default search action
27th ACISP 2022: Wollongong, NSW, Australia
- Khoa Nguyen, Guomin Yang, Fuchun Guo, Willy Susilo:
Information Security and Privacy - 27th Australasian Conference, ACISP 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings. Lecture Notes in Computer Science 13494, Springer 2022, ISBN 978-3-031-22300-6
Symmetric-Key Cryptography
- Jian Guo, Ling Song, Haoyang Wang:
Key Structures: Improved Related-Key Boomerang Attack Against the Full AES-256. 3-23 - Lorenzo Grassi, Christian Rechberger:
Truncated Differential Properties of the Diagonal Set of Inputs for 5-Round AES. 24-45 - Shotaro Miyashita, Ryoma Ito, Atsuko Miyaji:
PNB-Focused Differential Cryptanalysis of ChaCha Stream Cipher. 46-66 - Yuhan Zhang, Wenling Wu, Lei Zhang:
Improved Differential Attack on Round-Reduced LEA. 67-84 - Subodh Bijwe, Amit Kumar Chauhan, Somitra Kumar Sanadhya:
Implementing Grover Oracle for Lightweight Block Ciphers Under Depth Constraints. 85-105 - Yongxia Mao, Wenling Wu, Bolin Wang, Li Zhang:
Improved Division Property for Ciphers with Complex Linear Layers. 106-124 - Alexandre Adomnicai, Kazuhiko Minematsu, Maki Shigeri:
Fast Skinny-128 SIMD Implementations for Sequential Modes of Operation. 125-144
Public-Key Cryptanalysis
- Jinzheng Cao, Yanbin Pan, Qingfeng Cheng, Xinghua Li:
Handle the Traces: Revisiting the Attack on ECDSA with EHNP. 147-167 - Lei Bi, Xianhui Lu, Junjie Luo, Kunpeng Wang:
Hybrid Dual and Meet-LWE Attack. 168-188 - Wenshuo Guo, Fangwei Fu:
Cryptanalysis and Repair of a Gabidulin Code Based Cryptosystem from ACISP 2018. 189-205
Public-Key Cryptography
- Yusaku Maeda, Koji Nuida:
Chosen Ciphertext Secure Keyed Two-Level Homomorphic Encryption. 209-228 - Yumei Li, Mingwu Zhang, Futai Zhang:
Structure-Preserving Linearly Homomorphic Signature with Designated Combiner for Subspace. 229-243 - Angelique Faye Loe, Liam Medley, Christian O'Connell, Elizabeth A. Quaglia:
TIDE: A Novel Approach to Constructing Timed-Release Encryption. 244-264 - Shimin Pan, Kwan Yin Chan, Handong Cui, Tsz Hon Yuen:
Multi-signatures for ECDSA and Its Applications in Blockchain. 265-285
Post-quantum Cryptography
- Shi Bai, Austin Beard, Floyd Johnson, Sulani K. B. Vidhanalage, Tran Ngo:
Fiat-Shamir Signatures Based on Module-NTRU. 289-308 - Kittiphon Phalakarn, Vorapong Suppakitpaisarn, M. Anwar Hasan:
Speeding-Up Parallel Computation of Large Smooth-Degree Isogeny Using Precedence-Constrained Scheduling. 309-331 - Xiaohui Ding, Muhammed F. Esgin, Amin Sakzad, Ron Steinfeld:
An Injectivity Analysis of Crystals-Kyber and Implications on Quantum Security. 332-351
Cryptographic Protocols
- Kristian Gjøsteen, Thomas Haines, Johannes Müller, Peter B. Rønne, Tjerand Silde:
Verifiable Decryption in the Head. 355-374 - Handong Zhang, Puwen Wei, Haiyang Xue, Yi Deng, Jinsong Li, Wei Wang, Guoxiao Liu:
Resumable Zero-Knowledge for Circuits from Symmetric Key Primitives. 375-398 - Donghoon Chang, Surabhi Garg, Munawar Hasan, Sweta Mishra:
On Security of Fuzzy Commitment Scheme for Biometric Authentication. 399-419 - Mayank Raikwar, Danilo Gligoroski:
SoK: Decentralized Randomness Beacon Protocols. 420-446
Blockchain
- Xiaofei Wu, Hao Wang, Chunpeng Ge, Lu Zhou, Qiong Huang, Lanju Kong, Lizhen Cui, Zhe Liu:
CCOM: Cost-Efficient and Collusion-Resistant Oracle Mechanism for Smart Contracts. 449-468 - Shenwei Chen, Zhen Liu, Yu Long, Dawu Gu:
DeChain: A Blockchain Framework Enhancing Decentralization via Sharding. 469-488 - Arash Mirzaei, Amin Sakzad, Jiangshan Yu, Ron Steinfeld:
Garrison: A Novel Watchtower Scheme for Bitcoin. 489-508 - Chen Zhao, Jianing Ding, Zhenzhen Li, Zhen Li, Gang Xiong, Gaopeng Gou:
Shoot Before You Escape: Dynamic Behavior Monitor of Bitcoin Users via Bi-Temporal Network Analytics. 509-528
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.