default search action
24th ACISP 2019: Christchurch, New Zealand
- Julian Jang-Jaccard, Fuchun Guo:
Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3-5, 2019, Proceedings. Lecture Notes in Computer Science 11547, Springer 2019, ISBN 978-3-030-21547-7
Encryption
- Jongkil Kim, Willy Susilo, Joonsang Baek, Surya Nepal, Dongxi Liu:
Ciphertext-Delegatable CP-ABE for a Dynamic Credential: A Modular Approach. 3-20 - Tran Viet Xuan Phuong, Willy Susilo, Guomin Yang, Jun Yan, Dongxi Liu:
Location Based Encryption. 21-38 - Yunhao Ling, Sha Ma, Qiong Huang, Ru Xiang, Ximing Li:
Group ID-Based Encryption with Equality Test. 39-57 - Alex Davidson, Amit Deo, Ela Lee, Keith Martin:
Strong Post-Compromise Secure Proxy Re-Encryption. 58-77 - Tapas Pal, Ratna Dutta:
Offline Witness Encryption from Witness PRF and Randomized Encoding in CRS Model. 78-96 - Tim van de Kamp, David Stritzl, Willem Jonker, Andreas Peter:
Two-Client and Multi-client Functional Encryption for Set Intersection. 97-115
Post-quantum Security
- Arnaud Sipasseuth, Thomas Plantard, Willy Susilo:
Improving the Security of the DRS Scheme with Uniformly Chosen Random Noise. 119-137 - Dung Hoang Duong, Kazuhide Fukushima, Shinsaku Kiyomoto, Partha Sarathi Roy, Willy Susilo:
A Lattice-Based Public Key Encryption with Equality Test in Standard Model. 138-155 - Wilson Abel Alberto Torres, Veronika Kuchta, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Jacob Cheng:
Lattice RingCT V2.0 with Multiple Input and Multiple Output Wallets. 156-175 - Li-Ping Wang, Jingwei Hu:
Two New Module-Code-Based KEMs with Rank Metric. 176-191 - Michael Kraitsberg, Yehuda Lindell, Valery Osheter, Nigel P. Smart, Younes Talibi Alaoui:
Adding Distributed Decryption and Key Generation to a Ring-LWE Based CCA Encryption Scheme. 192-210 - Terry Shue Chien Lau, Chik How Tan:
Cryptanalysis on CCA2-Secured LRPC-Kronecker Cryptosystem. 211-228 - Nan Cui, Shengli Liu, Yunhua Wen, Dawu Gu:
Pseudorandom Functions from LWE: RKA Security and Application. 229-250 - Sean Murphy, Rachel Player:
\delta -subgaussian Random Variables in Cryptography. 251-268
Cryptocurrency Related
- Shuyang Tang, Sherman S. M. Chow, Zhiqiang Liu, Joseph K. Liu:
Fast-to-Finalize Nakamoto-Like Consensus. 271-288 - Lin Zhong, Huili Wang, Jan Xie, Bo Qin, Joseph K. Liu, Qianhong Wu:
A Flexible Instant Payment System Based on Blockchain. 289-306 - Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu:
Risk of Asynchronous Protocol Update: Attacks to Monero Protocols. 307-321 - Ziyu Wang, Jianwei Liu, Zongyang Zhang, Yanting Zhang, Jiayuan Yin, Hui Yu, Wenmao Liu:
A Combined Micro-block Chain Truncation Attack on Bitcoin-NG. 322-339
Foundations
- Ryo Kikuchi, Nuttapong Attrapadung, Koki Hamada, Dai Ikarashi, Ai Ishida, Takahiro Matsuda, Yusuke Sakai, Jacob C. N. Schuldt:
Field Extension in Secret-Shared Form and Its Applications to Efficient Secure Computation. 343-361 - Atsunori Ichikawa, Wakaha Ogata, Koki Hamada, Ryo Kikuchi:
Efficient Secure Multi-Party Protocols for Decision Tree Classification. 362-380 - Willy Susilo, Joseph Tonien, Guomin Yang:
The Wiener Attack on RSA Revisited: A Quest for the Exact Bound. 381-398 - Lucas Schabhüser, Denis Butin, Johannes Buchmann:
Function-Dependent Commitments from Homomorphic Authenticators. 399-418 - Geng Li, Jianwei Liu, Zongyang Zhang:
Security Against Subversion in a Multi-surveillant Setting. 419-437
System and Network Security
- Wei Zong, Yang-Wai Chow, Willy Susilo:
Dimensionality Reduction and Visualization of Network Intrusion Detection Data. 441-455 - Timothy Curry, Devon Callahan, Benjamin Fuller, Laurent Michel:
DOCSDN: Dynamic and Optimal Configuration of Software-Defined Networks. 456-474 - Liang Zheng, Donglei Han, Zongbin Liu, Cunqing Ma, Lingchen Zhang, Churan Tang:
A Low Overhead Error Correction Algorithm Using Random Permutation for SRAM PUFs. 475-493 - Mohammadreza Ashouri:
Practical Dynamic Taint Tracking for Exploiting Input Sanitization Error in Java Applications. 494-513 - Jaryn Shen, Timothy T. Yuen, Kim-Kwang Raymond Choo, Qingkai Zeng:
AMOGAP: Defending Against Man-in-the-Middle and Offline Guessing Attacks on Passwords. 514-532 - Xiaojian Pang, Li Yang, Maozhen Liu, Jianfeng Ma:
MineAuth: Mining Behavioural Habits for Continuous Authentication on a Smartphone. 533-551
Symmetric Cryptography
- Yunwen Liu, Yu Sasaki:
Related-Key Boomerang Attacks on GIFT with Automated Trail Search Including BCT Effect. 555-572 - Chunbo Zhu, Gaoli Wang, Boyu Zhu:
Fast Chosen-Key Distinguish Attacks on Round-Reduced AES-192. 573-587 - Yusuke Naito:
A Highly Secure MAC from Tweakable Blockciphers with Support for Short Tweaks. 588-606
Short Papers
- Dongxue Pan, Bei Liang, Hongda Li, Peifang Ni:
Witness Encryption with (Weak) Unique Decryption and Message Indistinguishability: Constructions and Applications. 609-619 - Weixuan Li, Wei Yu, Bao Li, Xuejun Fan:
Speeding up Scalar Multiplication on Koblitz Curves Using \mu _4 Coordinates. 620-629 - Xuejun Fan, Song Tian, Bao Li, Weixuan Li:
Constructing Hyperelliptic Covers for Elliptic Curves over Quadratic Extension Fields. 630-638 - Yaoan Jin, Atsuko Miyaji:
Secure and Compact Elliptic Curve Cryptosystems. 639-650 - Debanjan Sadhya, Bodhi Chakraborty:
A Quantitative Study of Attribute Based Correlation in Micro-databases and Its Effects on Privacy. 651-659 - Yi-Ting Huang, Yu-Yuan Chen, Chih-Chun Yang, Yeali S. Sun, Shun-Wen Hsiao, Meng Chang Chen:
Tagging Malware Intentions by Using Attention-Based Sequence-to-Sequence Neural Network. 660-668 - Dunming Li, Jenwen Mao, Fuke Shen:
A Novel Semi-supervised Adaboost Technique Based on Improved Tri-training. 669-678 - Woojoong Ji, Taeyun Kim, Kuyju Kim, Hyoungshick Kim:
Automated Cash Mining Attacks on Mobile Advertising Networks. 679-686
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.