy-Aware {PKI}},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {27--38},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_3},
  doi          = {10.1007/3-540-45067-X\_3},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Persiano03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PieprzykP03,
  author       = {Josef Pieprzyk and
                  David Pointcheval},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Josef Pieprzyk, David Pointcheval},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {387--401},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_33},
  doi          = {10.1007/3-540-45067-X\_33},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/PieprzykP03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ReidCHS03,
  author       = {Jason Reid and
                  Ian Cheong and
                  Matthew Henricksen and
                  Jason Smith},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {A Novel Use of {RBAC} to Protect Privacy in Distributed Health Care
                  Information Systems},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {403--415},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_35},
  doi          = {10.1007/3-540-45067-X\_35},
  timestamp    = {Wed, 22 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ReidCHS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SinghNLS03,
  author       = {Abhishek Singh and
                  Ola Nordstr{\"{o}}m and
                  Chenghuai Lu and
                  Andr{\'{e}} L. M. dos Santos},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Malicious {ICMP} Tunneling: Defense against the Vulnerability},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {226--235},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_20},
  doi          = {10.1007/3-540-45067-X\_20},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SinghNLS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SongK03,
  author       = {Ha Yoon Song and
                  Han{-}gyoo Kim},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Cooperative Routers against DoS Attacks},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {204--213},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_18},
  doi          = {10.1007/3-540-45067-X\_18},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SongK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SungHL03,
  author       = {Jaechul Sung and
                  Deukjo Hong and
                  Sangjin Lee},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Key Recovery Attacks on the RMAC, TMAC, and {IACBC}},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {265--273},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_23},
  doi          = {10.1007/3-540-45067-X\_23},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SungHL03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TakenakaSK03,
  author       = {Masahiko Takenaka and
                  Takeshi Shimoyama and
                  Takeshi Koshiba},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Theoretical Analysis of chi\({}^{\mbox{2}}\) Attack on {RC6}},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {142--153},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_13},
  doi          = {10.1007/3-540-45067-X\_13},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/TakenakaSK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TanYS03,
  author       = {Chik How Tan and
                  Xun Yi and
                  Chee Kheong Siew},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {A {CCA2} Secure Key Encapsulation Scheme Based on 3rd Order Shift
                  Registers},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {428--442},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_37},
  doi          = {10.1007/3-540-45067-X\_37},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/TanYS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TinBN03,
  author       = {Yiu Shing Terry Tin and
                  Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk
                  Approach},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {166--179},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_15},
  doi          = {10.1007/3-540-45067-X\_15},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/TinBN03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WangC03,
  author       = {Libin Wang and
                  Kefei Chen},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {A Typed Theory for Access Control and Information Flow Control in
                  Mobile Systems},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {154--165},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_14},
  doi          = {10.1007/3-540-45067-X\_14},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WangC03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WeimerskirchSS03,
  author       = {Andr{\'{e}} Weimerskirch and
                  Douglas Stebila and
                  Sheueling Chang Shantz},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Generic {GF(2)} Arithmetic in Software and Its Application to {ECC}},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {79--92},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_8},
  doi          = {10.1007/3-540-45067-X\_8},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WeimerskirchSS03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Yen03,
  author       = {Sung{-}Ming Yen},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Amplified Differential Power Cryptanalysis on Rijndael Implementations
                  with Exponentially Fewer Power Traces},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {106--117},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_10},
  doi          = {10.1007/3-540-45067-X\_10},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Yen03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YenMH03,
  author       = {Sung{-}Ming Yen and
                  Sang{-}Jae Moon and
                  JaeCheol Ha},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Permanent Fault Attack on the Parameters of {RSA} with {CRT}},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {285--296},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_25},
  doi          = {10.1007/3-540-45067-X\_25},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YenMH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YoungY03,
  author       = {Adam L. Young and
                  Moti Yung},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {297--311},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_26},
  doi          = {10.1007/3-540-45067-X\_26},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/YoungY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhangK03,
  author       = {Fangguo Zhang and
                  Kwangjo Kim},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Efficient ID-Based Blind Signature and Proxy Signature from Bilinear
                  Pairings},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {312--323},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_27},
  doi          = {10.1007/3-540-45067-X\_27},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhangK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2003,
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X},
  doi          = {10.1007/3-540-45067-X},
  isbn         = {3-540-40515-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/2003.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BarwickJMW02,
  author       = {Susan G. Barwick and
                  Wen{-}Ai Jackson and
                  Keith M. Martin and
                  Peter R. Wild},
  editor       = {Lynn Margaret Batten and
                  Jennifer Seberry},
  title        = {Size of Broadcast in Threshold Schemes with Disenrollment},
  booktitle    = {Information Security and Privacy, 7th Australian Conference, {ACISP}
                  2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2384},
  pages        = {71--88},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45450-0\_6},
  doi          = {10.1007/3-540-45450-0\_6},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BarwickJMW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BennettGHP02,
  author       = {Krista Bennett and
                  Christian Grothoff and
                  Tzvetan Horozov and
                  Ioana Patrascu},
  editor       = {Lynn Margaret Batten and
                  Jennifer Seberry},
  title        = {Efficient Sharing of Encrypted Data},
  booktitle    = {Information Security and Privacy, 7th Australian Conference, {ACISP}
                  2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2384},
  pages        = {107--120},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45450-0\_8},
  doi          = {10.1007/3-540-45450-0\_8},
  timestamp    = {Wed, 14 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/BennettGHP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BiehlT02,
  author       = {Ingrid Biehl and
                  Tsuyoshi Takagi},
  editor       = {Lynn Margaret Batten and
                  Jennifer Seberry},
  title        = {A New Distributed Primality Test for Shared {RSA} Keys Using Quadratic
                  Fields},
  booktitle    = {Information Security and Privacy, 7th Australian Conference, {ACISP}
                  2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2384},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45450-0\_1},
  doi          = {10.1007/3-540-45450-0\_1},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BiehlT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChoieY02,
  author       = {YoungJu Choie and
                  D. Yun},
  editor       = {Lynn Margaret Batten and
                  Jennifer Seberry},
  title        = {Isomorphism Classes of Hyperelliptic Curves of Genus 2 over F\({}_{\mbox{q}}\)},
  booktitle    = {Information Security and Privacy, 7th Australian Conference, {ACISP}
                  2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2384},
  pages        = {190--202},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45450-0\_16},
  doi          = {10.1007/3-540-45450-0\_16},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ChoieY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ClarkDFGLMMS02,
  author       = {Andrew J. Clark and
                  Ed Dawson and
                  Joanne Fuller and
                  Jovan Dj. Golic and
                  Hoon{-}Jae Lee and
                  William Millan and
                  Sang{-}Jae Moon and
                  Leonie Simpson},
  editor       = {Lynn Margaret Batten and
                  Jennifer Seberry},
  title        = {The {LILI-II} Keystream Generator},
  booktitle    = {Information Security and Privacy, 7th Australian Conference, {ACISP}
                  2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2384},
  pages        = {25--39},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45450-0\_3},
  doi          = {10.1007/3-540-45450-0\_3},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ClarkDFGLMMS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/CubaleskaQS02,
  author       = {Biljana Cubaleska and
                  Weidong Qiu and
                  Markus Schneider},
  editor       = {Lynn Margaret Batten and
                  Jennifer Seberry},
  title        = {How to Play Sherlock Holmes in the World of Mobile Agents},
  booktitle    = {Information Security and Privacy, 7th Australian Conference, {ACISP}
                  2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2384},
  pages        = {449--463},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45450-0\_34},
  doi          = {10.1007/3-540-45450-0\_34},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/CubaleskaQS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/EnglandP02,
  author       = {Paul England and
                  Marcus Peinado},
  editor       = {Lynn Margaret Batten and
                  Jennifer Seberry},
  title        = {Authenticated Operation of Open Computing Devices},
  booktitle    = {Information Security and Privacy, 7th Australian Conference, {ACISP}
                  2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2384},
  pages        = {346--361},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45450-0\_27},
  doi          = {10.1007/3-540-45450-0\_27},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/EnglandP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/FischerS02,
  author       = {Wieland Fischer and
                  Jean{-}Pierre Seifert},
  editor       = {Lynn Margaret Batten and
                  Jennifer Seberry},
  title        = {Note on Fast Computation of Secret {RSA} Exponents},
  booktitle    = {Information Security and Privacy, 7th Australian Conference, {ACISP}
                  2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2384},
  pages        = {136--143},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45450-0\_10},
  doi          = {10.1007/3-540-45450-0\_10},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/FischerS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HanPPLLY02,
  author       = {Dong{-}Guk Han and
                  Hye{-}Young Park and
                  Young{-}Ho Park and
                  Sangjin Lee and
                  Dong Hoon Lee and
                  Hyungjin Yang},
  editor       = {Lynn Margaret Batten and
                  Jennifer Seberry},
  title        = {A Practical Approach Defeating Blackmailing},
  booktitle    = {Information Security and Privacy, 7th Australian Conference, {ACISP}
                  2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2384},
  pages        = {464--481},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45450-0\_35},
  doi          = {10.1007/3-540-45450-0\_35},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HanPPLLY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HendersonCDO02,
  author       = {Marie Henderson and
                  Robert S. Coulter and
                  Ed Dawson and
                  Eiji Okamoto},
  editor       = {Lynn Margaret Batten and
                  Jennifer Seberry},
  title        = {Modelling Trust Structures for Public Key Infrastructures},
  booktitle    = {Information Security and Privacy, 7th Australian Conference, {ACISP}
                  2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2384},
  pages        = {56--70},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45450-0\_5},
  doi          = {10.1007/3-540-45450-0\_5},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HendersonCDO02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HitchcockM02,
  author       = {Yvonne Hitchcock and
                  Paul Montague},
  editor       = {Lynn Margaret Batten and
