Information security and privacy : 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings /
Saved in:
Meeting name: | ACISP (Conference) (18th : 2013 : Brisbane, Qld.) |
---|---|
Imprint: | Berlin ; New York : Springer, ©2013. |
Description: | 1 online resource (xi, 434 pages) : illustrations (black and white). |
Language: | English |
Series: | Lecture notes in computer science, 0302-9743 ; 7959 LNCS sublibrary. SL 4, Security and cryptology Lecture notes in computer science ; 7959. LNCS sublibrary. SL 4, Security and cryptology. |
Subject: | |
Format: | E-Resource Book |
URL for this record: | http://pi.lib.uchicago.edu/1001/cat/bib/11078992 |
Table of Contents:
- Cryptanalysis I. Analysing the IOBC Authenticated Encryption Mode / Chris J. Mitchell
- A Chosen IV Related Key Attack on Grain-128a / Subhadeep Banik [and others]
- Cryptanalysis of Helix and Phelix Revisited / Zhenqing Shi, Bin Zhang, Dengguo Feng
- RSA. Attacks on Multi-Prime RSA with Small Prime Difference / Hui Zhang, Tsuyoshi Takagi
- Factoring Multi-power RSA Modulus N=prq with Partial Known Bits / Yao Lu, Rui Zhang, Dongdai Lin
- Toward Separating the Strong Adaptive Pseudo-freeness from the Strong RSA Assumption / Masayuki Fukumitsu [and others]
- Minkowski Sum Based Lattice Construction for Multivariate Simultaneous Coppersmith's Technique and Applications to RSA / Yoshinori Aono
- Lattices and Security Proofs. Adaptive Precision Floating Point LLL / Thomas Plantard, Willy Susilo, Zhenfei Zhang
- Better Lattice Constructions for Solving Multivariate Linear Equations Modulo Unknown Divisors / Atsushi Takayasu, Noboru Kunihiro
- Key-Dependent Message Chosen-Ciphertext Security of the Cramer-Shoup Cryptosystem / Baodong Qin, Shengli Liu, Zhengan Huang
- Black-Box Separations and Their Adaptability to the Non-uniform Model / Ahto Buldas, Margus Niitsoo.
- Public Key Cryptography. Attribute-Based Identification: Definitions and Efficient Constructions / Hiroaki Anada, Seiko Arita, Sari Handa, Yosuke Iwabuchi
- Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt" / Yang Wang, Mark Manulis, Man Ho Au, Willy Susilo
- Injective Encodings to Elliptic Curves / Pierre-Alain Fouque, Antoine Joux, Mehdi Tibouchi
- Membership Encryption and Its Applications / Fuchun Guo, Yi Mu, Willy Susilo, Vijay Varadharajan
- Hashing. Security Proofs for Hash Tree Time-Stamping Using Hash Functions with Small Output Size / Ahto Buldas, Risto Laanoja
- Improved Boomerang Attacks on SM3 / Dongxia Bai, Hongbo Yu, Gaoli Wang, Xiaoyun Wang
- Invited Talk. Expressive Cryptography: Lattice Perspectives / Xavier Boyen
- Cryptanalysis II. Related-Key Boomerang Attacks on KATAN32/48/64 / Takanori Isobe, Yu Sasaki, Jiageng Chen
- Highly Accurate Key Extraction Method for Access-Driven Cache Attacks Using Correlation Coefficient / Junko Takahashi [and others].
- Upper Bounds for the Security of Several Feistel Networks / Yosuke Todo
- Signatures. Fairness in Concurrent Signatures Revisited / Willy Susilo, Man Ho Au, Yang Wang, Duncan S. Wong
- Formalizing Group Blind Signatures and Practical Constructions without Random Oracles / Essam Ghadafi
- Passwords and Mobile Security. Analysis of the Non-perfect Table Fuzzy Rainbow Tradeoff / Byoung-Il Kim, Jin Hong
- Complexity of Increasing the Secure Connectivity in Wireless Ad Hoc Networks / Seyit A. Camtepe
- Towards Privacy Preserving Mobile Internet Communications
- How Close Can We Get? / Kristian Gjøsteen, George Petrides, Asgeir Steine
- Count-Min Sketches for Estimating Password Frequency within Hamming Distance Two / Leah South, Douglas Stebila
- Secret Sharing. A Rational Secret Sharing Protocol with Unconditional Security in the Synchronous Setting / Yang Yu, Zhanfei Zhou
- Secret Sharing Schemes with Conversion Protocol to Achieve Short Share-Size and Extendibility to Multiparty Computation / Ryo Kikuchi [and others]
- Invited Talk. Public Key Cryptography for Mobile Cloud / Yuliang Zheng.