default search action
12. ACISP 2007: Townsville, Australia
- Josef Pieprzyk, Hossein Ghodosi, Ed Dawson:
Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings. Lecture Notes in Computer Science 4586, Springer 2007, ISBN 978-3-540-73457-4
Stream Ciphers
- Steve Babbage, Carlos Cid, Norbert Pramstaller, Håvard Raddum:
An Analysis of the Hermes8 Stream Ciphers. 1-10 - Sultan Al-Hinai, Ed Dawson, Matthew Henricksen, Leonie Ruth Simpson:
On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks. 11-28 - Debojyoti Bhattacharya, Debdeep Mukhopadhyay, Dhiman Saha, Dipanwita Roy Chowdhury:
Strengthening NLS Against Crossword Puzzle Attack. 29-44
Hashing
- Jun Yajima, Yu Sasaki, Yusuke Naito, Terutoshi Iwasaki, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta:
A New Strategy for Finding a Differential Path of SHA-1. 45-58 - Donghoon Chang, Moti Yung, Jaechul Sung, Seokhie Hong, Sangjin Lee:
Preimage Attack on the Parallel FFT-Hashing Function. 59-67 - Norbert Pramstaller, Mario Lamberger, Vincent Rijmen:
Second Preimages for Iterated Hash Functions and Their Implications on MACs. 68-81 - Olivier Billet, Matthew J. B. Robshaw, Thomas Peyrin:
On Building Hash Functions from Multivariate Quadratic Equations. 82-95
Biometrics
- Julien Bringer, Hervé Chabanne, Malika Izabachène, David Pointcheval, Qiang Tang, Sébastien Zimmer:
An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication. 96-106 - Jovan Dj. Golic, Madalina Baltatu:
Soft Generation of Secure Biometric Keys. 107-121
Secret Sharing
- Toshinori Araki, Satoshi Obana:
Flaws in Some Secret Sharing Schemes Against Cheating. 122-132 - Toshinori Araki:
Efficient (k, n) Threshold Secret Sharing Schemes Secure Against Cheating from n-1 Cheaters. 133-142
Cryptanalysis
- Kitae Jeong, Changhoon Lee, Jaechul Sung, Seokhie Hong, Jongin Lim:
Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128. 143-157 - Fen Liu, Wen Ji, Lei Hu, Jintai Ding, Shuwang Lv, Andrei Pyshkin, Ralf-Philipp Weinmann:
Analysis of the SMS4 Block Cipher. 158-170 - Yongdong Wu, Feng Bao, Robert H. Deng:
Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme. 171-183
Public Key Cryptography
- Jean-Philippe Aumasson, Matthieu Finiasz, Willi Meier, Serge Vaudenay:
TCHo: A Hardware-Oriented Trapdoor Cipher. 184-199 - Ryotaro Hayashi, Keisuke Tanaka:
Anonymity on Paillier's Trap-Door Permutation. 200-214 - Qiong Huang, Duncan S. Wong:
Generic Certificateless Key Encapsulation Mechanism. 215-229 - Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume:
Double-Size Bipartite Modular Multiplication. 230-244 - Erik Dahmen, Katsuyuki Okeya, Daniel Schepers:
Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography. 245-258 - Takeru Ishihara, Hiroshi Aono, Sadayuki Hongo, Junji Shikata:
Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM. 259-273 - James Birkett, Alexander W. Dent, Gregory Neven, Jacob C. N. Schuldt:
Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards. 274-292
Authentication
- Christophe Tartary, Huaxiong Wang:
Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication. 293-307 - Xinyi Huang, Yi Mu, Willy Susilo, Duncan S. Wong, Wei Wu:
Certificateless Signature Revisited. 308-322 - Cheng-Kang Chu, Wen-Guey Tzeng:
Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures. 323-337 - Sylvain Pasini, Serge Vaudenay:
Hash-and-Sign with Weak Hashing Made Secure. 338-354 - Kan Yasuda:
"Sandwich" Is Indeed Secure: How to Authenticate a Message with Just One Hashing. 355-369 - Akihiro Yamamura, Takashi Kurokawa, Junji Nakazato:
Threshold Anonymous Group Identification and Zero-Knowledge Proof. 370-384 - Mohammad Reza Reyhanitabar, Shuhong Wang, Reihaneh Safavi-Naini:
Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions. 385-399
E-Commerce
- Stefan Brands, Liesje Demuynck, Bart De Decker:
A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users. 400-415 - Ivan Damgård, Martin Geisler, Mikkel Krøigaard:
Efficient and Secure Comparison for On-Line Auctions. 416-430 - Man Ho Au, Willy Susilo, Yi Mu:
Practical Compact E-Cash. 431-445
Security
- Suvasini Panigrahi, Amlan Kundu, Shamik Sural, Arun K. Majumdar:
Use of Dempster-Shafer Theory and Bayesian Inferencing for Fraud Detection in Mobile Communication Networks. 446-460 - Kannan Srinathan, Prasad Raghavendra, C. Pandu Rangan:
On Proactive Perfectly Secure Message Transmission. 461-473
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.