                  Jennifer Seberry},
  title        = {A New Elliptic Curve Scalar Multiplication Algorithm to Resist Simple
                  Power Analysis},
  booktitle    = {Information Security and Privacy, 7th Australian Conference, {ACISP}
                  2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2384},
  pages        = {214--225},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45450-0\_18},
  doi          = {10.1007/3-540-45450-0\_18},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HitchcockM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HitchensVS02,
  author       = {Michael Hitchens and
                  Vijay Varadharajan and
                  Gregory Saunders},
  editor       = {Lynn Margaret Batten and
                  Jennifer Seberry},
  title        = {Policy Administration Domains},
  booktitle    = {Information Security and Privacy, 7th Australian Conference, {ACISP}
                  2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2384},
  pages        = {286--302},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45450-0\_23},
  doi          = {10.1007/3-540-45450-0\_23},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/HitchensVS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Hughes02,
  author       = {James P. Hughes},
  editor       = {Lynn Margaret Batten and
                  Jennifer Seberry},
  title        = {A Linear Algebraic Attack on the {AAFG1} Braid Group Cryptosystem},
  booktitle    = {Information Security and Privacy, 7th Australian Conference, {ACISP}
                  2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2384},
  pages        = {176--189},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45450-0\_15},
  doi          = {10.1007/3-540-45450-0\_15},
  timestamp    = {Mon, 29 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Hughes02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KimK02,
  author       = {Myungsun Kim and
                  Kwangjo Kim},
  editor       = {Lynn Margaret Batten and
                  Jennifer Seberry},
  title        = {A New Identification Scheme Based on the Bilinear Diffie-Hellman Problem},
  booktitle    = {Information Security and Privacy, 7th Australian Conference, {ACISP}
                  2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2384},
  pages        = {362--378},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45450-0\_28},
  doi          = {10.1007/3-540-45450-0\_28},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KimK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KimLY02,
  author       = {Hyun{-}Jeong Kim and
                  Dong Hoon Lee and
                  Moti Yung},
  editor       = {Lynn Margaret Batten and
                  Jennifer Seberry},
  title        = {Privacy against Piracy: Protecting Two-Level Revocable {P-K} Traitor
                  Tracing},
  booktitle    = {Information Security and Privacy, 7th Australian Conference, {ACISP}
                  2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2384},
  pages        = {482--496},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45450-0\_36},
  doi          = {10.1007/3-540-45450-0\_36},
  timestamp    = {Tue, 07 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/KimLY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/King02,
  author       = {Brian King},
  editor       = {Lynn Margaret Batten and
                  Jennifer Seberry},
  title        = {Requirements for Group Independent Linear Threshold Secret Sharing
                  Schemes},
  booktitle    = {Information Security and Privacy, 7th Australian Conference, {ACISP}
                  2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2384},
  pages        = {89--106},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45450-0\_7},
  doi          = {10.1007/3-540-45450-0\_7},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/King02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KumarSR02,
  author       = {M. V. N. Ashwin Kumar and
                  K. Srinathan and
                  C. Pandu Rangan},
  editor       = {Lynn Margaret Batten and
                  Jennifer Seberry},
  title        = {Asynchronous Perfectly Secure Computation Tolerating Generalized Adversaries},
  booktitle    = {Information Security and Privacy, 7th Australian Conference, {ACISP}
                  2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2384},
  pages        = {497--512},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45450-0\_37},
  doi          = {10.1007/3-540-45450-0\_37},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KumarSR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KurnioSW02,
  author       = {Hartono Kurnio and
                  Reihaneh Safavi{-}Naini and
                  Huaxiong Wang},
  editor       = {Lynn Margaret Batten and
                  Jennifer Seberry},
  title        = {A Secure Re-keying Scheme with Key Recovery Property},
  booktitle    = {Information Security and Privacy, 7th Australian Conference, {ACISP}
                  2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2384},
  pages        = {40--55},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45450-0\_4},
  doi          = {10.1007/3-540-45450-0\_4},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KurnioSW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MayHMCD02,
  author       = {Lauren May and
                  Matthew Henricksen and
                  William Millan and
                  Gary Carter and
                  Ed Dawson},
  editor       = {Lynn Margaret Batten and
                  Jennifer Seberry},
  title        = {Strengthening the Key Schedule of the {AES}},
  booktitle    = {Information Security and Privacy, 7th Australian Conference, {ACISP}
                  2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2384},
  pages        = {226--240},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45450-0\_19},
  doi          = {10.1007/3-540-45450-0\_19},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MayHMCD02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MuZV02,
  author       = {Yi Mu and
                  Junqi Zhang and
                  Vijay Varadharajan},
  editor       = {Lynn Margaret Batten and
                  Jennifer Seberry},
  title        = {m out of n Oblivious Transfer},
  booktitle    = {Information Security and Privacy, 7th Australian Conference, {ACISP}
                  2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2384},
  pages        = {395--405},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45450-0\_30},
  doi          = {10.1007/3-540-45450-0\_30},
  timestamp    = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MuZV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/OkeyaS02,
  author       = {Katsuyuki Okeya and
                  Kouichi Sakurai},
  editor       = {Lynn Margaret Batten and
                  Jennifer Seberry},
  title        = {On Insecurity of the Side Channel Attack Countermeasure Using Addition-Subtraction
                  Chains under Distinguishability between Addition and Doubling},
  booktitle    = {Information Security and Privacy, 7th Australian Conference, {ACISP}
                  2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2384},
  pages        = {420--435},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45450-0\_32},
  doi          = {10.1007/3-540-45450-0\_32},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/OkeyaS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ParkSCL02,
  author       = {Sangwoo Park and
                  Soo Hak Sung and
                  Seongtaek Chee and
                  Jongin Lim},
  editor       = {Lynn Margaret Batten and
                  Jennifer Seberry},
  title        = {On the Security of Reduced Versions of 3-Pass {HAVAL}},
  booktitle    = {Information Security and Privacy, 7th Australian Conference, {ACISP}
                  2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2384},
  pages        = {406--419},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45450-0\_31},
  doi          = {10.1007/3-540-45450-0\_31},
  timestamp    = {Fri, 18 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ParkSCL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PieprzykZ02,
  author       = {Josef Pieprzyk and
                  Xian{-}Mo Zhang},
  editor       = {Lynn Margaret Batten and
                  Jennifer Seberry},
  title        = {Cheating Prevention in Linear Secret Sharing},
  booktitle    = {Information Security and Privacy, 7th Australian Conference, {ACISP}
                  2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2384},
  pages        = {121--135},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45450-0\_9},
  doi          = {10.1007/3-540-45450-0\_9},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/PieprzykZ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ReyzinR02,
  author       = {Leonid Reyzin and
                  Natan Reyzin},
  editor       = {Lynn Margaret Batten and
                  Jennifer Seberry},
  title        = {Better than BiBa: Short One-Time Signatures with Fast Signing and
                  Verifying},
  booktitle    = {Information Security and Privacy, 7th Australian Conference, {ACISP}
                  2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2384},
  pages        = {144--153},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45450-0\_11},
  doi          = {10.1007/3-540-45450-0\_11},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ReyzinR02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Roy02,
  author       = {Bimal K. Roy},
  editor       = {Lynn Margaret Batten and
                  Jennifer Seberry},
  title        = {A Brief Outline of Research on Correlation Immune Functions},
  booktitle    = {Information Security and Privacy, 7th Australian Conference, {ACISP}
                  2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2384},
  pages        = {379--394},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45450-0\_29},
  doi          = {10.1007/3-540-45450-0\_29},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Roy02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/RuanV02,
  author       = {Chun Ruan and
                  Vijay Varadharajan},
  editor       = {Lynn Margaret Batten and
                  Jennifer Seberry},
  title        = {Resolving Conflicts in Authorization Delegations},
  booktitle    = {Information Security and Privacy, 7th Australian Conference, {ACISP}
                  2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2384},
  pages        = {271--285},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45450-0\_22},
  doi          = {10.1007/3-540-45450-0\_22},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/RuanV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SakuraiT02,
  author       = {Kouichi Sakurai and
                  Tsuyoshi Takagi},
  editor       = {Lynn Margaret Batten and
                  Jennifer Seberry},
  title        = {On the Security of a Modified Paillier Public-Key Primitive},
  booktitle    = {Information Security and Privacy, 7th Australian Conference, {ACISP}
                  2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2384},
  pages        = {436--448},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45450-0\_33},
  doi          = {10.1007/3-540-45450-0\_33},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SakuraiT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SebeD02,
  author       = {Francesc Seb{\'{e}} and
                  Josep Domingo{-}Ferrer},
  editor       = {Lynn Margaret Batten and
                  Jennifer Seberry},
  title        = {Short 3-Secure Fingerprinting Codes for Copyright Protection},
  booktitle    = {Information Security and Privacy, 7th Australian Conference, {ACISP}
                  2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2384},
  pages        = {316--327},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45450-0\_25},
  doi          = {10.1007/3-540-45450-0\_25},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SebeD02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SolderaSQ02,
  author       = {David Soldera and
                  Jennifer Seberry and
                  Chengxin Qu},
  editor       = {Lynn Margaret Batten and
                  Jennifer Seberry},
  title        = {The Analysis of Zheng-Seberry Scheme},
  booktitle    = {Information Security and Privacy, 7th Australian Conference, {ACISP}
                  2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2384},
  pages        = {159--168},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45450-0\_13},
  doi          = {10.1007/3-540-45450-0\_13},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SolderaSQ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SteinfeldBZ02,
  author       = {Ron Steinfeld and
                  Joonsang Baek and
                  Yuliang Zheng},
  editor       = {Lynn Margaret Batten and
                  Jennifer Seberry},
  title        = {On the Necessity of Strong Assumptions for the Security of a Class
                  of Asymmetric Encryption Schemes},
  booktitle    = {Information Security and Privacy, 7th Australian Conference, {ACISP}
                  2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2384},
  pages        = {241--256},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45450-0\_20},
  doi          = {10.1007/3-540-45450-0\_20},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/SteinfeldBZ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Tada02,
  author       = {Mitsuru Tada},
  editor       = {Lynn Margaret Batten and
                  Jennifer Seberry},
  title        = {An Order-Specified Multisignature Scheme Secure against Active Insider
                  Attacks},
  booktitle    = {Information Security and Privacy, 7th Australian Conference, {ACISP}
                  2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2384},
  pages        = {328--345},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45450-0\_26},
  doi          = {10.1007/3-540-45450-0\_26},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Tada02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WarrenB02,
  author       = {Matthew J. Warren and
                  Lynn Margaret Batten},
  editor       = {Lynn Margaret Batten and
                  Jennifer Seberry},
  title        = {Security Management: An Information Systems Setting},
  booktitle    = {Information Security and Privacy, 7th Australian Conference, {ACISP}
                  2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2384},
  pages        = {257--270},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45450-0\_21},
