


default search action
18. ACISP 2013: Brisbane, Australia
- Colin Boyd, Leonie Simpson:
Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings. Lecture Notes in Computer Science 7959, Springer 2013, ISBN 978-3-642-39058-6
Cryptanalysis I
- Chris J. Mitchell
:
Analysing the IOBC Authenticated Encryption Mode. 1-12 - Subhadeep Banik
, Subhamoy Maitra, Santanu Sarkar
, Meltem Sönmez Turan:
A Chosen IV Related Key Attack on Grain-128a. 13-26 - Zhenqing Shi, Bin Zhang, Dengguo Feng:
Cryptanalysis of Helix and Phelix Revisited. 27-40
RSA
- Hui Zhang, Tsuyoshi Takagi:
Attacks on Multi-Prime RSA with Small Prime Difference. 41-56 - Yao Lu, Rui Zhang, Dongdai Lin:
Factoring Multi-power RSA Modulus N = p r q with Partial Known Bits. 57-71 - Masayuki Fukumitsu, Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya:
Toward Separating the Strong Adaptive Pseudo-freeness from the Strong RSA Assumption. 72-87 - Yoshinori Aono:
Minkowski Sum Based Lattice Construction for Multivariate Simultaneous Coppersmith's Technique and Applications to RSA. 88-103
Lattices and Security Proofs
- Thomas Plantard
, Willy Susilo
, Zhenfei Zhang:
Adaptive Precision Floating Point LLL. 104-117 - Atsushi Takayasu, Noboru Kunihiro
:
Better Lattice Constructions for Solving Multivariate Linear Equations Modulo Unknown Divisors. 118-135 - Baodong Qin, Shengli Liu, Zhengan Huang:
Key-Dependent Message Chosen-Ciphertext Security of the Cramer-Shoup Cryptosystem. 136-151 - Ahto Buldas
, Margus Niitsoo:
Black-Box Separations and Their Adaptability to the Non-uniform Model. 152-167
Public Key Cryptography
- Hiroaki Anada, Seiko Arita, Sari Handa, Yosuke Iwabuchi:
Attribute-Based Identification: Definitions and Efficient Constructions. 168-186 - Yang Wang, Mark Manulis
, Man Ho Au
, Willy Susilo
:
Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt". 187-202 - Pierre-Alain Fouque, Antoine Joux
, Mehdi Tibouchi
:
Injective Encodings to Elliptic Curves. 203-218 - Fuchun Guo
, Yi Mu, Willy Susilo
, Vijay Varadharajan
:
Membership Encryption and Its Applications. 219-234
Hashing
- Ahto Buldas
, Risto Laanoja:
Security Proofs for Hash Tree Time-Stamping Using Hash Functions with Small Output Size. 235-250 - Dongxia Bai, Hongbo Yu, Gaoli Wang, Xiaoyun Wang:
Improved Boomerang Attacks on SM3. 251-266
Invited Talk
- Xavier Boyen:
Expressive Cryptography: Lattice Perspectives. 267
Cryptanalysis II
- Takanori Isobe, Yu Sasaki, Jiageng Chen
:
Related-Key Boomerang Attacks on KATAN32/48/64. 268-285 - Junko Takahashi, Toshinori Fukunaga, Kazumaro Aoki, Hitoshi Fuji:
Highly Accurate Key Extraction Method for Access-Driven Cache Attacks Using Correlation Coefficient. 286-301 - Yosuke Todo
:
Upper Bounds for the Security of Several Feistel Networks. 302-317
Signatures
- Willy Susilo
, Man Ho Au
, Yang Wang, Duncan S. Wong:
Fairness in Concurrent Signatures Revisited. 318-329 - Essam Ghadafi
:
Formalizing Group Blind Signatures and Practical Constructions without Random Oracles. 330-346
Passwords and Mobile Security
- Byoung-Il Kim, Jin Hong
:
Analysis of the Non-perfect Table Fuzzy Rainbow Tradeoff. 347-362 - Seyit Ahmet Çamtepe
:
Complexity of Increasing the Secure Connectivity in Wireless Ad Hoc Networks. 363-378 - Kristian Gjøsteen, George Petrides
, Asgeir Steine:
Towards Privacy Preserving Mobile Internet Communications - How Close Can We Get? 379-387 - Leah F. South
, Douglas Stebila
:
Count-Min Sketches for Estimating Password Frequency within Hamming Distance Two. 388-402
Secret Sharing
- Yang Yu, Zhanfei Zhou:
A Rational Secret Sharing Protocol with Unconditional Security in the Synchronous Setting. 403-418 - Ryo Kikuchi, Koji Chida, Dai Ikarashi, Koki Hamada, Katsumi Takahashi:
Secret Sharing Schemes with Conversion Protocol to Achieve Short Share-Size and Extendibility to Multiparty Computation. 419-434
Invited Talk
- Yuliang Zheng:
Public Key Cryptography for Mobile Cloud. 435

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.