default search action
20. ACISP 2015: Brisbane, QLD, Australia
- Ernest Foo, Douglas Stebila:
Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings. Lecture Notes in Computer Science 9144, Springer 2015, ISBN 978-3-319-19961-0
Symmetric Cryptanalysis
- Zhelei Sun, Peng Wang, Liting Zhang:
Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes. 3-19 - Bingke Ma, Bao Li, Ronglin Hao, Xiaoqian Li:
Cryptanalysis of Reduced-Round Whirlwind. 20-38 - Biaoshuai Tao, Hongjun Wu:
Improving the Biclique Cryptanalysis of AES. 39-56
Public Key Cryptography
- Rongmao Chen, Yi Mu, Guomin Yang, Fuchun Guo, Xiaofen Wang:
A New General Framework for Secure Public Key Encryption with Keyword Search. 59-76 - Yusuke Sakai, Keita Emura, Jacob C. N. Schuldt, Goichiro Hanaoka, Kazuo Ohta:
Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptions. 77-92 - Tarun Kumar Bansal, Donghoon Chang, Somitra Kumar Sanadhya:
Sponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length Message. 93-106 - Christophe Nègre, Guilherme Perin:
Trade-Off Approaches for Leak Resistant Modular Arithmetic in RNS. 107-124
Identity-Based Encryption
- Qiang Tang:
Towards Forward Security Properties for PEKS and IBE. 127-144 - Kaoru Kurosawa, Le Trieu Phong:
IBE Under k k -LIN with Shorter Ciphertexts and Private Keys. 145-159 - Jianchang Lai, Yi Mu, Fuchun Guo, Willy Susilo:
Improved Identity-Based Online/Offline Encryption. 160-173 - Yuu Ishida, Yohei Watanabe, Junji Shikata:
Constructions of CCA-Secure Revocable Identity-Based Encryption. 174-191
Digital Signatures
- Felix Günther, Bertram Poettering:
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes. 195-212 - Yuyu Wang, Keisuke Tanaka:
Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Continuous Leakage Resiliency. 213-229 - Priyanka Bose, Dipanjan Das, Chandrasekaran Pandu Rangan:
Constant Size Ring Signature Without Random Oracle. 230-247
Security Protocols
- Tingting Zhang, Hongda Li, Guifang Huang:
Constant-Round Leakage-Resilient Zero-Knowledge Argument for NP from the Knowledge-of-Exponent Assumption. 251-269 - Benjamin Dowling, Douglas Stebila:
Modelling Ciphersuite and Version Negotiation in the TLS Protocol. 270-288 - Leliel Trethowen, Craig Anslow, Stuart Marshall, Ian Welch:
VisRAID: Visualizing Remote Access for Intrusion Detection. 289-306 - Khalid Alissa, Jason Reid, Ed Dawson, Farzad Salim:
BP-XACML an Authorisation Policy Language for Business Processes. 307-325
Symmetric Cryptanalysis
- Ryoma Ito, Atsuko Miyaji:
How TKIP Induces Biases of Internal States of Generic RC4. 329-342 - Shamit Ghosh, Dhiman Saha, Abhrajit Sengupta, Dipanwita Roy Chowdhury:
Preventing Fault Attacks Using Fault Randomization with a Case Study on AES. 343-355 - Gildas Avoine, Adrien Bourgeois, Xavier Carpent:
Analysis of Rainbow Tables with Fingerprints. 356-374
Privacy Protocols
- Yiteng Feng, Yi Mu, Guomin Yang, Joseph K. Liu:
A New Public Remote Integrity Checking Scheme with User Privacy. 377-394 - Clémentine Gritti, Willy Susilo, Thomas Plantard:
Efficient Dynamic Provable Data Possession with Public Verifiability and Data Privacy. 395-412 - Rolf Egert, Marc Fischlin, David Gens, Sven Jacob, Matthias Senker, Jörn Tillmanns:
Privately Computing Set-Union and Set-Intersection Cardinality via Bloom Filters. 413-430
Symmetric Constructions
- Nilanjan Datta, Kan Yasuda:
Generalizing PMAC Under Weaker Assumptions. 433-450 - Megha Agrawal, Donghoon Chang, Somitra Sanadhya:
sp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained Devices. 451-468
Homomorphic Encryption and Obfuscation
- Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba:
Secure Statistical Analysis Using RLWE-Based Homomorphic Encryption. 471-487 - Daniel J. Bernstein, Andreas Hülsing, Tanja Lange, Ruben Niederhagen:
Bad Directions in Cryptographic Hash Functions. 488-508
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.