11. ACISP 2006:
Melbourne,
Australia
Lynn Margaret Batten, Reihaneh Safavi-Naini (Eds.):
Information Security and Privacy, 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings.
Lecture Notes in Computer Science 4058 Springer 2006, ISBN 3-540-35458-1 BibTeX
Stream Ciphers
Symmetric Key Ciphers
Network Security
Cryptographic Applications
Secure Implementation
Signatures
Theory
Invited Talk
Security Applications
Provable Security
- Eike Kiltz, David Galindo:
Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles.
336-347
Electronic Edition (link) BibTeX
- Takashi Kitagawa, Peng Yang, Goichiro Hanaoka, Rui Zhang, Hajime Watanabe, Kanta Matsuura, Hideki Imai:
Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT.
348-359
Electronic Edition (link) BibTeX
- Masayuki Abe, Yang Cui, Hideki Imai, Kaoru Kurosawa:
Tag-KEM from Set Partial Domain One-Way Permutations.
360-370
Electronic Edition (link) BibTeX
Protocols
Hashing and Message Authentication
Copyright © Sat May 16 22:55:48 2009
by Michael Ley (ley@uni-trier.de)