default search action
23rd ACISP 2018: Wollongong, NSW, Australia
- Willy Susilo, Guomin Yang:
Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings. Lecture Notes in Computer Science 10946, Springer 2018, ISBN 978-3-319-93637-6
Foundation
- Liqiang Peng, Yao Lu, Noboru Kunihiro, Rui Zhang, Lei Hu:
A Deterministic Algorithm for Computing Divisors in an Interval. 3-12 - Yunhua Wen, Shengli Liu:
Reusable Fuzzy Extractor from LWE. 13-27 - Jung Hee Cheon, Jinhyuck Jeong, Dongwoo Kim, Jongchan Lee:
A Reusable Fuzzy Extractor with Practical Storage Size: Modifying Canetti et al.'s Construction. 28-44 - Bernardo David, Rafael Dowsley, Mario Larangeira:
21 - Bringing Down the Complexity: Fast Composable Protocols for Card Games Without Secret State. 45-63 - Ryo Kikuchi, Dai Ikarashi, Takahiro Matsuda, Koki Hamada, Koji Chida:
Efficient Bit-Decomposition and Modulus-Conversion Protocols with an Honest Majority. 64-82 - Zhe Xia, Liuying Sun, Bo Yang, Yanwei Zhou, Mingwu Zhang:
Verifiable Secret Sharing Based on Hyperplane Geometry with Its Applications to Optimal Resilient Proactive Cryptosystems. 83-100 - Eunkyung Kim, Hyang-Sook Lee, Jeongeun Park:
Towards Round-Optimal Secure Multiparty Computations: Multikey FHE Without a CRS. 101-113 - Souradyuti Paul, Ananya Shrivastava:
Robust Multiparty Computation with Faster Verification Time. 114-131
Symmetric-Key Cryptography
- Howard M. Heys:
Distributed Time-Memory Tradeoff Attacks on Ciphers - (with Application to Stream Ciphers and Counter Mode). 135-153 - Ryoma Ito, Atsuko Miyaji:
New Iterated RC4 Key Correlations. 154-171 - Chen-Dong Ye, Tian Tian:
A New Framework for Finding Nonlinear Superpolies in Cube Attacks Against Trivium-Like Ciphers. 172-187 - Nicolas Marrière, Valérie Nachef, Emmanuel Volte:
Differential Attacks on Reduced Round LILLIPUT. 188-206 - Sumanta Sarkar, Habeeb Syed:
Bounds on Differential and Linear Branch Number of Permutations. 207-224 - Yusuke Naito:
Keyed Sponge with Prefix-Free Padding: Independence Between Capacity and Online Queries Without the Suffix Key. 225-242
Public-Key Cryptography
- Xavier Boyen, Thomas Haines:
Forward-Secure Linkable Ring Signatures. 245-264 - Ziyuan Hu, Shengli Liu, Kefei Chen, Joseph K. Liu:
Revocable Identity-Based Encryption from the Computational Diffie-Hellman Problem. 265-283 - Shimin Li, Bei Liang, Rui Xue:
Private Functional Signatures: Definition and Construction. 284-303 - Haibin Zheng, Qianhong Wu, Bo Qin, Lin Zhong, Shuangyu He, Jianwei Liu:
Linkable Group Signature for Auditing Anonymous Communication. 304-321 - Lin Zhong, Qianhong Wu, Bo Qin, Haibin Zheng, Jianwei Liu:
Auditable Hierarchy-Private Public-Key Encryption. 322-340 - Hiroaki Anada, Akira Kanaoka, Natsume Matsuzaki, Yohei Watanabe:
Key-Updatable Public-Key Encryption with Keyword Search: Models and Generic Constructions. 341-359 - Xuecheng Ma, Xin Wang, Dongdai Lin:
Anonymous Identity-Based Encryption with Identity Recovery. 360-375 - Chi Liu, Rongmao Chen, Yi Wang, Yongjun Wang:
Asymmetric Subversion Attacks on Signature Schemes. 376-395
Cloud Security
- Yan Xu, Ran Ding, Jie Cui, Hong Zhong:
Intrusion-Resilient Public Auditing Protocol for Data Storage in Cloud Computing. 399-416 - Jian Shen, Dengzhi Liu, Xiaofeng Chen, Xinyi Huang, Jiageng Chen, Mingwu Zhang:
Secure Publicly Verifiable Computation with Polynomial Commitment in Cloud Computing. 417-430 - Lin Liu, Jinshu Su, Rongmao Chen, Ximeng Liu, Xiaofeng Wang, Shuhui Chen, Ho-fung Leung:
Privacy-Preserving Mining of Association Rule on Outsourced Cloud Data from Multiple Parties. 431-451
Post-quantum Cryptography
- Haoyu Li, Renzhang Liu, Abderrahmane Nitaj, Yanbin Pan:
