default search action
9. ACISP 2004: Sydney, Australia
- Huaxiong Wang, Josef Pieprzyk, Vijay Varadharajan:
Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings. Lecture Notes in Computer Science 3108, Springer 2004, ISBN 3-540-22379-7
Broadcast Encryption and Traitor Tracing
- Shaoquan Jiang, Guang Gong:
Multi-service Oriented Broadcast Encryption. 1-11 - Tomoyuki Asano:
Secure and Insecure Modifications of the Subset Difference Broadcast Encryption Scheme. 12-23 - Vu Dong Tô, Reihaneh Safavi-Naini:
Linear Code Implies Public-Key Traitor Tracing with Revocation. 24-35 - Chong Hee Kim, Yong Ho Hwang, Pil Joong Lee:
TTS without Revocation Capability Secure Against CCA2. 36-49
Private Information Retrieval and Oblivious Transfer
- Yan-Cheng Chang:
Single Database Private Information Retrieval with Logarithmic Communication. 50-61 - Goichiro Hanaoka, Hideki Imai, Jörn Müller-Quade, Anderson C. A. Nascimento, Akira Otsuka, Andreas J. Winter:
Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions. 62-73
Trust and Secret Sharing
- Gildas Avoine, Serge Vaudenay:
Optimistic Fair Exchange Based on Publicly Verifiable Secret Sharing. 74-85 - Marcus Peinado, Yuqun Chen, Paul England, John Manferdelli:
NGSCB: A Trusted Open System. 86-97
Cryptanalysis (I)
- Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle:
The Biryukov-Demirci Attack on Reduced-Round Versions of IDEA and MESH Ciphers. 98-109 - YongSup Shin, Jongsung Kim, Guil Kim, Seokhie Hong, Sangjin Lee:
Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2. 110-122 - Jongsung Kim, Guil Kim, Seokhie Hong, Sangjin Lee, Dowon Hong:
The Related-Key Rectangle Attack - Application to SHACAL-1. 123-136 - Youngdai Ko, Changhoon Lee, Seokhie Hong, Sangjin Lee:
Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1. 137-148 - Michael J. Jacobson Jr.:
The Security of Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders. 149-156
Cryptanalysis (II)
- Feng Bao:
Analysis of a Conference Scheme Under Active and Passive Attacks. 157-163 - Zhiguo Wan, Shuhong Wang:
Cryptanalysis of Two Password-Authenticated Key Exchange Protocols. 164-175 - Feng Bao, Guilin Wang, Jianying Zhou, Huafei Zhu:
Analysis and Improvement of Micali's Fair Contract Signing Protocol. 176-187
Digital Signatures (I)
- Serge Vaudenay:
Digital Signature Schemes with Domain Parameters: Yet Another Parameter Issue in ECDSA. 188-199 - Dae Hyun Yum, Pil Joong Lee:
Generic Construction of Certificateless Signature. 200-211
Cryptosystems (I)
- Wonil Lee, Mridul Nandi, Palash Sarkar, Donghoon Chang, Sangjin Lee, Kouichi Sakurai:
Pseudorandomness of SPN-Type Transformations. 212-223 - Tetsu Iwata, Kaoru Kurosawa:
How to Re-use Round Function in Super-Pseudorandom Permutation. 224-235 - Kaoru Kurosawa, Toshihiko Matsuo:
How to Remove MAC from DHIES. 236-247 - Bruno Crispo, Bogdan C. Popescu, Andrew S. Tanenbaum:
Symmetric Key Authentication Services Revisited. 248-261
Fast Computation
- Brian King, Ben Rubin:
Improvements to the Point Halving Algorithm. 262-276 - Bo-Yin Yang, Jiun-Ming Chen:
Theoretical Analysis of XL over Small Fields. 277-288 - Chae Hoon Lim:
A New Method for Securing Elliptic Scalar Multiplication Against Side-Channel Attacks. 289-300
Mobile Agents Security
- Ming Yao, Matthew Henricksen, Greg Maitland, Ernest Foo, Ed Dawson:
A Mobile Agent System Providing Offer Privacy. 301-312
Digital Signatures (II)
- Willy Susilo, Fangguo Zhang, Yi Mu:
Identity-Based Strong Designated Verifier Signature Schemes. 313-324 - Joseph K. Liu, Victor K. Wei, Duncan S. Wong:
Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract). 325-335 - Toru Nakanishi, Yuji Sugiyama:
A Group Signature Scheme with Efficient Membership Revocation for Reasonable Groups. 336-347 - Zhenjie Huang, Yumin Wang:
Convertible Nominative Signatures. 348-357
Protocols
- Yiu Shing Terry Tin, Harikrishna Vasanta, Colin Boyd, Juan Manuel González Nieto:
Protocols with Security Proofs for Mobile Applications. 358-369 - Steven D. Galbraith, Herbie J. Hopkins, Igor E. Shparlinski:
Secure Bilinear Diffie-Hellman Bits. 370-378 - SungJun Min, Go Yamamoto, Kwangjo Kim:
Weak Property of Malleability in NTRUSign. 379-390
Security Management
- Arjen K. Lenstra, Tim Voss:
Information Security Risk Assessment, Aggregation, and Mitigation. 391-401
Access Control and Authorisation
- Chun Ruan, Vijay Varadharajan:
A Weighted Graph Approach to Authorization Delegation and Conflict Resolution. 402-413 - Xibin Zhao, Kwok-Yan Lam, Siu Leung Chung, Ming Gu, Jia-Guang Sun:
Authorization Mechanisms for Virtual Organizations in Distributed Computing Systems. 414-426
Cryptanalysis (II)
- Luke McAven, Reihaneh Safavi-Naini, Moti Yung:
Unconditionally Secure Encryption Under Strong Attacks. 427-439 - Erik Anderson, Cheryl L. Beaver, Timothy Draelos, Richard Schroeppel, Mark Torgerson:
ManTiCore: Encryption with Joint Cipher-State Authentication. 440-453
Cryptanalysis (III)
- Dong-Guk Han, Jongin Lim, Kouichi Sakurai:
On Security of XTR Public Key Cryptosystems Against Side Channel Attacks. 454-465 - Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume:
On the Exact Flexibility of the Flexible Countermeasure Against Side Channel Attacks. 466-477 - Christophe Giraud, Erik Woodward Knudsen:
Fault Attacks on Signature Schemes. 478-491
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.