  doi          = {10.1007/3-540-45450-0\_21},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WarrenB02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Wu02,
  author       = {Hongjun Wu},
  editor       = {Lynn Margaret Batten and
                  Jennifer Seberry},
  title        = {Cryptanalysis of Stream Cipher Alpha1},
  booktitle    = {Information Security and Privacy, 7th Australian Conference, {ACISP}
                  2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2384},
  pages        = {169--175},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45450-0\_14},
  doi          = {10.1007/3-540-45450-0\_14},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Wu02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WuB02,
  author       = {Hongjun Wu and
                  Feng Bao},
  editor       = {Lynn Margaret Batten and
                  Jennifer Seberry},
  title        = {Cryptanalysis of Stream Cipher COS(2, 128) Mode {I}},
  booktitle    = {Information Security and Privacy, 7th Australian Conference, {ACISP}
                  2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2384},
  pages        = {154--158},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45450-0\_12},
  doi          = {10.1007/3-540-45450-0\_12},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/WuB02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YangBD02,
  author       = {Yanjiang Yang and
                  Feng Bao and
                  Robert H. Deng},
  editor       = {Lynn Margaret Batten and
                  Jennifer Seberry},
  title        = {Security Analysis and Improvement of the Global Key Recovery System},
  booktitle    = {Information Security and Privacy, 7th Australian Conference, {ACISP}
                  2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2384},
  pages        = {17--24},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45450-0\_2},
  doi          = {10.1007/3-540-45450-0\_2},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YangBD02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhangLK02,
  author       = {Fangguo Zhang and
                  Shengli Liu and
                  Kwangjo Kim},
  editor       = {Lynn Margaret Batten and
                  Jennifer Seberry},
  title        = {Compact Representation of Domain Parameters of Hyperelliptic Curve
                  Cryptosystems},
  booktitle    = {Information Security and Privacy, 7th Australian Conference, {ACISP}
                  2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2384},
  pages        = {203--213},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45450-0\_17},
  doi          = {10.1007/3-540-45450-0\_17},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhangLK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Zhou02,
  author       = {Jianying Zhou},
  editor       = {Lynn Margaret Batten and
                  Jennifer Seberry},
  title        = {Maintaining the Validity of Digital Signatures in {B2B} Applications},
  booktitle    = {Information Security and Privacy, 7th Australian Conference, {ACISP}
                  2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2384},
  pages        = {303--315},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45450-0\_24},
  doi          = {10.1007/3-540-45450-0\_24},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/Zhou02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2002,
  editor       = {Lynn Margaret Batten and
                  Jennifer Seberry},
  title        = {Information Security and Privacy, 7th Australian Conference, {ACISP}
                  2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2384},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45450-0},
  doi          = {10.1007/3-540-45450-0},
  isbn         = {3-540-43861-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/2002.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AnsperBSW01,
  author       = {Arne Ansper and
                  Ahto Buldas and
                  M{\"{a}}rt Saarepera and
                  Jan Willemson},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Improving the Availability of Time-Stamping Services},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {360--375},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_29},
  doi          = {10.1007/3-540-47719-5\_29},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/AnsperBSW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BaoDFGW01,
  author       = {Feng Bao and
                  Robert H. Deng and
                  Peirong Feng and
                  Yan Guo and
                  Hongjun Wu},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Secure and Private Distribution of Online Video and Some Related Cryptographic
                  Issues},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {190--205},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_17},
  doi          = {10.1007/3-540-47719-5\_17},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/BaoDFGW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BoydMN01,
  author       = {Colin Boyd and
                  Paul Montague and
                  Khanh Quoc Nguyen},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Elliptic Curve Based Password Authenticated Key Exchange Protocols},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {487--501},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_38},
  doi          = {10.1007/3-540-47719-5\_38},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BoydMN01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BrincatM01,
  author       = {Karl Brincat and
                  Chris J. Mitchell},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {New {CBC-MAC} Forgery Attacks},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {3--14},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_2},
  doi          = {10.1007/3-540-47719-5\_2},
  timestamp    = {Mon, 29 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BrincatM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChiPJL01,
  author       = {Sung{-}Do Chi and
                  Jong Sou Park and
                  Ki{-}Chan Jung and
                  Jang{-}Se Lee},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Network Security Modeling and Cyber Attack Simulation Methodology},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {320--333},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_26},
  doi          = {10.1007/3-540-47719-5\_26},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ChiPJL01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChoHOYHLPP01,
  author       = {Eun{-}Sun Cho and
                  Sunho Hong and
                  Sechang Oh and
                  Hongjin Yeh and
                  Manpyo Hong and
                  Cheol Won Lee and
                  Hyundong Park and
                  Chun{-}Sik Park},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {{SKETHIC:} Secure Kernel Extension against Trojan Horses with Information-Carrying
                  Codes},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {177--189},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_16},
  doi          = {10.1007/3-540-47719-5\_16},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ChoHOYHLPP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GhodosiP01,
  author       = {Hossein Ghodosi and
                  Josef Pieprzyk},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Democratic Systems},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {392--402},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_31},
  doi          = {10.1007/3-540-47719-5\_31},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/GhodosiP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GotoMSW01,
  author       = {Hideaki Goto and
                  Masahiro Mambo and
                  Hiroki Shizuya and
                  Yasuyoshi Watanabe},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Evaluation of Tamper-Resistant Software Deviating from Structured
                  Programming Rules},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {145--158},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_13},
  doi          = {10.1007/3-540-47719-5\_13},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/GotoMSW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HiroseY01,
  author       = {Shoichi Hirose and
                  Susumu Yoshida},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {A User Authentication Scheme with Identity and Location Privacy},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {235--246},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_20},
  doi          = {10.1007/3-540-47719-5\_20},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HiroseY01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ItoiAPR01,
  author       = {Naomaru Itoi and
                  William A. Arbaugh and
                  Samuela J. Pollack and
                  Daniel M. Reeves},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Personal Secure Booting},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {130--144},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_12},
  doi          = {10.1007/3-540-47719-5\_12},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ItoiAPR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/JungKRW01,
  author       = {Oliver Jung and
                  Sven Kuhn and
                  Christoph Ruland and
                  Kai Wollenweber},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Enhanced Modes of Operation for the Encryption in High-Speed Networks
                  and Their Impact on QoS},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {344--359},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_28},
  doi          = {10.1007/3-540-47719-5\_28},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/JungKRW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KangYHC01,
  author       = {Ju{-}Sung Kang and
                  Okyeon Yi and
                  Dowon Hong and
                  Hyun Sook Cho},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Pseudorandomness of MISTY-Type Transformations and the Block Cipher
                  {KASUMI}},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {60--73},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_7},
  doi          = {10.1007/3-540-47719-5\_7},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KangYHC01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KimM01,
  author       = {Hwankoo Kim and
                  Sang{-}Jae Moon},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {New Public-Key Cryptosystem Using Divisor Class Groups},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {74--83},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_8},
  doi          = {10.1007/3-540-47719-5\_8},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KimM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/King01,
  author       = {Brian King},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Randomness Required for Linear Threshold Sharing Schemes Defined over
                  Any Finite Abelian Group},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {376--391},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_30},
  doi          = {10.1007/3-540-47719-5\_30},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/King01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LeeKK01,
  author       = {Byoungcheon Lee and
                  Heesun Kim and
                  Kwangjo Kim},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Secure Mobile Agent Using Strong Non-designated Proxy Signature},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {474},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_37},
  doi          = {10.1007/3-540-47719-5\_37},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LeeKK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Lin01,
  author       = {Along Lin},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {A Knowledge-Based Approach to Internet Authorizations},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {292--304},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_24},
  doi          = {10.1007/3-540-47719-5\_24},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Lin01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiuOC01,
  author       = {Chuchang Liu and
                  Maris A. Ozols and
                  Anthony Cant},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {An Axiomatic Basis for Reasoning about Trust in PKIs},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {274--291},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_23},
  doi          = {10.1007/3-540-47719-5\_23},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LiuOC01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MaedaMT01,
  author       = {Ayako Maeda and
                  Atsuko Miyaji and
                  Mitsuru Tada},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Efficient and Unconditionally Secure Verifiable Threshold Changeable
                  Scheme},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {403--416},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_32},
  doi          = {10.1007/3-540-47719-5\_32},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MaedaMT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MayMS01,
  author       = {David May and
                  Henk L. Muller and
                  Nigel P. Smart},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Non-deterministic Processors},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {115--129},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_11},
  doi          = {10.1007/3-540-47719-5\_11},
  timestamp    = {Mon, 20 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/MayMS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MeyerNP01,
  author       = {Andreas Meyer and
                  Stefan Neis and
                  Thomas Pfahler},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {First Implementation of Cryptographic Protocols Based on Algebraic
                  Number Fields},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {84--103},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_9},
  doi          = {10.1007/3-540-47719-5\_9},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MeyerNP01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/NakanishiS01,
  author       = {Toru Nakanishi and
                  Yuji Sugiyama},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Anonymous Statistical Survey of Attributes},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {460--473},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_36},
  doi          = {10.1007/3-540-47719-5\_36},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/NakanishiS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Neumann01,