Cryptanalysis of the Randomized Version of a Lattice-Based Signature Scheme from PKC'08. 455-466 - Jintai Ding, Scott R. Fluhrer, Saraswathy RV:
Complete Attack on RLWE Key Exchange with Reused Keys, Without Signal Leakage. 467-486 - Yacheng Wang, Yasuhiko Ikematsu, Dung Hoang Duong, Tsuyoshi Takagi:
Efficient Decryption Algorithms for Extension Field Cancellation Type Encryption Schemes. 487-501 - Zuoxia Yu, Man Ho Au, Rupeng Yang, Junzuo Lai, Qiuliang Xu:
Lattice-Based Universal Accumulator with Nonmembership Arguments. 502-519 - Daode Zhang, Kai Zhang, Bao Li, Xianhui Lu, Haiyang Xue, Jie Li:
Lattice-Based Dual Receiver Encryption and More. 520-538 - Qiqi Lai, Bo Yang, Yong Yu, Yuan Chen, Liju Dong:
Anonymous Identity-Based Hash Proof System from Lattices in the Standard Model. 539-557 - Wilson Abel Alberto Torres, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Veronika Kuchta, Nandita Bhattacharjee, Man Ho Au, Jacob Cheng:
Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0). 558-576
Security Protocol
- Handan Kilinç, Serge Vaudenay:
Secure Contactless Payment. 579-597 - Ahmad Ahmadi, Reihaneh Safavi-Naini, Md. Mamunur Rashid Akand:
New Attacks and Secure Design for Anonymous Distance-Bounding. 598-616
System and Network Security
- Deqing Zou, Zhijun Deng, Zhen Li, Hai Jin:
Automatically Identifying Security Bug Reports via Multitype Features Analysis. 619-633 - Yali Zeng, Xu Li, Xu Yang, Qikui Xu, Dongcheng Wang:
A Practical Privacy Preserving Protocol in Database-Driven Cognitive Radio Networks. 634-648 - Jie Cui, Jiantao He, Yan Xu, Hong Zhong:
TDDAD: Time-Based Detection and Defense Scheme Against DDoS Attack on SDN Controller. 649-665
Blockchain and Cryptocurrency
- Kexin Hu, Zhenfeng Zhang:
Fast Lottery-Based Micropayments for Decentralized Currencies. 669-686 - Yuncong Zhang, Yu Long, Zhen Liu, Zhiqiang Liu, Dawu Gu:
Z-Channel: Scalable and Efficient Scheme in Zerocash. 687-705 - Jiayuan Yin, Changren Wang, Zongyang Zhang, Jianwei Liu:
Revisiting the Incentive Mechanism of Bitcoin-NG. 706-719 - Rupeng Yang, Man Ho Au, Qiuliang Xu, Zuoxia Yu:
Decentralized Blacklistable Anonymous Credentials with Reputation. 720-738
Short Papers
- Yinxia Sun, Futai Zhang, Anmin Fu:
Revocable Certificateless Encryption with Ciphertext Evolution. 741-749 - Terry Shue Chien Lau, Chik How Tan:
A New Encryption Scheme Based on Rank Metric Codes. 750-758 - Weizhi Meng, Yu Wang, Wenjuan Li, Zhe Liu, Jin Li, Christian W. Probst:
Enhancing Intelligent Alarm Reduction for Distributed Intrusion Detection Systems via Edge Computing. 759-767 - Mohamad Barbar, Yulei Sui, Hongyu Zhang, Shiping Chen, Jingling Xue:
Live Path CFI Against Control Flow Hijacking Attacks. 768-779 - Hyung Tae Lee, Huaxiong Wang, Kai Zhang:
Security Analysis and Modification of ID-Based Encryption with Equality Test from ACISP 2017. 780-786 - Yuntao Wang, Tsuyoshi Takagi:
Improving the BKZ Reduction Algorithm by Quick Reordering Technique. 787-795 - Yeali S. Sun, Chien-Chun Chen, Shun-Wen Hsiao, Meng Chang Chen:
ANTSdroid: Automatic Malware Family Behaviour Generation and Analysis for Android Apps. 796-804 - Junzuo Lai, Zhengan Huang, Man Ho Au, Xianping Mao:
Constant-Size CCA-Secure Multi-hop Unidirectional Proxy Re-encryption from Indistinguishability Obfuscation. 805-812 - Xingye Lu, Zhenfei Zhang, Man Ho Au:
Practical Signatures from the Partial Fourier Recovery Problem Revisited: A Provably-Secure and Gaussian-Distributed Construction. 813-820 - Pinaki Sarkar, Mayank Baranwal, Sukumar Nandi:
CRT-KPS: A Key Predistribution Schemes Using CRT. 821-830
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.