default search action
19. ACISP 2014: Wollongong, NSW, Australia
- Willy Susilo, Yi Mu:
Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings. Lecture Notes in Computer Science 8544, Springer 2014, ISBN 978-3-319-08343-8
Cryptanalysis
- Yanfeng Wang, Wenling Wu:
Improved Multidimensional Zero-Correlation Linear Cryptanalysis and Applications to LBlock and TWINE. 1-16 - Bungo Taga, Shiho Moriai, Kazumaro Aoki:
Differential and Impossible Differential Related-Key Attacks on Hierocrypt-L1. 17-33 - Subhadeep Banik:
Some Insights into Differential Cryptanalysis of Grain v1. 34-49 - Petr Susil, Pouyan Sepehrdad, Serge Vaudenay:
On Selection of Samples in Algebraic Attacks and a New Technique to Find Hidden Low Degree Equations. 50-65
Cryptographic Protocols
- Yuyu Wang, Keisuke Tanaka:
Strongly Simulation-Extractable Leakage-Resilient NIZK. 66-81 - Liang Liu, Xiaofeng Chen, Wenjing Lou:
A Secure Three-Party Computational Protocol for Triangle Area. 82-97 - Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:
Universally Composable Efficient Priced Oblivious Transfer from a Flexible Membership Encryption. 98-114 - Zheli Liu, Jin Li, Xiaofeng Chen, Jun Yang, Chunfu Jia:
TMDS: Thin-Model Data Sharing Scheme Supporting Keyword Search in Cloud Storage. 115-130
Cryptanalysis
- Xiao Zhong, Mingsheng Wang, Bin Zhang, Shengbao Wu:
Low Data Complexity Inversion Attacks on Stream Ciphers via Truncated Compressed Preimage Sets. 131-147 - Yanbin Pan, Yingpu Deng:
A New Attack against the Selvi-Vivek-Rangan Deterministic Identity Based Signature Scheme from ACISP 2012. 148-161 - Zhaojing Ding, Wei Guo, Liangjian Su, Jizeng Wei, Haihua Gu:
Further Research on N-1 Attack against Exponentiation Algorithms. 162-175 - Atsushi Takayasu, Noboru Kunihiro:
Cryptanalysis of RSA with Multiple Small Secret Exponents. 176-191
Fine-grain Cryptographic Protocols
- Mingwu Zhang:
New Model and Construction of ABE: Achieving Key Resilient-Leakage and Attribute Direct-Revocation. 192-208 - Y. Sreenivasa Rao, Ratna Dutta:
Expressive Bandwidth-Efficient Attribute Based Signature and Signcryption in Standard Model. 209-225 - Dan Yamamoto, Hisayoshi Sato, Yasuko Fukuzawa:
Incrementally Executable Signcryptions. 226-241 - Weiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin:
Hierarchical Identity-Based Broadcast Encryption. 242-257
Key Exchange
- Janaka Alawatugoda, Colin Boyd, Douglas Stebila:
Continuous After-the-Fact Leakage-Resilient Key Exchange. 258-273 - Yu Chen, Qiong Huang, Zongyang Zhang:
Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Scheme, Revisited. 274-289
Fundamentals
- Masayuki Fukumitsu, Shingo Hasegawa, Shuji Isobe, Hiroki Shizuya:
On the Impossibility of Proving Security of Strong-RSA Signatures via the RSA Assumption. 290-305 - Nilanjan Datta, Mridul Nandi:
ELmE: A Misuse Resistant Parallel Authenticated Encryption. 306-321
Lattices and Homomorphic Encryption
- Shi Bai, Steven D. Galbraith:
Lattice Decoding Attacks on Binary LWE. 322-337 - Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba:
Privacy-Preserving Wildcards Pattern Matching Using Symmetric Somewhat Homomorphic Encryption. 338-353
Applications
- Zhongwen Zhang, Yuewu Wang, Jiwu Jing, Qiongxiao Wang, Lingguang Lei:
Once Root Always a Threat: Analyzing the Security Threats of Android Permission System. 354-369 - Qinglong Zhang, Zongbin Liu, Miao Li, Ji Xiang, Jiwu Jing:
A High-Throughput Unrolled ZUC Core for 100Gbps Data Transmission. 370-385 - Mohammed Shafiul Alam Khan, Chris J. Mitchell:
Another Look at Privacy Threats in 3G Mobile Telephony. 386-396 - Weijin Wang, Dengguo Feng, Yu Qin, Jianxiong Shao, Li Xi, XiaoBo Chu:
ExBLACR: Extending BLACR System. 397-412
Short Papers
- Sultan Alneyadi, Elankayer Sithirasenan, Vallipuram Muthukkumarasamy:
A Semantics-Aware Classification Approach for Data Leakage Prevention. 413-421 - Philip S. Vejre, Andrey Bogdanov:
Route 66: Passively Breaking All GSM Channels. 422-429 - Yogachandran Rahulamathavan, Veelasha Moonsamy, Lynn Margaret Batten, Su Shunliang, Muttukrishnan Rajarajan:
An Analysis of Tracking Settings in Blackberry 10 and Windows Phone 8 Smartphones. 430-437 - Zhijiao Zhang, Lei Zhang, Yu Chen, Yuanchun Shi:
Running Multiple Androids on One ARM Platform. 438-445 - Xingmin Cui, Da Yu, Patrick P. F. Chan, Lucas Chi Kwong Hui, Siu-Ming Yiu, Sihan Qing:
CoChecker: Detecting Capability and Sensitive Data Leaks from Component Chains in Android. 446-453 - Long Wen, Meiqin Wang:
Integral Zero-Correlation Distinguisher for ARX Block Cipher, with Application to SHACAL-2. 454-461
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.