  author       = {B. Clifford Neuman},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Condition-Driven Integration of Security Services},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {176},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_15},
  doi          = {10.1007/3-540-47719-5\_15},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Neumann01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/OmoteM01,
  author       = {Kazumasa Omote and
                  Atsuko Miyaji},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {A Practical English Auction with One-Time Registration},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {221--234},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_19},
  doi          = {10.1007/3-540-47719-5\_19},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/OmoteM01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ParkKBD01,
  author       = {DongGook Park and
                  JungJoon Kim and
                  Colin Boyd and
                  Ed Dawson},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Cryptographic Salt: {A} Countermeasure against Denial-of-Service Attacks},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {334--343},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_27},
  doi          = {10.1007/3-540-47719-5\_27},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ParkKBD01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PavlovskiB01,
  author       = {Chris Pavlovski and
                  Colin Boyd},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Attacks Based on Small Factors in Various Group Structures},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {36--50},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_5},
  doi          = {10.1007/3-540-47719-5\_5},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/PavlovskiB01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SaeedniaSS01,
  author       = {Shahrokh Saeednia and
                  Reihaneh Safavi{-}Naini and
                  Willy Susilo},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {On Classifying Conference Key Distribution Protocols},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {51--59},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_6},
  doi          = {10.1007/3-540-47719-5\_6},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SaeedniaSS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Safavi-NainiSW01,
  author       = {Reihaneh Safavi{-}Naini and
                  Willy Susilo and
                  Huaxiong Wang},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {How to Construct Fail-Stop Confirmer Signature Schemes},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {435--444},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_34},
  doi          = {10.1007/3-540-47719-5\_34},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Safavi-NainiSW01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Shim01,
  author       = {Kyungah Shim},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Reducing Certain Elliptic Curve Discrete Logarithms to Logarithms
                  in a Finite Field},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {514--520},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_40},
  doi          = {10.1007/3-540-47719-5\_40},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Shim01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/StinsonS01,
  author       = {Douglas R. Stinson and
                  Reto Strobl},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Provably Secure Distributed Schnorr Signatures and a (t, n) Threshold
                  Scheme for Implicit Certificates},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {417--434},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_33},
  doi          = {10.1007/3-540-47719-5\_33},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/StinsonS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TanYS01,
  author       = {Chik How Tan and
                  Xun Yi and
                  Chee Kheong Siew},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Signature Schemes Based on 3rd Order Shift Registers},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {445--459},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_35},
  doi          = {10.1007/3-540-47719-5\_35},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/TanYS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WeimerskirchPS01,
  author       = {Andr{\'{e}} Weimerskirch and
                  Christof Paar and
                  Sheueling Chang Shantz},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Elliptic Curve Cryptography on a Palm {OS} Device},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {502--513},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_39},
  doi          = {10.1007/3-540-47719-5\_39},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WeimerskirchPS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WietrzykTV01,
  author       = {Vlad Ingar Wietrzyk and
                  Makoto Takizawa and
                  Vijay Varadharajan},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {A Strategy for {MLS} Workflow},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {159--175},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_14},
  doi          = {10.1007/3-540-47719-5\_14},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WietrzykTV01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Yacobi01,
  author       = {Yacov Yacobi},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {A Few Thoughts on E-Commerce},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {1--2},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_1},
  doi          = {10.1007/3-540-47719-5\_1},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Yacobi01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YamamuraI01,
  author       = {Akihiro Yamamura and
                  Hirokazu Ishizuka},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Error Detection and Authentication in Quantum Key Distribution},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {260--273},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_22},
  doi          = {10.1007/3-540-47719-5\_22},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YamamuraI01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YamamuraS01,
  author       = {Akihiro Yamamura and
                  Taiichi Saito},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Private Information Retrieval Based on the Subgroup Membership Problem},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {206--220},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_18},
  doi          = {10.1007/3-540-47719-5\_18},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YamamuraS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YangSR01,
  author       = {Jong{-}Phil Yang and
                  Weon Shin and
                  Kyung Hyune Rhee},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {An End-to-End Authentication Protocol in Wireless Application Protocol},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {247--259},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_21},
  doi          = {10.1007/3-540-47719-5\_21},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YangSR01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Yen01,
  author       = {Sung{-}Ming Yen},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Practical Key Recovery Schemes},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {104--114},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_10},
  doi          = {10.1007/3-540-47719-5\_10},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Yen01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YesbergH01,
  author       = {John Yesberg and
                  Marie Henderson},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Applications of Trusted Review to Information Security},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {305--319},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_25},
  doi          = {10.1007/3-540-47719-5\_25},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YesbergH01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YoussefG01,
  author       = {Amr M. Youssef and
                  Guang Gong},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Cryptanalysis of a Public Key Cryptosystem Proposed at {ACISP} 2000},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {15--20},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_3},
  doi          = {10.1007/3-540-47719-5\_3},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YoussefG01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZennerKL01,
  author       = {Erik Zenner and
                  Matthias Krause and
                  Stefan Lucks},
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Improved Cryptanalysis of the Self-Shrinking Generator},
  booktitle    = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  pages        = {21--35},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5\_4},
  doi          = {10.1007/3-540-47719-5\_4},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ZennerKL01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2001,
  editor       = {Vijay Varadharajan and
                  Yi Mu},
  title        = {Information Security and Privacy, 6th Australasian Conference, {ACISP}
                  2001, Sydney, Australia, July 11-13, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2119},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-47719-5},
  doi          = {10.1007/3-540-47719-5},
  isbn         = {3-540-42300-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/2001.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AbeK00,
  author       = {Masayuki Abe and
                  Masayuki Kanda},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {A Key Escrow Scheme with Time-Limited Monitoring for One-Way Communication},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {163--177},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_14},
  doi          = {10.1007/10718964\_14},
  timestamp    = {Sat, 19 Oct 2019 20:34:19 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/AbeK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AuLA00,
  author       = {Richard Au and
                  Mark Looi and
                  Paul Ashley},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {Towards a New Authorisation Paradigm for Extranets},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {18--29},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_2},
  doi          = {10.1007/10718964\_2},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/AuLA00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BaekLK00,
  author       = {Joonsang Baek and
                  Byoungcheon Lee and
                  Kwangjo Kim},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman
                  Assumption},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {49--58},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_5},
  doi          = {10.1007/10718964\_5},
  timestamp    = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BaekLK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BanksLS00,
  author       = {William D. Banks and
                  Daniel Lieman and
                  Igor E. Shparlinski},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {An Extremely Small and Efficient Identification Scheme},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {378--384},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_31},
  doi          = {10.1007/10718964\_31},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BanksLS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BlakleyB00,
  author       = {Bob Blakley and
                  G. R. Blakley},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {All Sail, No Anchor, 1: Cryptography, Risk, and e-Commerce},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {471--476},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_38},
  doi          = {10.1007/10718964\_38},
  timestamp    = {Thu, 09 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BlakleyB00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BlakleyBK00,
  author       = {G. R. Blakley and
                  I. Borosh and
                  Andreas Klappenecker},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {Construction and Categories of Codes},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {266--277},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_22},
  doi          = {10.1007/10718964\_22},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BlakleyBK00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BrickellCF00,
  author       = {Ernest F. Brickell and
                  Giovanni Di Crescenzo and
                  Yair Frankel},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {Sharing Block Ciphers},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {457--470},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_37},
  doi          = {10.1007/10718964\_37},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BrickellCF00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Brown00,
  author       = {Lawrie Brown},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {Custom Safety Policies in Safe Erlang},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {30--40},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_3},
  doi          = {10.1007/10718964\_3},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Brown00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ClarkJ00,
  author       = {John A. Clark and
                  Jeremy Jacob},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {Two-Stage Optimisation in the Design of Boolean Functions},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {242--254},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_20},
  doi          = {10.1007/10718964\_20},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ClarkJ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DoiMO00,
  author       = {Hiroshi Doi and
                  Masahiro Mambo and
                  Eiji Okamoto},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {On the Security of the RSA-Based Multisignature Scheme for Various
                  Group Structures},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {352--367},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_29},
  doi          = {10.1007/10718964\_29},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/DoiMO00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/FergusonSW00,
  author       = {Niels Ferguson and
                  Bruce Schneier and
