default search action
16. ACISP 2011: Melbourne, Australia
- Udaya Parampalli, Philip Hawkes:
Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings. Lecture Notes in Computer Science 6812, Springer 2011, ISBN 978-3-642-22496-6
Invited Talks
- Claude Carlet:
On Known and New Differentially Uniform Functions. 1-15
Symmetric Key Cryptography
- Jiazhe Chen, Keting Jia, Hongbo Yu, Xiaoyun Wang:
New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256. 16-33 - Meicheng Liu, Dongdai Lin, Dingyi Pei:
Results on the Immunity of Boolean Functions against Probabilistic Algebraic Attacks. 34-46 - Yusong Du, Fangguo Zhang:
Finding More Boolean Functions with Maximum Algebraic Immunity Based on Univariate Polynomial Representation. 47-60 - Phuong Ha Nguyen, Hongjun Wu, Huaxiong Wang:
Improving the Algorithm 2 in Multidimensional Linear Cryptanalysis. 61-74 - Sui-Guan Teo, Ali Al-Hamdan, Harry Bartlett, Leonie Simpson, Kenneth Koon-Ho Wong, Ed Dawson:
State Convergence in the Initialisation of Stream Ciphers. 75-88 - Kazuhiko Minematsu, Tomoyasu Suzaki, Maki Shigeri:
On Maximum Differential Probability of Generalized Feistel. 89-105 - Andrey Bogdanov, Kyoji Shibutani:
Double SP-Functions: Enhanced Generalized Feistel Networks - Extended Abstract. 106-119 - Meiqin Wang, Yue Sun, Nicky Mouha, Bart Preneel:
Algebraic Techniques in Differential Cryptanalysis Revisited. 120-141
Hash Functions
- Juraj Sarinay:
Faster and Smoother - VSH Revisited. 142-156 - Hongbo Yu, Xiaoyun Wang:
Cryptanalysis of the Compression Function of SIMD. 157-171
Protocols
- Man Ho Au, Willy Susilo, Yi Mu:
Electronic Cash with Anonymous User Suspension. 172-188 - Tetsuya Hatano, Atsuko Miyaji, Takashi Sato:
T-Robust Scalable Group Key Exchange Protocol with O(logn) Complexity. 189-207 - Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes:
Application-Binding Protocol in the User Centric Smart Card Ownership Model. 208-225
Access Control and Security
- Benjamin W. Long:
Security in Depth through Smart Space Cascades. 226-240 - Mingwu Zhang, Tsuyoshi Takagi:
GeoEnc: Geometric Area Based Keys and Policies in Functional Encryption Systems. 241-258 - Yun Zhang, Christophe Tartary, Huaxiong Wang:
An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder Theorem. 259-275 - Shashank Lagishetty, Pruthvi Reddy Sabbu, Kannan Srinathan:
DMIPS - Defensive Mechanism against IP Spoofing. 276-291
Public Key Cryptography
- Eduarda S. V. Freire, Kenneth G. Paterson:
Provably Secure Key Assignment Schemes from Factoring. 292-309 - Yamin Liu, Bao Li, Xianhui Lu, Dingding Jia:
Efficient CCA-Secure CDH Based KEM Balanced between Ciphertext and Key. 310-318 - Atsushi Fujioka, Yoshiaki Okamoto, Taiichi Saito:
Generic Construction of Strongly Secure Timed-Release Public-Key Encryption. 319-336 - Joseph K. Liu, Cheng-Kang Chu, Jianying Zhou:
Identity-Based Server-Aided Decryption. 337-352 - Sanjit Chatterjee, Alfred Menezes, Berkant Ustaoglu:
A Generic Variant of NIST's KAS2 Key Agreement Protocol. 353-370 - Jia Fan, Yuliang Zheng, Xiaohu Tang:
A Single Key Pair is Adequate for the Zheng Signcryption. 371-388 - Qiang Tang:
Towards Public Key Encryption Scheme Supporting Equality Test with Fine-Grained Authorization. 389-406
Posters
- Reza Sepahi, Ron Steinfeld, Josef Pieprzyk:
Lattice-Based Completely Non-malleable PKE in the Standard Model (Poster). 407-411 - Craig S. Wright:
Compliance or Security, What Cost? (Poster). 412-416 - Chiaki Ohtahara, Keita Okada, Yu Sasaki, Takeshi Shimoyama:
Preimage Attacks on Full-ARIRANG (Poster). 417-422 - Bart Preneel, Hirotaka Yoshida, Dai Watanabe:
Finding Collisions for Reduced Luffa-256 v2 (Poster). 423-427 - Praveen Gauravaram, Lars R. Knudsen, Nasour Bagheri, Lei Wei:
Improved Security Analysis of Fugue-256 (Poster). 428-432 - Lei Wei, Christian Rechberger, Jian Guo, Hongjun Wu, Huaxiong Wang, San Ling:
Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster). 433-438 - Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman:
Toward Dynamic Attribute-Based Signcryption (Poster). 439-443 - Christian L. F. Corniaux, Hossein Ghodosi:
A Verifiable Distributed Oblivious Transfer Protocol. 444-450 - Kun Peng:
Impracticality of Efficient PVSS in Real Life Security Standard (Poster). 451-455 - Hongying Liu, Yukiyasu Tsunoo, Satoshi Goto:
Electromagnetic Analysis Enhancement with Signal Processing Techniques (Poster). 456-461
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.