12. ACISP 2007:
Townsville, Australia
Josef Pieprzyk, Hossein Ghodosi, Ed Dawson (Eds.):
Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings.
Lecture Notes in Computer Science 4586 Springer 2007, ISBN 978-3-540-73457-4 BibTeX
Stream Ciphers
Hashing
- Jun Yajima, Yu Sasaki, Yusuke Naito, Terutoshi Iwasaki, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta:
A New Strategy for Finding a Differential Path of SHA-1.
45-58
Electronic Edition (link) BibTeX
- Donghoon Chang, Moti Yung, Jaechul Sung, Seokhie Hong, Sangjin Lee:
Preimage Attack on the Parallel FFT-Hashing Function.
59-67
Electronic Edition (link) BibTeX
- Norbert Pramstaller, Mario Lamberger, Vincent Rijmen:
Second Preimages for Iterated Hash Functions and Their Implications on MACs.
68-81
Electronic Edition (link) BibTeX
- Olivier Billet, Matthew J. B. Robshaw, Thomas Peyrin:
On Building Hash Functions from Multivariate Quadratic Equations.
82-95
Electronic Edition (link) BibTeX
Biometrics
Secret Sharing
Cryptanalysis
- Kitae Jeong, Changhoon Lee, Jaechul Sung, Seokhie Hong, Jongin Lim:
Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128.
143-157
Electronic Edition (link) BibTeX
- Fen Liu, Wen Ji, Lei Hu, Jintai Ding, Shuwang Lv, Andrei Pyshkin, Ralf-Philipp Weinmann:
Analysis of the SMS4 Block Cipher.
158-170
Electronic Edition (link) BibTeX
- Yongdong Wu, Feng Bao, Robert H. Deng:
Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme.
171-183
Electronic Edition (link) BibTeX
Public Key Cryptography
- Jean-Philippe Aumasson, Matthieu Finiasz, Willi Meier, Serge Vaudenay:
TCHo: A Hardware-Oriented Trapdoor Cipher.
184-199
Electronic Edition (link) BibTeX
- Ryotaro Hayashi, Keisuke Tanaka:
Anonymity on Paillier's Trap-Door Permutation.
200-214
Electronic Edition (link) BibTeX
- Qiong Huang, Duncan S. Wong:
Generic Certificateless Key Encapsulation Mechanism.
215-229
Electronic Edition (link) BibTeX
- Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume:
Double-Size Bipartite Modular Multiplication.
230-244
Electronic Edition (link) BibTeX
- Erik Dahmen, Katsuyuki Okeya, Daniel Schepers:
Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography.
245-258
Electronic Edition (link) BibTeX
- Takeru Ishihara, Hiroshi Aono, Sadayuki Hongo, Junji Shikata:
Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM.
259-273
Electronic Edition (link) BibTeX
- James Birkett, Alexander W. Dent, Gregory Neven, Jacob C. N. Schuldt:
Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards.
274-292
Electronic Edition (link) BibTeX
Authentication
- Christophe Tartary, Huaxiong Wang:
Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication.
293-307
Electronic Edition (link) BibTeX
- Xinyi Huang, Yi Mu, Willy Susilo, Duncan S. Wong, Wei Wu:
Certificateless Signature Revisited.
308-322
Electronic Edition (link) BibTeX
- Cheng-Kang Chu, Wen-Guey Tzeng:
Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures.
323-337
Electronic Edition (link) BibTeX
- Sylvain Pasini, Serge Vaudenay:
Hash-and-Sign with Weak Hashing Made Secure.
338-354
Electronic Edition (link) BibTeX
- Kan Yasuda:
"Sandwich" Is Indeed Secure: How to Authenticate a Message with Just One Hashing.
355-369
Electronic Edition (link) BibTeX
- Akihiro Yamamura, Takashi Kurokawa, Junji Nakazato:
Threshold Anonymous Group Identification and Zero-Knowledge Proof.
370-384
Electronic Edition (link) BibTeX
- Mohammad Reza Reyhanitabar, Shuhong Wang, Reihaneh Safavi-Naini:
Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions.
385-399
Electronic Edition (link) BibTeX
E-Commerce
Security
Copyright © Sat May 16 22:55:48 2009
by Michael Ley (ley@uni-trier.de)