                  David A. Wagner},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {Security Weaknesses in a Randomized Stream Cipher},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {234--241},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_19},
  doi          = {10.1007/10718964\_19},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/FergusonSW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/FooB00,
  author       = {Ernest Foo and
                  Colin Boyd},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {Passive Entities: {A} Strategy for Electronic Payment Design},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {134--148},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_12},
  doi          = {10.1007/10718964\_12},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/FooB00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GamageLZ00,
  author       = {Chandana Gamage and
                  Jussipekka Leiwo and
                  Yuliang Zheng},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {High Performance Agile Crypto Modules},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {74--88},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_7},
  doi          = {10.1007/10718964\_7},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/GamageLZ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GhodosiP00,
  author       = {Hossein Ghodosi and
                  Josef Pieprzyk},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {Cheating Prevention in Secret Sharing},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {328--341},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_27},
  doi          = {10.1007/10718964\_27},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/GhodosiP00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Golic00,
  author       = {Jovan Dj. Golic},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {Iterative Probabilistic Cryptanalysis of {RC4} Keystream Generator},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {220--233},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_18},
  doi          = {10.1007/10718964\_18},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Golic00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HuiT00,
  author       = {Zhu Hui and
                  Daniel T. H. Tan},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {A Novel Engine for Various Intrusion Detection Methods},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {255--265},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_21},
  doi          = {10.1007/10718964\_21},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HuiT00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/JosangPP00,
  author       = {Audun J{\o}sang and
                  Ingar Glenn Pedersen and
                  Dean Povey},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {{PKI} Seeks a Trusting Relationship},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {191--205},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_16},
  doi          = {10.1007/10718964\_16},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/JosangPP00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/King00,
  author       = {Brian King},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {Algorithms to Speed Up Computations in Threshold {RSA}},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {443--456},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_36},
  doi          = {10.1007/10718964\_36},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/King00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KotzanikolaouBC00,
  author       = {Panayiotis Kotzanikolaou and
                  Mike Burmester and
                  Vassilios Chrissikopoulos},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {Secure Transactions with Mobile Agents in Hostile Environments},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {289--297},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_24},
  doi          = {10.1007/10718964\_24},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/KotzanikolaouBC00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KurnioSSW00,
  author       = {Hartono Kurnio and
                  Reihaneh Safavi{-}Naini and
                  Willy Susilo and
                  Huaxiong Wang},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {Key Management for Secure Multicast with Dynamic Controller},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {178--190},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_15},
  doi          = {10.1007/10718964\_15},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KurnioSSW00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LeeM00,
  author       = {Kook{-}Heui Lee and
                  Sang{-}Jae Moon},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {{AKA} Protocols for Mobile Communications},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {400--411},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_33},
  doi          = {10.1007/10718964\_33},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LeeM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MatsuzakiAM00,
  author       = {Natsume Matsuzaki and
                  Jun Anzai and
                  Tsutomu Matsumoto},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {Light Weight Broadcast Exclusion Using Secret Sharing},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {313--327},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_26},
  doi          = {10.1007/10718964\_26},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MatsuzakiAM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MayPC00,
  author       = {Lauren May and
                  Lyta Penna and
                  Andrew J. Clark},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {An Implementation of Bitsliced {DES} on the Pentium MMX\({}^{\mbox{TM}}\)
                  Processor},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {112--122},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_10},
  doi          = {10.1007/10718964\_10},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MayPC00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MitomiM00,
  author       = {Shirow Mitomi and
                  Atsuko Miyaji},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {A Multisignature Scheme with Message Flexibility, Order Flexibility
                  and Order Verifiability},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {298--312},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_25},
  doi          = {10.1007/10718964\_25},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MitomiM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MuV00,
  author       = {Yi Mu and
                  Vijay Varadharajan},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {Fail-Stop Confirmer Signatures},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {368--377},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_30},
  doi          = {10.1007/10718964\_30},
  timestamp    = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MuV00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/NguyenT00,
  author       = {Khanh Quoc Nguyen and
                  Jacques Traor{\'{e}}},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {An Online Public Auction Protocol Protecting Bidder Privacy},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {427--442},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_35},
  doi          = {10.1007/10718964\_35},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/NguyenT00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/NietoVBD00,
  author       = {Juanma Gonz{\'{a}}lez Nieto and
                  Kapali Viswanathan and
                  Colin Boyd and
                  Ed Dawson},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {Key Recovery System for the Commercial Environment},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {149--162},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_13},
  doi          = {10.1007/10718964\_13},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/NietoVBD00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/OzolsHLC00,
  author       = {Maris A. Ozols and
                  Marie Henderson and
                  Chuchang Liu and
                  Anthony Cant},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {The {PKI} Specification Dilemma: {A} Formal Solution},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {206--219},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_17},
  doi          = {10.1007/10718964\_17},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/OzolsHLC00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PrasetijoALCG00,
  author       = {Agung Budi Prasetijo and
                  Paul Ashley and
                  Mark Looi and
                  Andrew J. Clark and
                  Gary Gaskell},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {A Three-Party {HTTP} Proxy to Support Internet Content Regulation},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {89--96},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_8},
  doi          = {10.1007/10718964\_8},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PrasetijoALCG00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SakaiS00,
  author       = {Yasuyuki Sakai and
                  Kouichi Sakurai},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {Efficient Scalar Multiplications on Elliptic Curves without Repeated
                  Doublings and Their Practical Performance},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {59--73},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_6},
  doi          = {10.1007/10718964\_6},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SakaiS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SakuraiM00,
  author       = {Kouichi Sakurai and
                  Shingo Miyazaki},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {An Anonymous Electronic Bidding Protocol Based on a New Convertible
                  Group Signature Scheme},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {385--399},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_32},
  doi          = {10.1007/10718964\_32},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SakuraiM00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SklavosVP00,
  author       = {Panagiotis Sklavos and
                  Angelos P. Varvitsiotis and
                  Despina Polemi},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {Securing Large E-Commerce Networks},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {123--133},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_11},
  doi          = {10.1007/10718964\_11},
  timestamp    = {Wed, 01 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SklavosVP00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SpalkaCL00,
  author       = {Adrian Spalka and
                  Armin B. Cremers and
                  Hartmut Lehmler},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {Protecting Confidentiality against Trojan Horse Programs in Discretionary
                  Access Control System},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {1--17},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_1},
  doi          = {10.1007/10718964\_1},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SpalkaCL00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Underwood00,
  author       = {Alan Underwood},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {Professional Ethics in a Security and Privacy Context - the Perspective
                  of a National Computing Society},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {477--486},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_39},
  doi          = {10.1007/10718964\_39},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Underwood00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ViswanathanBD00,
  author       = {Kapali Viswanathan and
                  Colin Boyd and
                  Ed Dawson},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {A Three Phased Schema for Sealed Bid Auction System Design},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {412--426},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_34},
  doi          = {10.1007/10718964\_34},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ViswanathanBD00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WangLXZ00,
  author       = {Huaxiong Wang and
                  Kwok{-}Yan Lam and
                  Guozhen Xiao and
                  Huanhui Zhao},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {On Multiplicative Secret Sharing Schemes},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {342--351},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_28},
  doi          = {10.1007/10718964\_28},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WangLXZ00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WuBYD00,
  author       = {Hongjun Wu and
                  Feng Bao and
                  Dingfeng Ye and
                  Robert H. Deng},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {Cryptanalysis of the \emph{m}-Permutation Protection Schemes},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {97--111},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_9},
  doi          = {10.1007/10718964\_9},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/WuBYD00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WuBYD00a,
  author       = {Hongjun Wu and
                  Feng Bao and
                  Dingfeng Ye and
                  Robert H. Deng},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {Cryptanalysis of Polynominal Authentication and Signature Scheme},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {278--288},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_23},
  doi          = {10.1007/10718964\_23},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/WuBYD00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YooHLLYS00,
  author       = {Heajoung Yoo and
                  Seokhie Hong and
                  Sangjin Lee and
                  Jong In Lim and
                  Okyeon Yi and
                  Maenghee Sung},
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {A Proposal of a New Public Key Cryptosystem Using Matrices over a
                  Ring},
  booktitle    = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  pages        = {41--48},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964\_4},
  doi          = {10.1007/10718964\_4},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YooHLLYS00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/2000,
  editor       = {Ed Dawson and
                  Andrew J. Clark and
