default search action
29th ACISP 2024: Sydney, NSW, Australia - Part II
- Tianqing Zhu, Yannan Li:
Information Security and Privacy - 29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15-17, 2024, Proceedings, Part II. Lecture Notes in Computer Science 14896, Springer 2024, ISBN 978-981-97-5027-6
Post-Quantum Cryptography
- Nam Tran, Khoa Nguyen, Dongxi Liu, Josef Pieprzyk, Willy Susilo:
Improved Multimodal Private Signatures from Lattices. 3-23 - Zhenzhen Bao, Jian Guo, Shun Li, Phuong Pham:
Automatic Quantum Multi-collision Distinguishers and Rebound Attacks with Triangulation Algorithm. 24-43 - Xiaokang Dai, Jingwei Chen, Wenyuan Wu, Yong Feng:
Lattice-Based, More General Anti-leakage Model and Its Application in Decentralization. 44-63 - Zixuan Wu, Rongmao Chen, Yi Wang, Qiong Wang, Wei Peng:
An Efficient Hardware Implementation of Crystal-Dilithium on FPGA. 64-83 - Vincent Hwang:
Pushing the Limit of Vectorized Polynomial Multiplications for NTRU Prime. 84-102 - Li-Jie Jian, Ting-Yuan Wang, Bo-Yin Yang, Ming-Shing Chen:
Jumping for Bernstein-Yang Inversion. 103-123 - Xinyu Zhang, Ron Steinfeld, Joseph K. Liu, Muhammed F. Esgin, Dongxi Liu, Sushmita Ruj:
DualRing-PRF: Post-quantum (Linkable) Ring Signatures from Legendre and Power Residue PRFs. 124-143 - Arnaud Sipasseuth:
Faster Verifications and Smaller Signatures: Trade-Offs for ALTEQ Using Rejections. 144-163 - Quan Yuan, Chao Sun, Tsuyoshi Takagi:
Revisiting the Security of Fiat-Shamir Signature Schemes Under Superposition Attacks. 164-184 - Mengce Zheng, Wei Yan:
Improved Lattice-Based Attack on Mersenne Low Hamming Ratio Search Problem. 185-202
Cryptanalysis
- Chen Wang, Jinliang Wang, Muzhou Li, Meiqin Wang:
New Strategy for Evaluating Differential Clustering Effect of uBlock. 205-224 - Tomer Ashur, Thomas Buschman, Mohammad Mahzoun:
Algebraic Cryptanalysis of the HADES Design Strategy: Application to Poseidon and Poseidon2. 225-244 - Weiwei Cao:
Revisiting Impossible Differential Cryptanalysis and Expanding the Application of MILP in Impossible Differential Attack. 245-265
Secure Protocols
- Tuong Ngoc Nguyen, Willy Susilo, Dung Hoang Duong, Fuchun Guo, Kazuhide Fukushima, Shinsaku Kiyomoto:
A Fault-Tolerant Content Moderation Mechanism for Secure Messaging Systems. 269-289 - Kakeru Watanabe, Kazuki Yoneyama:
Formal Verification of Challenge Flow in EMV 3-D Secure. 290-310 - Kazumasa Shinagawa:
Size-Hiding Computation in the Honest-But-Curious Model. 311-329 - Saskia Bayreuther, Robin Berger, Felix Dörre, Jeremias Mechler, Jörn Müller-Quade:
Hidden $\varDelta $-Fairness: A Novel Notion for Fair Secure Two-Party Computation. 330-349 - Yali Yuan, Yichao Wang, Guang Cheng:
ProfistMAC: A Protocol Finite State Machine Classifier via Graph Representation. 350-369 - Jialiu Cheng, Yi Wang, Rongmao Chen, Xinyi Huang:
Subverting Cryptographic Protocols from a Fine-Grained Perspective- A Case Study on 2-Party ECDSA. 370-390
Application Security
- Madeline Moran, Arrianna Szymczak, Anna Hart, Shelia Kennison, Eric Chan-Tin:
Deep Dive on Relationship Between Personality and Password Creation. 393-411 - Hangyu Zhao, Hua Wu, Xuqiong Bian, Songtao Liu, Guang Cheng, Xiaoyan Hu, Zhiyi Tian:
Unveiling the Unseen: Video Recognition Attacks on Social Software. 412-432 - Zhiwei Tang, Xuemeng Zhai, Gaolei Fei, Junyi Gao, Jianwei Ding, Keren Wang, Qiang Li, Guangmin Hu:
An Account Matching Method Based on Hyper Graph. 433-452
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.