9. ACISP 2004:
Sydney,
Australia
Huaxiong Wang, Josef Pieprzyk, Vijay Varadharajan (Eds.):
Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings.
Lecture Notes in Computer Science 3108 Springer 2004, ISBN 3-540-22379-7 BibTeX
@proceedings{DBLP:conf/acisp/2004,
editor = {Huaxiong Wang and
Josef Pieprzyk and
Vijay Varadharajan},
title = {Information Security and Privacy: 9th Australasian Conference,
ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings},
booktitle = {ACISP},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {3108},
year = {2004},
isbn = {3-540-22379-7},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
Broadcast Encryption and Traitor Tracing
Private Information Retrieval and Oblivious Transfer
Trust and Secret Sharing
Cryptanalysis (I)
- Jorge Nakahara Jr., Bart Preneel, Joos Vandewalle:
The Biryukov-Demirci Attack on Reduced-Round Versions of IDEA and MESH Ciphers.
98-109
Electronic Edition (link) BibTeX
- YongSup Shin, Jongsung Kim, Guil Kim, Seokhie Hong, Sangjin Lee:
Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2.
110-122
Electronic Edition (link) BibTeX
- Jongsung Kim, Guil Kim, Seokhie Hong, Sangjin Lee, Dowon Hong:
The Related-Key Rectangle Attack - Application to SHACAL-1.
123-136
Electronic Edition (link) BibTeX
- Youngdai Ko, Changhoon Lee, Seokhie Hong, Sangjin Lee:
Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1.
137-148
Electronic Edition (link) BibTeX
- Michael J. Jacobson Jr.:
The Security of Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders.
149-156
Electronic Edition (link) BibTeX
Cryptanalysis (II)
Digital Signatures (I)
Cryptosystems (I)
Fast Computation
Mobile Agents Security
Digital Signatures (II)
Protocols
Security Management
Access Control and Authorisation
Cryptanalysis (II)
Cryptanalysis (III)
Copyright © Sat May 16 22:55:48 2009
by Michael Ley (ley@uni-trier.de)