                  Colin Boyd},
  title        = {Information Security and Privacy, 5th Australasian Conference, {ACISP}
                  2000, Brisbane, Australia, July 10-12, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1841},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/10718964},
  doi          = {10.1007/10718964},
  isbn         = {3-540-67742-9},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/2000.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AshleyBV99,
  author       = {Paul Ashley and
                  Bradley Broom and
                  Mark Vandenwauver},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {An Implementation of a Secure Version of {NFS} Including {RBAC}},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {213--227},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_18},
  doi          = {10.1007/3-540-48970-3\_18},
  timestamp    = {Sun, 02 Jun 2019 21:26:44 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/AshleyBV99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BaiV99,
  author       = {Yun Bai and
                  Vijay Varadharajan},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Authorization in Object Oriented Databases},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {270--280},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_22},
  doi          = {10.1007/3-540-48970-3\_22},
  timestamp    = {Thu, 29 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BaiV99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BoydFP99,
  author       = {Colin Boyd and
                  Ernest Foo and
                  Chris Pavlovski},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Efficient Electronic Cash Using Batch Signatures},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {244--257},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_20},
  doi          = {10.1007/3-540-48970-3\_20},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BoydFP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/FungG99,
  author       = {Wai W. Fung and
                  James W. Gray III},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {On \emph{m}-Permutation Protection Scheme Against Modification Attack},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {77--87},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_7},
  doi          = {10.1007/3-540-48970-3\_7},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/FungG99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GhodosiP99,
  author       = {Hossein Ghodosi and
                  Josef Pieprzyk},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Repudiation of Cheating and Non-repudiation of Zhang's Proxy Signature
                  Schemes},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {129--134},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_11},
  doi          = {10.1007/3-540-48970-3\_11},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/GhodosiP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GolicCD99,
  author       = {Jovan Dj. Golic and
                  Andrew J. Clark and
                  Ed Dawson},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Inversion Attack and Branching},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {88--102},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_8},
  doi          = {10.1007/3-540-48970-3\_8},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/GolicCD99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GysinS99,
  author       = {Marc Gysin and
                  Jennifer Seberry},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Generalised Cycling Attacks on {RSA} and Strong {RSA} Primes},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {149--163},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_13},
  doi          = {10.1007/3-540-48970-3\_13},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/GysinS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HortonS99,
  author       = {Jeffrey Horton and
                  Jennifer Seberry},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Companion Viruses and the Macintosh: Threats and Countermeasures},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {202--212},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_17},
  doi          = {10.1007/3-540-48970-3\_17},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HortonS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LeeHYC99,
  author       = {Seungwon Lee and
                  Seong{-}Min Hong and
                  Hyunsoo Yoon and
                  Yookun Cho},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Accelerating Key Establishment Protocols for Mobile Communication},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {51--63},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_5},
  doi          = {10.1007/3-540-48970-3\_5},
  timestamp    = {Thu, 06 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LeeHYC99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Lenstra99,
  author       = {Arjen K. Lenstra},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Efficient Identity Based Parameter Selection for Elliptic Curve Cryptosystems},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {294--302},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_24},
  doi          = {10.1007/3-540-48970-3\_24},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Lenstra99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LiP99,
  author       = {Chih{-}Hung Li and
                  Josef Pieprzyk},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Conference Key Agreement from Secret Sharing},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {64--76},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_6},
  doi          = {10.1007/3-540-48970-3\_6},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/LiP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MaitraS99,
  author       = {Subhamoy Maitra and
                  Palash Sarkar},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Enumeration of Correlation Immune Boolean Functions},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {12--25},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_2},
  doi          = {10.1007/3-540-48970-3\_2},
  timestamp    = {Tue, 04 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MaitraS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MartinPSW99,
  author       = {Keith M. Martin and
                  Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Huaxiong Wang},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Changing Thresholds in the Absence of Secure Channels},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {177--191},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_15},
  doi          = {10.1007/3-540-48970-3\_15},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/MartinPSW99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MillanCD99,
  author       = {William Millan and
                  Andrew J. Clark and
                  Ed Dawson},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Boolean Function Design Using Hill Climbing Methods},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {1--11},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_1},
  doi          = {10.1007/3-540-48970-3\_1},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MillanCD99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Muller99,
  author       = {Siguna M{\"{u}}ller},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {On the Security of an {RSA} Based Encryption Scheme},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {135--148},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_12},
  doi          = {10.1007/3-540-48970-3\_12},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Muller99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/NguyenMV99,
  author       = {Khanh Quoc Nguyen and
                  Yi Mu and
                  Vijay Varadharajan},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Divertible Zero-Knowledge Proof of Polynominal Relations and Blind
                  Group Signature},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {117--128},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_10},
  doi          = {10.1007/3-540-48970-3\_10},
  timestamp    = {Mon, 17 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/NguyenMV99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PeiLWS99,
  author       = {Dingyi Pei and
                  Yuqiang Li and
                  Yejing Wang and
                  Reihaneh Safavi{-}Naini},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Characterization of Optimal Authentication Codes with Arbitration},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {303--313},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_25},
  doi          = {10.1007/3-540-48970-3\_25},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PeiLWS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/QuSP99,
  author       = {Chengxin Qu and
                  Jennifer Seberry and
                  Josef Pieprzyk},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {On the Symmetric Property of Homogeneous Boolean Functions},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {26--35},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_3},
  doi          = {10.1007/3-540-48970-3\_3},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/QuSP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SaeedniaG99,
  author       = {Shahrokh Saeednia and
                  Hossein Ghodosi},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {A Self-Certified Group-Oriented Cryptosystem Without a Combiner},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {192--201},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_16},
  doi          = {10.1007/3-540-48970-3\_16},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SaeedniaG99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SaundersHV99,
  author       = {Gregory Saunders and
                  Michael Hitchens and
                  Vijay Varadharajan},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {An Analysis of Access Control Models},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {281--293},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_23},
  doi          = {10.1007/3-540-48970-3\_23},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/SaundersHV99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SusiloSP99,
  author       = {Willy Susilo and
                  Reihaneh Safavi{-}Naini and
                  Josef Pieprzyk},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Fail-Stop Threshold Signature Schemes Based on Elliptic Curves},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {103--116},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_9},
  doi          = {10.1007/3-540-48970-3\_9},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/SusiloSP99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TiountchikT99,
  author       = {Alexander Tiountchik and
                  Elena Trichina},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {{RSA} Acceleration with Field Programmable Gate Arrays},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {164--176},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_14},
  doi          = {10.1007/3-540-48970-3\_14},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/TiountchikT99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Traore99,
  author       = {Jacques Traor{\'{e}}},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Group Signatures and Their Relevance to Privacy-Protecting Off-Line
                  Electronic Cash Systems},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {228--243},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_19},
  doi          = {10.1007/3-540-48970-3\_19},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Traore99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ViswanathanBD99,
  author       = {Kapali Viswanathan and
                  Colin Boyd and
                  Ed Dawson},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Publicly Verifiable Key Escrow with Limited Time Span},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {36--50},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_4},
  doi          = {10.1007/3-540-48970-3\_4},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ViswanathanBD99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Yamamura99,
  author       = {Akihiro Yamamura},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {A Functional Cryptosystem Using a Group Action},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {314--325},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_26},
  doi          = {10.1007/3-540-48970-3\_26},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Yamamura99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhouDB99,
  author       = {Jianying Zhou and
                  Robert H. Deng and
                  Feng Bao},
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Evolution of Fair Non-repudiation with {TTP}},
  booktitle    = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  pages        = {258--269},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3\_21},
  doi          = {10.1007/3-540-48970-3\_21},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhouDB99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/1999,
  editor       = {Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Information Security and Privacy, 4th Australasian Conference, ACISP'99,
                  Wollongong, NSW, Australia, April 7-9, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1587},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48970-3},
  doi          = {10.1007/3-540-48970-3},
  isbn         = {3-540-65756-8},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/1999.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AshleyVB98,
  author       = {Paul Ashley and
                  Mark Vandenwauver and
                  Bradley Broom},
  editor       = {Colin Boyd and
                  Ed Dawson},
  title        = {A Uniform Approach to Securing Unix Applications Using {SESAME}},
  booktitle    = {Information Security and Privacy, Third Australasian Conference, ACISP'98,
                  Brisbane, Queensland, Australia, July 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1438},
  pages        = {24--35},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0053718},
  doi          = {10.1007/BFB0053718},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/AshleyVB98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Aura98,
  author       = {Tuomas Aura},
  editor       = {Colin Boyd and
                  Ed Dawson},
