default search action
21. ACISP 2016: Melbourne, VIC, Australia
- Joseph K. Liu, Ron Steinfeld:
Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part II. Lecture Notes in Computer Science 9723, Springer 2016, ISBN 978-3-319-40366-3
Signature and Key Management
- Rongmao Chen, Yi Mu, Willy Susilo, Guomin Yang, Fuchun Guo, Mingwu Zhang:
One-Round Strong Oblivious Signature-Based Envelope. 3-20 - Shengmin Xu, Guomin Yang, Yi Mu, Sha Ma:
Proxy Signature with Revocation. 21-36 - Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci, Francesco Palmieri, Aniello Castiglione:
On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures. 37-54
Public Key and Identity-Based Encryption
- Xiaofen Wang, Yi Mu:
Content-Based Encryption. 57-72 - Zhe Xia, Xiaoyun Yang, Min Xiao, Debiao He:
Provably Secure Threshold Paillier Encryption Based on Hyperplane Geometry. 73-86 - Xiling Luo, Yili Ren, Jingwen Liu, Jiankun Hu, Weiran Liu, Zhen Wang, Wei Xu, Qianhong Wu:
Identity-Based Group Encryption. 87-102 - Tran Viet Xuan Phuong, Guomin Yang, Willy Susilo, Kaitai Liang:
Edit Distance Based Encryption and Its Application. 103-119 - Xiaodong Lin, Rongxing Lu:
Proxy Re-encryption with Delegatable Verifiability. 120-133 - Shifeng Sun, Udaya Parampalli, Tsz Hon Yuen, Yu Yu, Dawu Gu:
Efficient Completely Non-Malleable and RKA Secure Public Key Encryptions. 134-150
Searchable Encryption
- Tong Li, Zheli Liu, Ping Li, Chunfu Jia, Zoe Lin Jiang, Jin Li:
Verifiable Searchable Encryption with Aggregate Keys for Data Sharing in Outsourcing Storage. 153-169 - Peng Jiang, Yi Mu, Fuchun Guo, Qiaoyan Wen:
Public Key Encryption with Authorized Keyword Search. 170-186 - Shiwei Zhang, Guomin Yang, Yi Mu:
Linear Encryption with Keyword Search. 187-203
Broadcast Encryption
- Kai He, Jian Weng, Man Ho Au, Yijun Mao, Robert H. Deng:
Generic Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security. 207-222 - Jianchang Lai, Yi Mu, Fuchun Guo, Willy Susilo, Rongmao Chen:
Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing. 223-239
Mathematical Primitives
- Atsushi Takayasu, Noboru Kunihiro:
Partial Key Exposure Attacks on RSA with Multiple Exponent Pairs. 243-257 - Martin W. Bunder, Abderrahmane Nitaj, Willy Susilo, Joseph Tonien:
A New Attack on Three Variants of the RSA Cryptosystem. 258-268 - Takashi Yamakawa, Goichiro Hanaoka, Noboru Kunihiro:
Generalized Hardness Assumption for Self-bilinear Map with Auxiliary Information. 269-284 - Wei Yu, Kunpeng Wang, Bao Li, Xiaoyang He, Song Tian:
Deterministic Encoding into Twisted Edwards Curves. 285-297
Symmetric Cipher
- Nasour Bagheri, Florian Mendel, Yu Sasaki:
Improved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQ. 301-316 - Christian Forler, Eik List, Stefan Lucks, Jakob Wenzel:
Efficient Beyond-Birthday-Bound-Secure Deterministic Authenticated Encryption with Minimal Stretch. 317-332 - Jiageng Chen, Jesen Teh, Chunhua Su, Azman Samsudin, Junbin Fang:
Improved (related-key) Attacks on Round-Reduced KATAN-32/48/64 Based on the Extended Boomerang Framework. 333-346 - Kazuhiko Minematsu:
Authenticated Encryption with Small Stretch (or, How to Accelerate AERO). 347-362 - Keting Jia, Ning Wang:
Impossible Differential Cryptanalysis of 14-Round Camellia-192. 363-378 - Ling Song, Zhangjie Huang, Qianqian Yang:
Automatic Differential Analysis of ARX Block Ciphers with Application to SPECK and LEA. 379-394 - Jiqiang Lu:
On the Security of the LAC Authenticated Encryption Algorithm. 395-408 - Lingyue Qin, Huaifeng Chen, Xiaoyun Wang:
Linear Hull Attack on Round-Reduced Simeck with Dynamic Key-Guessing Techniques. 409-424
Short Papers-Public Key and Identity-Based Encryption
- Dung Hoang Duong, Albrecht Petzoldt, Tsuyoshi Takagi:
Reducing the Key Size of the SRP Encryption Scheme. 427-434
Short Papers-Biometric Security
- Ying-Han Pang, Khor Ean Yee, Shih Yin Ooi:
Biometric Access Control with High Dimensional Facial Features. 437-445 - Shiran Pan, Shen Yan, Wen Tao Zhu:
Security Analysis on Privacy-Preserving Cloud Aided Biometric Identification Schemes. 446-453
Short Papers-Digital Forensics
- Min Yang, Fei Xu, Kam-Pui Chow:
Interest Profiling for Security Monitoring and Forensic Investigation. 457-464
Short Papers-National Security Infrastructure
- Miroslaw Kutylowski, Lucjan Hanzlik, Kamil Kluczniak:
Pseudonymous Signature on eIDAS Token - Implementation Based Privacy Threats. 467-477
Short Papers-Mobile Security
- Yao Cheng, Yingjiu Li, Robert H. Deng:
A Feasible No-Root Approach on Android. 481-489
Short Papers-Network Security
- Timothy Glennan, Christopher Leckie, Sarah M. Erfani:
Improved Classification of Known and Unknown Network Traffic Flows Using Semi-supervised Machine Learning. 493-501
Short Papers-Pseudo Random/One-way Function
- Jhordany Rodriguez Parra, Terence Chan, Siu-Wai Ho:
A Noiseless Key-Homomorphic PRF: Application on Distributed Storage Systems. 505-513
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.