default search action
8. ACISP 2003: Wollongong, Australia
- Reihaneh Safavi-Naini, Jennifer Seberry:
Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings. Lecture Notes in Computer Science 2727, Springer 2003, ISBN 3-540-40515-1
Privacy and Anonymity
- Laurence Bull, David McG. Squire, Jan Newmarch, Yuliang Zheng:
Grouping Verifiable Content for Selective Disclosure. 1-12 - Shigeki Kitazawa, Masakazu Soshi, Atsuko Miyaji:
Evaluation of Anonymity of Practical Anonymous Communication Networks. 13-26 - Pino Persiano, Ivan Visconti:
An Anonymous Credential System and a Privacy-Aware PKI. 27-38 - Masayuki Abe, Hideki Imai:
Flaws in Some Robust Optimistic Mix-Nets. 39-50
Invited Talk (I)
- Andrew M. Odlyzko:
The Unsolvable Privacy Problem and Its Implications for Security Technologies. 51-54
Elliptic Curves
- Yvonne Hitchcock, Paul Montague, Gary Carter, Ed Dawson:
The Security of Fixed versus Random Elliptic Curves in Cryptography. 55-66 - Dong-Guk Han, Nam Su Chang, Seok Won Jung, Young-Ho Park, Chang Han Kim, Heuisu Ryu:
Cryptanalysis of the Full Version Randomized Addition-Subtraction Chains. 67-78 - André Weimerskirch, Douglas Stebila, Sheueling Chang Shantz:
Generic GF(2) Arithmetic in Software and Its Application to ECC. 79-92 - Seigo Arita:
An Addition Algorithm in Jacobian of C34 Curve. 93-105
Cryptanalysis (I)
- Sung-Ming Yen:
Amplified Differential Power Cryptanalysis on Rijndael Implementations with Exponentially Fewer Power Traces. 106-117 - Chien-Ning Chen, Sung-Ming Yen:
Differential Fault Analysis on AES Key Schedule and Some Coutnermeasures. 118-129 - Tetsu Iwata, Tohru Yagi, Kaoru Kurosawa:
On the Pseudorandomness of KASUMI Type Permutations. 130-141 - Masahiko Takenaka, Takeshi Shimoyama, Takeshi Koshiba:
Theoretical Analysis of chi2 Attack on RC6. 142-153
Mobile and Network Security
- Libin Wang, Kefei Chen:
A Typed Theory for Access Control and Information Flow Control in Mobile Systems. 154-165 - Yiu Shing Terry Tin, Colin Boyd, Juan Manuel González Nieto:
Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach. 166-179 - Jabeom Gu, Sehyun Park, Ohyoung Song, Jaeil Lee, Jaehoon Nah, Sung Won Sohn:
Mobile PKI: A PKI-Based Authentication Framework for the Next Generation Mobile Communications. 180-191 - Arvind Narayanan, C. Pandu Rangan, Kwangjo Kim:
Practical Pay TV Schemes. 192-203 - Ha Yoon Song, Han-gyoo Kim:
Cooperative Routers against DoS Attacks. 204-213 - Tao Peng, Christopher Leckie, Kotagiri Ramamohanarao:
Detecting Distributed Denial of Service Attacks by Sharing Distributed Beliefs. 214-225 - Abhishek Singh, Ola Nordström, Chenghuai Lu, André L. M. dos Santos:
Malicious ICMP Tunneling: Defense against the Vulnerability. 226-235 - Sébastien Canard, Jacques Traoré:
On Fair E-cash Systems Based on Group Signature Schemes. 237-248
Invited Talk (II)
- Andreas Pashalidis, Chris J. Mitchell:
A Taxonomy of Single Sign-On Systems. 249-264
Cryptanalysis (II)
- Jaechul Sung, Deukjo Hong, Sangjin Lee:
Key Recovery Attacks on the RMAC, TMAC, and IACBC. 265-273 - Daewan Han, Jin Hong, Jae Woo Han, Daesung Kwon:
Key Recovery Attacks on NTRU without Ciphertext Validation Routine. 274-284 - Sung-Ming Yen, Sang-Jae Moon, JaeCheol Ha:
Permanent Fault Attack on the Parameters of RSA with CRT. 285-296 - Adam L. Young, Moti Yung:
Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts. 297-311
Signature
- Fangguo Zhang, Kwangjo Kim:
Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings. 312-323 - Jung Yeon Hwang, Hyun-Jeong Kim, Dong Hoon Lee, Jong In Lim:
Digital Signature Schemes with Restriction on Signing Capability. 324-335 - Kei Kawauchi, Mitsuru Tada:
On the Extract Security of Multi-signature Schemes Based on RSA. 336-349
Cryptosystems (I)
- Ivan Damgård, Mads Jurik:
A Length-Flexible Threshold Cryptosystem with Applications. 350-364 - Goichiro Hanaoka, Kazuto Ogawa, Itsuro Murota, Go Ohtake, Keigo Majima, Kimiyuki Oyamada, Seiichi Gohshi, Seiichi Namba, Hideki Imai:
Separating Encryption and Key Issuance in Digital Rights Management Systems. 365-376 - Yong Ho Hwang, Chong Hee Kim, Pil Joong Lee:
An Efficient Revocation Scheme with Minimal Message Length for Stateless Receivers. 377-386 - Josef Pieprzyk, David Pointcheval:
Josef Pieprzyk, David Pointcheval. 387-401
Invited Talk (III)
- Li Gong:
Is Cross-Platform Security Possible? 402
Cryptosystems (II)
- Jason Reid, Ian Cheong, Matthew Henricksen, Jason Smith:
A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems. 403-415 - Feng Bao:
Cryptanalysis of a New Cellular Automata Cryptosystem. 416-427 - Chik How Tan, Xun Yi, Chee Kheong Siew:
A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers. 428-442 - Ali Kanso:
Clock-Controlled Shrinking Generator of Feedback Shift Registers. 443-451
Key Management
- Yong Ho Hwang, Dae Hyun Yum, Pil Joong Lee:
EPA: An Efficient Password-Based Protocal for Authenticated Key Exchange. 452-463 - Vanesa Daza, Javier Herranz, Germán Sáez:
Constructing General Dynamic Group Key Distribution Schemes with Decentralized User Join. 464-475 - Taekyoung Kwon:
Robust Software Tokens - Yet Another Method for Securing User's Digital Identity. 476-487
Theory and Hash Functions
- Hwankoo Kim, Sang-Jae Moon:
Public-Key Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders. 488-497 - Khoongming Khoo, Guang Gong:
New Constructions for Resilient and Highly Nonlinear Boolean Functions. 498-509 - Toshihiko Matsuo, Kaoru Kurosawa:
On Parallel Hash Functions Based on Block-Cipher. 510-521 - Swee-Huay Heng, Kaoru Kurosawa:
Square Hash with a Small Key Size. 522-531
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.