  title        = {Fast Access Control Decisions from Delegation Certificate Databases},
  booktitle    = {Information Security and Privacy, Third Australasian Conference, ACISP'98,
                  Brisbane, Queensland, Australia, July 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1438},
  pages        = {284--295},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0053741},
  doi          = {10.1007/BFB0053741},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Aura98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BaiV98,
  author       = {Yun Bai and
                  Vijay Varadharajan},
  editor       = {Colin Boyd and
                  Ed Dawson},
  title        = {A High Level Language for Conventional Access Control Models},
  booktitle    = {Information Security and Privacy, Third Australasian Conference, ACISP'98,
                  Brisbane, Queensland, Australia, July 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1438},
  pages        = {273--283},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0053740},
  doi          = {10.1007/BFB0053740},
  timestamp    = {Thu, 29 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BaiV98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BlumenthalHR98,
  author       = {Uri Blumenthal and
                  Nguyen C. Hien and
                  J. H. Rooney},
  editor       = {Colin Boyd and
                  Ed Dawson},
  title        = {Low-Cost Secure Server Connection with Limited-Privilege Clients},
  booktitle    = {Information Security and Privacy, Third Australasian Conference, ACISP'98,
                  Brisbane, Queensland, Australia, July 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1438},
  pages        = {90--98},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0053724},
  doi          = {10.1007/BFB0053724},
  timestamp    = {Mon, 26 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BlumenthalHR98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BoydM98,
  author       = {Colin Boyd and
                  Anish Mathuria},
  editor       = {Colin Boyd and
                  Ed Dawson},
  title        = {Key Establishment Protocols for Secure Mobile Communications: {A}
                  Selective Survey},
  booktitle    = {Information Security and Privacy, Third Australasian Conference, ACISP'98,
                  Brisbane, Queensland, Australia, July 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1438},
  pages        = {344--355},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0053746},
  doi          = {10.1007/BFB0053746},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BoydM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/CarterDN98,
  author       = {Gary Carter and
                  Ed Dawson and
                  Lauren Nielsen},
  editor       = {Colin Boyd and
                  Ed Dawson},
  title        = {Key Schedules of Iterative Block Ciphers},
  booktitle    = {Information Security and Privacy, Third Australasian Conference, ACISP'98,
                  Brisbane, Queensland, Australia, July 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1438},
  pages        = {80--89},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0053723},
  doi          = {10.1007/BFB0053723},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/CarterDN98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChenH98,
  author       = {Mark Chen and
                  Eric Hughes},
  editor       = {Colin Boyd and
                  Ed Dawson},
  title        = {Protocol Failures Related to Order of Encryption and Signature},
  booktitle    = {Information Security and Privacy, Third Australasian Conference, ACISP'98,
                  Brisbane, Queensland, Australia, July 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1438},
  pages        = {238--249},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0053737},
  doi          = {10.1007/BFB0053737},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ChenH98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DesmedtKKK98,
  author       = {Yvo Desmedt and
                  Brian King and
                  Wataru Kishimoto and
                  Kaoru Kurosawa},
  editor       = {Colin Boyd and
                  Ed Dawson},
  title        = {A Comment on the Efficiency of Secret Sharing Scheme over Any Finite
                  Abelian Group},
  booktitle    = {Information Security and Privacy, Third Australasian Conference, ACISP'98,
                  Brisbane, Queensland, Australia, July 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1438},
  pages        = {391--402},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0053750},
  doi          = {10.1007/BFB0053750},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/DesmedtKKK98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/FalkT98,
  author       = {Rainer Falk and
                  Markus Trommer},
  editor       = {Colin Boyd and
                  Ed Dawson},
  title        = {Integrated Management of Network and Host Based Security Mechanisms},
  booktitle    = {Information Security and Privacy, Third Australasian Conference, ACISP'98,
                  Brisbane, Queensland, Australia, July 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1438},
  pages        = {36--47},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0053719},
  doi          = {10.1007/BFB0053719},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/FalkT98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/FranzGJP98,
  author       = {Elke Franz and
                  A. Graubner and
                  Anja Jerichow and
                  Andreas Pfitzmann},
  editor       = {Colin Boyd and
                  Ed Dawson},
  title        = {Comparison of Commitment Schemes Used in Mix-Mediated Anonymous Communication
                  for Preventing Pool-Mode Attacks},
  booktitle    = {Information Security and Privacy, Third Australasian Conference, ACISP'98,
                  Brisbane, Queensland, Australia, July 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1438},
  pages        = {111--122},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0053726},
  doi          = {10.1007/BFB0053726},
  timestamp    = {Tue, 01 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/FranzGJP98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/FungG98,
  author       = {Wai W. Fung and
                  James W. Gray III},
  editor       = {Colin Boyd and
                  Ed Dawson},
  title        = {Protection Against {EEPROM} Modification Attacks},
  booktitle    = {Information Security and Privacy, Third Australasian Conference, ACISP'98,
                  Brisbane, Queensland, Australia, July 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1438},
  pages        = {250--260},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0053738},
  doi          = {10.1007/BFB0053738},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/FungG98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GhodosiPS98,
  author       = {Hossein Ghodosi and
                  Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini},
  editor       = {Colin Boyd and
                  Ed Dawson},
  title        = {Secret Sharing in Multilevel and Compartmented Groups},
  booktitle    = {Information Security and Privacy, Third Australasian Conference, ACISP'98,
                  Brisbane, Queensland, Australia, July 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1438},
  pages        = {367--378},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0053748},
  doi          = {10.1007/BFB0053748},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/GhodosiPS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GhodosiPSW98,
  author       = {Hossein Ghodosi and
                  Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Huaxiong Wang},
  editor       = {Colin Boyd and
                  Ed Dawson},
  title        = {On Construction of Cumulative Secret Sharing Schemes},
  booktitle    = {Information Security and Privacy, Third Australasian Conference, ACISP'98,
                  Brisbane, Queensland, Australia, July 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1438},
  pages        = {379--390},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0053749},
  doi          = {10.1007/BFB0053749},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/GhodosiPSW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/GolicM98,
  author       = {Jovan Dj. Golic and
                  Renato Menicocci},
  editor       = {Colin Boyd and
                  Ed Dawson},
  title        = {Correlation Attacks on Up/Down Cascades},
  booktitle    = {Information Security and Privacy, Third Australasian Conference, ACISP'98,
                  Brisbane, Queensland, Australia, July 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1438},
  pages        = {123--134},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0053727},
  doi          = {10.1007/BFB0053727},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/GolicM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HanaokaZI98,
  author       = {Goichiro Hanaoka and
                  Yuliang Zheng and
                  Hideki Imai},
  editor       = {Colin Boyd and
                  Ed Dawson},
  title        = {{LITESET:} {A} Light-Weight Secure Electronic Transaction Protocol},
  booktitle    = {Information Security and Privacy, Third Australasian Conference, ACISP'98,
                  Brisbane, Queensland, Australia, July 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1438},
  pages        = {215--226},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0053735},
  doi          = {10.1007/BFB0053735},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/HanaokaZI98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HeSS98,
  author       = {Qi He and
                  Katia P. Sycara and
                  Zhongmin Su},
  editor       = {Colin Boyd and
                  Ed Dawson},
  title        = {A Solution to Open Standard of {PKI}},
  booktitle    = {Information Security and Privacy, Third Australasian Conference, ACISP'98,
                  Brisbane, Queensland, Australia, July 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1438},
  pages        = {99--110},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0053725},
  doi          = {10.1007/BFB0053725},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HeSS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Henderson98,
  author       = {Marie Henderson},
  editor       = {Colin Boyd and
                  Ed Dawson},
  title        = {Applications of Linearised and Sub-linearised Polynomials to Information
                  Security},
  booktitle    = {Information Security and Privacy, Third Australasian Conference, ACISP'98,
                  Brisbane, Queensland, Australia, July 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1438},
  pages        = {227--237},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0053736},
  doi          = {10.1007/BFB0053736},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Henderson98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/HortonS98,
  author       = {Jeffrey Horton and
                  Jennifer Seberry},
  editor       = {Colin Boyd and
                  Ed Dawson},
  title        = {Covert Distributed Computing Using Java Through Web Spoofing},
  booktitle    = {Information Security and Privacy, Third Australasian Conference, ACISP'98,
                  Brisbane, Queensland, Australia, July 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1438},
  pages        = {48--57},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0053720},
  doi          = {10.1007/BFB0053720},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/HortonS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Hruby98,
  author       = {Jaroslav Hruby},
  editor       = {Colin Boyd and
                  Ed Dawson},
  title        = {Trends in Quantum Cryptography in Czech Republic},
  booktitle    = {Information Security and Privacy, Third Australasian Conference, ACISP'98,
                  Brisbane, Queensland, Australia, July 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1438},
  pages        = {261--272},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0053739},
  doi          = {10.1007/BFB0053739},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Hruby98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Kaijser98,
  author       = {Per Kaijser},
  editor       = {Colin Boyd and
                  Ed Dawson},
  title        = {A Review of the {SESAME} Development},
  booktitle    = {Information Security and Privacy, Third Australasian Conference, ACISP'98,
                  Brisbane, Queensland, Australia, July 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1438},
  pages        = {1--8},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0053716},
  doi          = {10.1007/BFB0053716},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Kaijser98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KaksonenM98,
  author       = {Rauli Kaksonen and
                  Petri M{\"{a}}h{\"{o}}nen},
  editor       = {Colin Boyd and
                  Ed Dawson},
  title        = {Object Modeling of Cryptographic Algorithms with {UML}},
  booktitle    = {Information Security and Privacy, Third Australasian Conference, ACISP'98,
                  Brisbane, Queensland, Australia, July 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1438},
  pages        = {193--204},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0053733},
  doi          = {10.1007/BFB0053733},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KaksonenM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/LeeHW98,
  author       = {Narn{-}Yih Lee and
                  Tzonelih Hwang and
                  Chih{-}Hung Wang},
  editor       = {Colin Boyd and
                  Ed Dawson},
  title        = {On Zhang's Nonrepudiable Proxy Signature Schemes},
  booktitle    = {Information Security and Privacy, Third Australasian Conference, ACISP'98,
                  Brisbane, Queensland, Australia, July 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1438},
  pages        = {415--422},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0053752},
  doi          = {10.1007/BFB0053752},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/LeeHW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ManningerS98,
  author       = {Martin Manninger and
                  Robert Schischka},
  editor       = {Colin Boyd and
                  Ed Dawson},
  title        = {Adapting an Electronic Purse for Internet Payments},
  booktitle    = {Information Security and Privacy, Third Australasian Conference, ACISP'98,
                  Brisbane, Queensland, Australia, July 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1438},
