default search action
15. ACISP 2010: Sydney, Australia
- Ron Steinfeld, Philip Hawkes:
Information Security and Privacy - 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings. Lecture Notes in Computer Science 6168, Springer 2010, ISBN 978-3-642-14080-8
Symmetric Key Encryption
- Ruilin Li, Bing Sun, Chao Li, Longjiang Qu:
Cryptanalysis of a Generalized Unbalanced Feistel Network Structure. 1-18 - Kenneth Koon-Ho Wong, Gregory V. Bard:
Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Systems. 19-36 - Phuong Ha Nguyen, Lei Wei, Huaxiong Wang, San Ling:
On Multidimensional Linear Cryptanalysis. 37-52 - Matthew Henricksen, Wun-She Yap, Chee Hoo Yian, Shinsaku Kiyomoto, Toshiaki Tanaka:
Side-Channel Analysis of the K2 Stream Cipher. 53-73 - Jonathan Etrog, Matthew J. B. Robshaw:
On Unbiased Linear Approximations. 74-86
Hash Functions
- Jean-Philippe Aumasson, Emilia Käsper, Lars R. Knudsen, Krystian Matusiewicz, Rune Steinsmo Ødegård, Thomas Peyrin, Martin Schläffer:
Distinguishers for the Compression Function and Output Transformation of Hamsi-256. 87-103 - Christian Rechberger:
Second-Preimage Analysis of Reduced SHA-1. 104-116 - Ewan Fleischmann, Michael Gorski, Stefan Lucks:
Some Observations on Indifferentiability. 117-134
Public Key Cryptography
- Huafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai:
Adaptive and Composable Non-committing Encryptions. 135-144 - Manuel Barbosa, Pooya Farshim:
Relations among Notions of Complete Non-malleability: Indistinguishability Characterisation and Efficient Construction without Random Oracles. 145-163 - Manuel Barbosa, Pooya Farshim:
Strong Knowledge Extractors for Public-Key Encryption Schemes. 164-181 - Ryo Nishimaki, Eiichiro Fujisaki, Keisuke Tanaka:
A Multi-trapdoor Commitment Scheme from the RSA Assumption. 182-199 - Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Haibo Tian, Jin Li, Kwangjo Kim:
Identity-Based Chameleon Hash Scheme without Key Exposure. 200-215 - Jun Shao, Min Feng, Bin B. Zhu, Zhenfu Cao, Peng Liu:
The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key. 216-232 - Jean-François Biasse, Michael J. Jacobson Jr., Alan K. Silvester:
Security Estimates for Quadratic Field Based Cryptosystems. 233-247 - Noboru Kunihiro:
Solving Generalized Small Inverse Problems. 248-263
Protocols
- Kenneth G. Paterson, Douglas Stebila:
One-Time-Password-Authenticated Key Exchange. 264-281 - James Birkett, Douglas Stebila:
Predicate-Based Key Exchange. 282-299 - M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto:
Attribute-Based Authenticated Key Exchange. 300-317 - Ahto Buldas, Margus Niitsoo:
Optimally Tight Security Proofs for Hash-Then-Publish Time-Stamping. 318-335 - Rafik Chaabouni, Helger Lipmaa, Abhi Shelat:
Additive Combinatorics and Discrete Logarithm Based Range Protocols. 336-351 - Man Ho Au, Willy Susilo, Yi Mu:
Proof-of-Knowledge of Representation of Committed Value and Its Applications. 352-369
Network Security
- Li Sun, Steven Versteeg, Serdar Boztas, Trevor Yann:
Pattern Recognition Techniques for the Classification of Malware Packers. 370-390 - Marek Klonowski, Michal Koza, Miroslaw Kutylowski:
Repelling Sybil-Type Attacks in Wireless Ad Hoc Systems. 391-402
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.