default search action
14. ACISP 2009: Brisbane, Australia
- Colin Boyd, Juan Manuel González Nieto:
Information Security and Privacy, 14th Australasian Conference, ACISP 2009, Brisbane, Australia, July 1-3, 2009, Proceedings. Lecture Notes in Computer Science 5594, Springer 2009, ISBN 978-3-642-02619-5
Invited Lecture
- Basie von Solms:
Is the Information Security King Naked?. 1-7
Network Security
- Christian Seifert, Vipul Delwadia, Peter Komisarczuk, David Stirling, Ian Welch:
Measurement Study on Malicious Web Servers in the .nz Domain. 8-25 - Dang Vinh Pham, Dogan Kesdogan:
A Combinatorial Approach for an Anonymity Metric. 26-43 - Irfan Ahmed, Kyung-suk Lhee, Hyunjung Shin, Manpyo Hong:
On Improving the Accuracy and Performance of Content-Based File Type Identification. 44-59
Symmetric Key Encryption
- Ewan Fleischmann, Michael Gorski, Stefan Lucks:
Attacking 9 and 10 Rounds of AES-256. 60-72 - Jiali Choy, Guanhan Chew, Khoongming Khoo, Huihui Yap:
Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure. 73-89 - Onur Özen, Kerem Varici, Cihangir Tezcan, Çelebi Kocair:
Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT. 90-107 - Leonie Simpson, Matthew Henricksen, Wun-She Yap:
Improved Cryptanalysis of the Common Scrambling Algorithm Stream Cipher. 108-121 - Serdar Boztas, Simon J. Puglisi, Andrew Turpin:
Testing Stream Ciphers by Finding the Longest Substring of a Given Density. 122-133 - Atsuko Miyaji, Masahiro Sukegawa:
New Correlations of RC4 PRGA Using Nonzero-Bit Differences. 134-152
Hash Functions
- Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu:
Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders. 153-170 - Mridul Nandi:
Characterizing Padding Rules of MD Hash Functions Preserving Collision Security. 171-184 - Hongbo Yu, Xiaoyun Wang:
Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256. 185-201 - Jean-Philippe Aumasson, Eric Brier, Willi Meier, María Naya-Plasencia, Thomas Peyrin:
Inside the Hypercube. 202-213 - Yu Sasaki, Kazumaro Aoki:
Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others. 214-231 - Akira Numayama, Keisuke Tanaka:
On the Weak Ideal Compression Functions. 232-248
Invited Lecture
- L. Jean Camp:
Hardening the Network from the Friend Within. 249
Public Key Cryptography
- Peter Lory:
Reducing the Complexity in the Distributed Computation of Private RSA Keys. 250-263 - Ahto Buldas, Aivo Jürgenson, Margus Niitsoo:
Efficiency Bounds for Adversary Constructions in Black-Box Reductions. 264-275 - Kenneth G. Paterson, Sriramkrishnan Srinivasan:
Building Key-Private Public-Key Encryption Schemes. 276-292 - Harunaga Hiwatari, Keisuke Tanaka, Tomoyuki Asano, Koichi Sakumoto:
Multi-recipient Public-Key Encryption from Simulators in Security Proofs. 293-308 - Jeongdae Hong, Jinil Kim, Jihye Kim, Matthew K. Franklin, Kunsoo Park:
Fair Threshold Decryption with Semi-Trusted Third Parties. 309-326 - Cheng-Kang Chu, Jian Weng, Sherman S. M. Chow, Jianying Zhou, Robert H. Deng:
Conditional Proxy Broadcast Re-Encryption. 327-342 - Toshihide Matsuda, Ryo Nishimaki, Akira Numayama, Keisuke Tanaka:
Security on Hybrid Encryption with the Tag-KEM/DEM Framework. 343-359
Protocols
- Jiang Wu, Douglas R. Stinson:
A Highly Scalable RFID Authentication Protocol. 360-376 - Kai-Yuen Cheong, Takeshi Koshiba, Shohei Nishiyama:
Strengthening the Security of Distributed Oblivious Transfer. 377-388 - Douglas Stebila, Berkant Ustaoglu:
Towards Denial-of-Service-Resilient Key Agreement Protocols. 389-406 - Douglas Wikström:
A Commitment-Consistent Proof of a Shuffle. 407-421
Implementation
- Nadia El Mrabet, Christophe Nègre:
Finite Field Multiplication Combining AMNS and DFT Approach for Pairing Cryptography. 422-436 - Michael Tunstall:
Random Order m-ary Exponentiation. 437-451 - Hüseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson:
Jacobi Quartic Curves Revisited. 452-468
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.