


default search action
28th ACISP 2023: Brisbane, QLD, Australia
- Leonie Simpson
, Mir Ali Rezazadeh Baee
:
Information Security and Privacy - 28th Australasian Conference, ACISP 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings. Lecture Notes in Computer Science 13915, Springer 2023, ISBN 978-3-031-35485-4
Symmetric-Key Cryptography
- Zhuohui Feng, Ye Luo, Chao Wang, Qianqian Yang, Zhiquan Liu, Ling Song:
Improved Differential Cryptanalysis on SPECK Using Plaintext Structures. 3-24 - Zeyu Xu, Shiyao Chen, Meiqin Wang, Puwen Wei:
Linear Cryptanalysis and Its Variants with Fast Fourier Transformation Technique on MPC/FHE/ZK-Friendly 𝔽p-Based Ciphers. 25-52 - Cheng Che, Tian Tian:
A New Correlation Cube Attack Based on Division Property. 53-71 - Xiaofeng Xie, Tian Tian:
The Triangle Differential Cryptanalysis. 72-88 - Matthew Beighton
, Harry Bartlett
, Leonie Simpson
, Kenneth Koon-Ho Wong
:
Key Recovery Attacks on Grain-Like Keystream Generators with Key Injection. 89-108 - Yongxia Mao, Wenling Wu, Yafei Zheng, Lei Zhang:
Related-Cipher Attacks: Applications to Ballet and ANT. 109-123 - Jinliang Wang, Chao Niu, Qun Liu, Muzhou Li
, Bart Preneel, Meiqin Wang:
Cryptanalysis of SPEEDY. 124-156 - Francesco Berti:
Reconsidering Generic Composition: The Modes A10, A11 and A12 are Insecure. 157-176 - Nicky Mouha
:
Exploring Formal Methods for Cryptographic Hash Function Implementations. 177-195
Public-Key Cryptography
- Jia-Chng Loh
, Fuchun Guo
, Willy Susilo
, Guomin Yang:
A Tightly Secure ID-Based Signature Scheme Under DL Assumption in AGM. 199-219 - Ren Ishibashi, Kazuki Yoneyama:
Compact Password Authenticated Key Exchange from Group Actions. 220-247 - Peiying Xu, Li-Ping Wang:
Multi-key Homomorphic Secret Sharing from LWE Without Multi-key HE. 248-269 - Malika Izabachène, Lucas Prabel, Adeline Roux-Langlois:
Identity-Based Encryption from Lattices Using Approximate Trapdoors. 270-290 - Masahito Ishizaka, Kazuhide Fukushima:
Homomorphic Signatures for Subset and Superset Mixed Predicates and Its Applications. 291-319 - Jingjing Fan
, Xingye Lu
, Man Ho Au
:
Adaptively Secure Identity-Based Encryption from Middle-Product Learning with Errors. 320-340
Post-Quantum Cryptography
- Quan Yuan
, Mehdi Tibouchi, Masayuki Abe:
Quantum-Access Security of Hash-Based Signature Schemes. 343-380 - Ernest Foo
, Qinyi Li:
Tightly Secure Lattice Identity-Based Signature in the Quantum Random Oracle Model. 381-402 - Motoki Nakahashi, Rentaro Shiba
, Ravi Anand, Mostafizar Rahman, Kosei Sakamoto, Fukang Liu, Takanori Isobe:
Ghidle: Efficient Large-State Block Ciphers for Post-quantum Security. 403-430 - Huiqin Chen
, Yongqiang Li
, Parhat Abla, Zhiran Li, Lin Jiao, Mingsheng Wang:
Quantum Algorithm for Finding Impossible Differentials and Zero-Correlation Linear Hulls of Symmetric Ciphers. 431-451 - Naoto Kimura, Atsushi Takayasu
, Tsuyoshi Takagi:
Memory-Efficient Quantum Information Set Decoding Algorithm. 452-468
Cryptographic Protocols
- Shahla Atapoor
, Karim Baghery
, Daniele Cozzo
, Robi Pedersen
:
CSI-SharK: CSI-FiSh with Sharing-friendly Keys. 471-502 - Tsz Hon Yuen
, Shimin Pan
, Sheng Huang, Xiaoting Zhang
:
Practical Verifiable Random Function with RKA Security. 503-522 - Sayantan Mukherjee
:
Statistically Consistent Broadcast Authenticated Encryption with Keyword Search - Adaptive Security from Standard Assumptions. 523-552 - Colin Boyd, Bor de Kock, Lise Millerjord:
Modular Design of KEM-Based Authenticated Key Exchange. 553-579 - Akash Madhusudan
, Mahdi Sedaghat
, Samarth Tiwari
, Kelong Cong
, Bart Preneel
:
Reusable, Instant and Private Payment Guarantees for Cryptocurrencies. 580-605
System Security
- Maliha Ismail, Yan Lin, DongGyun Han
, Debin Gao
:
BinAlign: Alignment Padding Based Compiler Provenance Recovery. 609-629 - Zulu Okonkwo, Ernest Foo
, Zhe Hou
, Qinyi Li, Zahra Jadidi:
Encrypted Network Traffic Classification with Higher Order Graph Neural Network. 630-650

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.