default search action
11. ACISP 2006: Melbourne, Australia
- Lynn Margaret Batten, Reihaneh Safavi-Naini:
Information Security and Privacy, 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings. Lecture Notes in Computer Science 4058, Springer 2006, ISBN 3-540-35458-1
Stream Ciphers
- Sultan Al-Hinai, Lynn Margaret Batten, Bernard D. Colbert, Kenneth Koon-Ho Wong:
Algebraic Attacks on Clock-Controlled Stream Ciphers. 1-16 - Jacques J. A. Fournier, Michael Tunstall:
Cache Based Power Analysis Attacks on AES. 17-28 - Joo Yeon Cho, Josef Pieprzyk:
Distinguishing Attack on SOBER-128 with Linear Masking. 29-39 - An Braeken, Joseph Lano, Bart Preneel:
Evaluating the Resistance of Stream Ciphers with Linear Feedback Against Fast Algebraic Attacks. 40-51
Symmetric Key Ciphers
- Matthew Henricksen, Ed Dawson:
Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond. 52-63 - Leonie Ruth Simpson, Matthew Henricksen:
Improved Cryptanalysis of MAG. 64-75 - Nicolas T. Courtois, Blandine Debraize, Eric Garrido:
On Exact Algebraic [Non-]Immunity of S-Boxes Based on Power Functions. 76-86
Network Security
- Anantharaman Lakshminarayanan, Tong-Lee Lim:
Augmented Certificate Revocation Lists. 87-98 - Shidi Xu, Yi Mu, Willy Susilo:
Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security. 99-110 - Anh-Quynh Nguyen, Yoshiyasu Takefuji:
Towards an Invisible Honeypot Monitoring System. 111-122
Cryptographic Applications
- Kazuto Ogawa, Goichiro Hanaoka, Hideki Imai:
Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service. 123-135 - André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi:
Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages. 136-147 - Huafei Zhu, Feng Bao:
More on Stand-Alone and Setup-Free Verifiably Committed Signatures. 148-158
Secure Implementation
- Hung-Min Sun, Yue-Hsun Lin, Ming-Fung Wu:
API Monitoring System for Defeating Worms and Exploits in MS-Windows System. 159-170 - Yu Yu, Jussipekka Leiwo, A. Benjamin Premkumar:
Hiding Circuit Topology from Unbounded Reverse Engineers. 171-182 - John W. Holford, William J. Caelli:
The Role of the Self-Defending Object Concept in Developing Distributed Security-Aware Applications. 183-194
Signatures
- Shanshan Duan, Zhenfu Cao:
Efficient and Provably Secure Multi-receiver Identity-Based Signcryption. 195-206 - Kenneth G. Paterson, Jacob C. N. Schuldt:
Efficient Identity-Based Signatures Secure in the Standard Model. 207-222 - Man Ho Au, Willy Susilo, Siu-Ming Yiu:
Event-Oriented k-Times Revocable-iff-Linked Group Signatures. 223-234 - Bessie C. Hu, Duncan S. Wong, Zhenfeng Zhang, Xiaotie Deng:
Key Replacement Attack Against a Generic Construction of Certificateless Signature. 235-246
Theory
- Kun Peng, Colin Boyd, Ed Dawson, Eiji Okamoto:
A Novel Range Test. 247-258 - Shaoquan Jiang:
Efficient Primitives from Exponentiation in Zp. 259-270 - Ryotaro Hayashi, Keisuke Tanaka:
PA in the Two-Key Setting and a Generic Conversion for Encryption with Anonymity. 271-282 - Raphael Overbeck:
Statistical Decoding Revisited. 283-294
Invited Talk
- Mike Burmester, Tri Van Le, Breno de Medeiros:
Towards Provable Security for Ubiquitous Applications. 295-312
Security Applications
- Huafei Zhu, Feng Bao:
Oblivious Scalar-Product Protocols. 313-323 - Ebaa Fayyoumi, B. John Oommen:
On Optimizing the k-Ward Micro-aggregation Technique for Secure Statistical Databases. 324-335
Provable Security
- Eike Kiltz, David Galindo:
Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles. 336-347 - Takashi Kitagawa, Peng Yang, Goichiro Hanaoka, Rui Zhang, Hajime Watanabe, Kanta Matsuura, Hideki Imai:
Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT. 348-359 - Masayuki Abe, Yang Cui, Hideki Imai, Kaoru Kurosawa:
Tag-KEM from Set Partial Domain One-Way Permutations. 360-370
Protocols
- Colin Boyd, Kim-Kwang Raymond Choo, Anish Mathuria:
An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys. 371-382 - Isaac Agudo, Javier López, José A. Montenegro:
Graphical Representation of Authorization Policies for Weighted Credentials. 383-394 - Yin Yin, Bao Li:
Secure Cross-Realm C2C-PAKE Protocol. 395-406
Hashing and Message Authentication
- Praveen Gauravaram, William Millan, Ed Dawson, Kapali Viswanathan:
Constructing Secure Hash Functions by Enhancing Merkle-Damgård Construction. 407-420 - Changhoon Lee, Jongsung Kim, Jaechul Sung, Seokhie Hong, Sangjin Lee:
Forgery and Key Recovery Attacks on PMAC and Mitchell's TMAC Variant. 421-431 - Katsuyuki Okeya:
Side Channel Attacks Against HMACs Based on Block-Cipher Based Hash Functions. 432-443
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.