default search action
29th ACISP 2024: Sydney, NSW, Australia - Part I
- Tianqing Zhu
, Yannan Li
:
Information Security and Privacy - 29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15-17, 2024, Proceedings, Part I. Lecture Notes in Computer Science 14895, Springer 2024, ISBN 978-981-97-5024-5
Symmetric-Key Cryptography
- Fangzhou Liu, Xueqi Zhu, Ruozhou Xu, Danping Shi, Peng Wang:
The Offline Quantum Attack Against Modular Addition Variant of Even-Mansour Cipher. 3-19 - Xiaomeng Sun, Wenying Zhang, René Rodríguez, Huimin Liu:
Known-Key Attack on GIFT-64 and GIFT-64[g0c] Based on Correlation Matrices. 20-40 - Fanyang Zeng, Tian Tian:
On the Security Bounds for Block Ciphers Without Whitening Key Addition Against Integral Distinguishers. 41-56 - Bishwajit Chakraborty, Chandranan Dhar, Mridul Nandi:
Tight Multi-user Security of Ascon and Its Large Key Extension. 57-76 - Rikuto Kurahara, Kosei Sakamoto, Yuto Nakano, Takanori Isobe:
Differential Distinguishing Attacks on SNOW-V, SNOW-Vi and KCipher-2. 77-97 - Xiaodan Li, Wenling Wu, Yuhan Zhang, Ee Duan:
Efficient Search for Optimal Permutations of Refined Type-II Generalized Feistel Structures. 98-117
Homomorphic Encryption
- Man Chen, Yuyue Chen, Rui Zong, ZengPeng Li, Zoe L. Jiang:
F-FHEW: High-Precision Approximate Homomorphic Encryption with Batch Bootstrapping. 121-140 - Robin Jadoul
, Axel Mertens
, Jeongeun Park
, Hilder V. L. Pereira
:
NTRU-Based FHE for Larger Key and Message Space. 141-160 - Yi Huang, Junping Wan, Zoe L. Jiang, Jun Zhou, Junbin Fang, Zhenfu Cao:
An Efficient Integer-Wise ReLU on TFHE. 161-179 - Luke Harmon
, Gaetan Delavignette
, Hanes Oliveira
:
đisplaystyle sfHERatio: Homomorphic Encryption of Rationals Using Laurent Polynomials. 180-195 - Ruida Wang
, Benqiang Wei
, Zhihao Li
, Xianhui Lu
, Kunpeng Wang
:
TFHE Bootstrapping: Faster, Smaller and Time-Space Trade-Offs. 196-216 - Tairong Huang, Shihe Ma
, Anyu Wang, Xiaoyun Wang:
Approximate Methods for the Computation of Step Functions in Homomorphic Encryption. 217-237
Encryption and Its Applications
- Luqi Huang, Willy Susilo
, Guomin Yang, Fuchun Guo:
Key Cooperative Attribute-Based Encryption. 241-260 - Keita Emura
:
On the Feasibility of Identity-Based Encryption with Equality Test Against Insider Attacks. 261-280 - Zhilong Luo, Shifeng Sun, Zhedong Wang, Dawu Gu:
Non-interactive Publicly Verifiable Searchable Encryption with Forward and Backward Privacy. 281-302 - Yuichi Tanishita, Ryuya Hayashi, Ryu Ishii, Takahiro Matsuda, Kanta Matsuura:
On the Implications from Updatable Encryption to Public-Key Cryptographic Primitives. 303-323 - Anit Kumar Ghosal
, Dipanwita Roychowdhury
:
Continuous Version of Non-malleable Codes from Authenticated Encryption. 324-344
Digital Signatures
- Jia-Chng Loh, Fuchun Guo, Willy Susilo
:
Pairing-Free ID-Based Signatures as Secure as Discrete Logarithm in AGM. 347-367 - Thanh Xuan Khuc
, Willy Susilo
, Dung Hoang Duong
, Fuchun Guo
, Kazuhide Fukushima
, Shinsaku Kiyomoto
:
Threshold Ring Signatures with Accountability. 368-388 - Meng Li, Hanni Ding, Qing Wang, Zijian Zhang, Mauro Conti
:
Threshold Signatures with Private Accountability via Secretly Designated Witnesses. 389-407
Cryptographic Primitives
- Xiuxiu Li, Wei Yu, Kunpeng Wang:
A Novel Window τNAF on Koblitz Curves. 411-428 - Chao Chen
, Fangguo Zhang:
Parallel Algorithms on Hyperelliptic Pairings Using Hyperelliptic Nets. 429-449 - Huina Li, Haochen Zhang, Kai Hu, Guozhen Liu, Weidong Qiu:
AlgSAT - A SAT Method for Verification of Differential Trails from an Algebraic Perspective. 450-471 - Jie Xie, Yuncong Hu, Yu Yu:
Hadamard Product Argument from Lagrange-Based Univariate Polynomials. 472-492
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.