  pages        = {205--214},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0053734},
  doi          = {10.1007/BFB0053734},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ManningerS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Millan98,
  author       = {William Millan},
  editor       = {Colin Boyd and
                  Ed Dawson},
  title        = {How to Improve the Nonlinearity of Bijective S-Boxes},
  booktitle    = {Information Security and Privacy, Third Australasian Conference, ACISP'98,
                  Brisbane, Queensland, Australia, July 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1438},
  pages        = {181--192},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0053732},
  doi          = {10.1007/BFB0053732},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Millan98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MullerM98,
  author       = {Siguna M{\"{u}}ller and
                  Winfried B. M{\"{u}}ller},
  editor       = {Colin Boyd and
                  Ed Dawson},
  title        = {The Security of Public Key Cryptosystems Based on Integer Factorization},
  booktitle    = {Information Security and Privacy, Third Australasian Conference, ACISP'98,
                  Brisbane, Queensland, Australia, July 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1438},
  pages        = {9--23},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0053717},
  doi          = {10.1007/BFB0053717},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MullerM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PieprzykQ98,
  author       = {Josef Pieprzyk and
                  Cheng Xin Qu},
  editor       = {Colin Boyd and
                  Ed Dawson},
  title        = {Rotation-Symmetric Functions and Fast Hashing},
  booktitle    = {Information Security and Privacy, Third Australasian Conference, ACISP'98,
                  Brisbane, Queensland, Australia, July 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1438},
  pages        = {169--180},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0053731},
  doi          = {10.1007/BFB0053731},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/PieprzykQ98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/RiechmannK98,
  author       = {Thomas Riechmann and
                  J{\"{u}}rgen Klein{\"{o}}der},
  editor       = {Colin Boyd and
                  Ed Dawson},
  title        = {Meta Objects for Access Control: Role-Based Principals},
  booktitle    = {Information Security and Privacy, Third Australasian Conference, ACISP'98,
                  Brisbane, Queensland, Australia, July 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1438},
  pages        = {296--307},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0053742},
  doi          = {10.1007/BFB0053742},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/RiechmannK98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Rose98,
  author       = {Gregory G. Rose},
  editor       = {Colin Boyd and
                  Ed Dawson},
  title        = {A Stream Cipher Based on Linear Feedback over GF(2\({}^{\mbox{8}}\))},
  booktitle    = {Information Security and Privacy, Third Australasian Conference, ACISP'98,
                  Brisbane, Queensland, Australia, July 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1438},
  pages        = {135--146},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0053728},
  doi          = {10.1007/BFB0053728},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Rose98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Rudolph98,
  author       = {Carsten Rudolph},
  editor       = {Colin Boyd and
                  Ed Dawson},
  title        = {A Formal Model for Systematic Design of Key Establishment Protocols},
  booktitle    = {Information Security and Privacy, Third Australasian Conference, ACISP'98,
                  Brisbane, Queensland, Australia, July 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1438},
  pages        = {332--343},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0053745},
  doi          = {10.1007/BFB0053745},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Rudolph98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SaeedniaS98,
  author       = {Shahrokh Saeednia and
                  Reihaneh Safavi{-}Naini},
  editor       = {Colin Boyd and
                  Ed Dawson},
  title        = {Efficient Identity-Based Conference Key Distribution Protocols},
  booktitle    = {Information Security and Privacy, Third Australasian Conference, ACISP'98,
                  Brisbane, Queensland, Australia, July 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1438},
  pages        = {320--331},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0053744},
  doi          = {10.1007/BFB0053744},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SaeedniaS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Safavi-NainiW98,
  author       = {Reihaneh Safavi{-}Naini and
                  Yejing Wang},
  editor       = {Colin Boyd and
                  Ed Dawson},
  title        = {Bounds and Constructions for A\({}^{\mbox{3}}\)-code with Multi-senders},
  booktitle    = {Information Security and Privacy, Third Australasian Conference, ACISP'98,
                  Brisbane, Queensland, Australia, July 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1438},
  pages        = {159--168},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0053730},
  doi          = {10.1007/BFB0053730},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Safavi-NainiW98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SimpsonGD98,
  author       = {Leonie Simpson and
                  Jovan Dj. Golic and
                  Ed Dawson},
  editor       = {Colin Boyd and
                  Ed Dawson},
  title        = {A Probabilistic Correlation Attack on the Shrinking Generator},
  booktitle    = {Information Security and Privacy, Third Australasian Conference, ACISP'98,
                  Brisbane, Queensland, Australia, July 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1438},
  pages        = {147--158},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0053729},
  doi          = {10.1007/BFB0053729},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/SimpsonGD98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Stabell-KuloHD98,
  author       = {Tage Stabell{-}Kul{\o} and
                  Arne Helme and
                  Gianluca Dini},
  editor       = {Colin Boyd and
                  Ed Dawson},
  title        = {Detecting Key-Dependencies},
  booktitle    = {Information Security and Privacy, Third Australasian Conference, ACISP'98,
                  Brisbane, Queensland, Australia, July 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1438},
  pages        = {356--366},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0053747},
  doi          = {10.1007/BFB0053747},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Stabell-KuloHD98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SunS98,
  author       = {Hung{-}Min Sun and
                  Shiuh{-}Pyng Shieh},
  editor       = {Colin Boyd and
                  Ed Dawson},
  title        = {On Private-Key Cryptosystems Based on Product Codes},
  booktitle    = {Information Security and Privacy, Third Australasian Conference, ACISP'98,
                  Brisbane, Queensland, Australia, July 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1438},
  pages        = {68--79},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0053722},
  doi          = {10.1007/BFB0053722},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SunS98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SyukriOM98,
  author       = {Agus Fanar Syukri and
                  Eiji Okamoto and
                  Masahiro Mambo},
  editor       = {Colin Boyd and
                  Ed Dawson},
  title        = {A User Identification System Using Signature Written with Mouse},
  booktitle    = {Information Security and Privacy, Third Australasian Conference, ACISP'98,
                  Brisbane, Queensland, Australia, July 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1438},
  pages        = {403--414},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0053751},
  doi          = {10.1007/BFB0053751},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SyukriOM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TidswellP98,
  author       = {Jonathon Tidswell and
                  John Potter},
  editor       = {Colin Boyd and
                  Ed Dawson},
  title        = {A Dynamically Typed Access Control Model},
  booktitle    = {Information Security and Privacy, Third Australasian Conference, ACISP'98,
                  Brisbane, Queensland, Australia, July 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1438},
  pages        = {308--319},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0053743},
  doi          = {10.1007/BFB0053743},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/TidswellP98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YiLH98,
  author       = {Xun Yi and
                  Kwok{-}Yan Lam and
                  Yongfei Han},
  editor       = {Colin Boyd and
                  Ed Dawson},
  title        = {Differential Cryptanalysis of a Block Cipher},
  booktitle    = {Information Security and Privacy, Third Australasian Conference, ACISP'98,
                  Brisbane, Queensland, Australia, July 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1438},
  pages        = {58--67},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0053721},
  doi          = {10.1007/BFB0053721},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YiLH98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/acisp/1998,
  editor       = {Colin Boyd and
                  Ed Dawson},
  title        = {Information Security and Privacy, Third Australasian Conference, ACISP'98,
                  Brisbane, Queensland, Australia, July 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1438},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0053715},
  doi          = {10.1007/BFB0053715},
  isbn         = {3-540-64732-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/1998.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AbeFK97,
  author       = {Takehito Abe and
                  Hiroshi Fujii and
                  Kazuhiko Kushima},
  editor       = {Vijay Varadharajan and
                  Josef Pieprzyk and
                  Yi Mu},
  title        = {Image Distribution Method with Embedded Identifier Scheme for Copyright
                  Protection},
  booktitle    = {Information Security and Privacy, Second Australasian Conference,
                  ACISP'97, Sydney, NSW, Australia, July 7-9, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1270},
  pages        = {325--336},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0027940},
  doi          = {10.1007/BFB0027940},
  timestamp    = {Sun, 02 Jun 2019 21:26:44 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/AbeFK97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BaiV97,
  author       = {Yun Bai and
                  Vijay Varadharajan},
  editor       = {Vijay Varadharajan and
                  Josef Pieprzyk and
                  Yi Mu},
  title        = {Analysis and Implementation of a Formal Authorisation Policy Design
                  Approach},
  booktitle    = {Information Security and Privacy, Second Australasian Conference,
                  ACISP'97, Sydney, NSW, Australia, July 7-9, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1270},
  pages        = {14--25},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0027939},
  doi          = {10.1007/BFB0027939},
  timestamp    = {Thu, 29 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BaiV97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BakhtiariSP97,
  author       = {Shahram Bakhtiari and
                  Reihaneh Safavi{-}Naini and
                  Josef Pieprzyk},
  editor       = {Vijay Varadharajan and
                  Josef Pieprzyk and
                  Yi Mu},
  title        = {A Message Authentication Code Based on Latin Squares},
  booktitle    = {Information Security and Privacy, Second Australasian Conference,
                  ACISP'97, Sydney, NSW, Australia, July 7-9, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1270},
  pages        = {194--203},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0027926},
  doi          = {10.1007/BFB0027926},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BakhtiariSP97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BaoDJ97,
  author       = {Feng Bao and
                  Robert H. Deng and
                  Yongfei Han and
                  Albert B. Jeng},
  editor       = {Vijay Varadharajan and
                  Josef Pieprzyk and
                  Yi Mu},
  title        = {Design and Analyses of Two Basic Protocols for Use in TTP-Based Key
                  Escrow},
  booktitle    = {Information Security and Privacy, Second Australasian Conference,
                  ACISP'97, Sydney, NSW, Australia, July 7-9, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1270},
  pages        = {261--270},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0027933},
  doi          = {10.1007/BFB0027933},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/BaoDJ97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Boyd97,
  author       = {Colin Boyd},
  editor       = {Vijay Varadharajan and
                  Josef Pieprzyk and
                  Yi Mu},
  title        = {On Key Agreement and Conference Key Agreement},
  booktitle    = {Information Security and Privacy, Second Australasian Conference,
                  ACISP'97, Sydney, NSW, Australia, July 7-9, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1270},
  pages        = {294--302},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0027936},
  doi          = {10.1007/BFB0027936},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Boyd97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ChenGMW97,
  author       = {Liqun Chen and
                  Dieter Gollmann and
                  Chris J. Mitchell and
                  Peter R. Wild},
  editor       = {Vijay Varadharajan and
                  Josef Pieprzyk and
                  Yi Mu},
  title        = {Secret Sharing with Reusable Polynomials},
  booktitle    = {Information Security and Privacy, Second Australasian Conference,
                  ACISP'97, Sydney, NSW, Australia, July 7-9, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1270},
  pages        = {183--193},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0027925},
  doi          = {10.1007/BFB0027925},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ChenGMW97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics