Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Ryoma Ito 0001, Atsuko Miyaji |
New Iterated RC4 Key Correlations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 154-171, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Xavier Boyen, Thomas Haines |
Forward-Secure Linkable Ring Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 245-264, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Xuecheng Ma, Xin Wang, Dongdai Lin |
Anonymous Identity-Based Encryption with Identity Recovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 360-375, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Yali Zeng, Xu Li, Xu Yang 0002, Qikui Xu, Dongcheng Wang |
A Practical Privacy Preserving Protocol in Database-Driven Cognitive Radio Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 634-648, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Deqing Zou, Zhijun Deng, Zhen Li 0027, Hai Jin 0001 |
Automatically Identifying Security Bug Reports via Multitype Features Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 619-633, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Jintai Ding, Scott R. Fluhrer, Saraswathy RV |
Complete Attack on RLWE Key Exchange with Reused Keys, Without Signal Leakage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 467-486, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Hyung Tae Lee, Huaxiong Wang, Kai Zhang 0016 |
Security Analysis and Modification of ID-Based Encryption with Equality Test from ACISP 2017. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 780-786, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Yusuke Naito 0001 |
Keyed Sponge with Prefix-Free Padding: Independence Between Capacity and Online Queries Without the Suffix Key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 225-242, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Pinaki Sarkar, Mayank Baranwal, Sukumar Nandi |
CRT-KPS: A Key Predistribution Schemes Using CRT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 821-830, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Terry Shue Chien Lau, Chik How Tan |
A New Encryption Scheme Based on Rank Metric Codes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 750-758, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Yan Xu 0007, Ran Ding, Jie Cui 0004, Hong Zhong 0001 |
Intrusion-Resilient Public Auditing Protocol for Data Storage in Cloud Computing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 399-416, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Wilson Abel Alberto Torres, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Veronika Kuchta, Nandita Bhattacharjee, Man Ho Au, Jacob Cheng |
Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 558-576, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Daode Zhang, Kai Zhang 0016, Bao Li 0001, Xianhui Lu, Haiyang Xue, Jie Li |
Lattice-Based Dual Receiver Encryption and More. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 520-538, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Bernardo David, Rafael Dowsley, Mario Larangeira |
21 - Bringing Down the Complexity: Fast Composable Protocols for Card Games Without Secret State. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 45-63, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Jung Hee Cheon, Jinhyuck Jeong, Dongwoo Kim 0003, Jongchan Lee |
A Reusable Fuzzy Extractor with Practical Storage Size: Modifying Canetti et al.'s Construction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 28-44, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Chi Liu, Rongmao Chen, Yi Wang 0055, Yongjun Wang |
Asymmetric Subversion Attacks on Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 376-395, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Nicolas Marrière, Valérie Nachef, Emmanuel Volte |
Differential Attacks on Reduced Round LILLIPUT. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 188-206, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Jiayuan Yin, Changren Wang, Zongyang Zhang, Jianwei Liu 0001 |
Revisiting the Incentive Mechanism of Bitcoin-NG. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 706-719, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Xingye Lu, Zhenfei Zhang, Man Ho Au |
Practical Signatures from the Partial Fourier Recovery Problem Revisited: A Provably-Secure and Gaussian-Distributed Construction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 813-820, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Shimin Li, Bei Liang, Rui Xue 0001 |
Private Functional Signatures: Definition and Construction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings, pp. 284-303, 2018, Springer, 978-3-319-93637-6. The full citation details ...](Pics/full.jpeg) |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Benjamin Dowling, Douglas Stebila |
Modelling Ciphersuite and Version Negotiation in the TLS Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings, pp. 270-288, 2015, Springer, 978-3-319-19961-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yiteng Feng, Yi Mu 0001, Guomin Yang, Joseph K. Liu |
A New Public Remote Integrity Checking Scheme with User Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings, pp. 377-394, 2015, Springer, 978-3-319-19961-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Clémentine Gritti, Willy Susilo, Thomas Plantard |
Efficient Dynamic Provable Data Possession with Public Verifiability and Data Privacy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings, pp. 395-412, 2015, Springer, 978-3-319-19961-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Nilanjan Datta, Kan Yasuda |
Generalizing PMAC Under Weaker Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings, pp. 433-450, 2015, Springer, 978-3-319-19961-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Megha Agrawal, Donghoon Chang, Somitra Sanadhya |
sp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained Devices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings, pp. 451-468, 2015, Springer, 978-3-319-19961-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Khalid Alissa, Jason Reid, Ed Dawson, Farzad Salim |
BP-XACML an Authorisation Policy Language for Business Processes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings, pp. 307-325, 2015, Springer, 978-3-319-19961-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Tarun Kumar Bansal, Donghoon Chang, Somitra Kumar Sanadhya |
Sponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length Message. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings, pp. 93-106, 2015, Springer, 978-3-319-19961-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yusuke Sakai 0001, Keita Emura, Jacob C. N. Schuldt, Goichiro Hanaoka, Kazuo Ohta |
Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings, pp. 77-92, 2015, Springer, 978-3-319-19961-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Christophe Nègre, Guilherme Perin |
Trade-Off Approaches for Leak Resistant Modular Arithmetic in RNS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings, pp. 107-124, 2015, Springer, 978-3-319-19961-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Daniel J. Bernstein, Andreas Hülsing, Tanja Lange 0001, Ruben Niederhagen |
Bad Directions in Cryptographic Hash Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings, pp. 488-508, 2015, Springer, 978-3-319-19961-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Kaoru Kurosawa, Le Trieu Phong |
IBE Under k k -LIN with Shorter Ciphertexts and Private Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings, pp. 145-159, 2015, Springer, 978-3-319-19961-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ryoma Ito 0001, Atsuko Miyaji |
How TKIP Induces Biases of Internal States of Generic RC4. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings, pp. 329-342, 2015, Springer, 978-3-319-19961-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Shamit Ghosh, Dhiman Saha, Abhrajit Sengupta, Dipanwita Roy Chowdhury |
Preventing Fault Attacks Using Fault Randomization with a Case Study on AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings, pp. 343-355, 2015, Springer, 978-3-319-19961-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Felix Günther 0001, Bertram Poettering |
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings, pp. 195-212, 2015, Springer, 978-3-319-19961-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yuyu Wang 0001, Keisuke Tanaka |
Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Continuous Leakage Resiliency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings, pp. 213-229, 2015, Springer, 978-3-319-19961-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Qiang Tang 0001 |
Towards Forward Security Properties for PEKS and IBE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings, pp. 127-144, 2015, Springer, 978-3-319-19961-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ernest Foo, Douglas Stebila (eds.) |
Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![Springer, 978-3-319-19961-0 The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Rongmao Chen, Yi Mu 0001, Guomin Yang, Fuchun Guo, Xiaofen Wang |
A New General Framework for Secure Public Key Encryption with Keyword Search. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings, pp. 59-76, 2015, Springer, 978-3-319-19961-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Gildas Avoine, Adrien Bourgeois, Xavier Carpent |
Analysis of Rainbow Tables with Fingerprints. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings, pp. 356-374, 2015, Springer, 978-3-319-19961-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jianchang Lai, Yi Mu 0001, Fuchun Guo, Willy Susilo |
Improved Identity-Based Online/Offline Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings, pp. 160-173, 2015, Springer, 978-3-319-19961-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Tingting Zhang, Hongda Li 0001, Guifang Huang |
Constant-Round Leakage-Resilient Zero-Knowledge Argument for NP from the Knowledge-of-Exponent Assumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings, pp. 251-269, 2015, Springer, 978-3-319-19961-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yuu Ishida, Yohei Watanabe 0001, Junji Shikata |
Constructions of CCA-Secure Revocable Identity-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings, pp. 174-191, 2015, Springer, 978-3-319-19961-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Bingke Ma, Bao Li 0001, Ronglin Hao, Xiaoqian Li |
Cryptanalysis of Reduced-Round Whirlwind. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings, pp. 20-38, 2015, Springer, 978-3-319-19961-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Priyanka Bose, Dipanjan Das 0002, Chandrasekaran Pandu Rangan |
Constant Size Ring Signature Without Random Oracle. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings, pp. 230-247, 2015, Springer, 978-3-319-19961-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Biaoshuai Tao, Hongjun Wu 0001 |
Improving the Biclique Cryptanalysis of AES. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings, pp. 39-56, 2015, Springer, 978-3-319-19961-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Leliel Trethowen, Craig Anslow, Stuart Marshall, Ian Welch |
VisRAID: Visualizing Remote Access for Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings, pp. 289-306, 2015, Springer, 978-3-319-19961-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Zhelei Sun, Peng Wang 0009, Liting Zhang |
Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings, pp. 3-19, 2015, Springer, 978-3-319-19961-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba |
Secure Statistical Analysis Using RLWE-Based Homomorphic Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings, pp. 471-487, 2015, Springer, 978-3-319-19961-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Rolf Egert, Marc Fischlin, David Gens, Sven Jacob, Matthias Senker, Jörn Tillmanns |
Privately Computing Set-Union and Set-Intersection Cardinality via Bloom Filters. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings, pp. 413-430, 2015, Springer, 978-3-319-19961-0. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yu Chen 0003, Qiong Huang 0001, Zongyang Zhang |
Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Scheme, Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings, pp. 274-289, 2014, Springer, 978-3-319-08343-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Nilanjan Datta, Mridul Nandi |
ELmE: A Misuse Resistant Parallel Authenticated Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings, pp. 306-321, 2014, Springer, 978-3-319-08343-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mohammed Shafiul Alam Khan, Chris J. Mitchell |
Another Look at Privacy Threats in 3G Mobile Telephony. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings, pp. 386-396, 2014, Springer, 978-3-319-08343-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Xiao Zhong, Mingsheng Wang, Bin Zhang, Shengbao Wu |
Low Data Complexity Inversion Attacks on Stream Ciphers via Truncated Compressed Preimage Sets. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings, pp. 131-147, 2014, Springer, 978-3-319-08343-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Weijin Wang, Dengguo Feng, Yu Qin, Jianxiong Shao, Li Xi, XiaoBo Chu |
ExBLACR: Extending BLACR System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings, pp. 397-412, 2014, Springer, 978-3-319-08343-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mingwu Zhang |
New Model and Construction of ABE: Achieving Key Resilient-Leakage and Attribute Direct-Revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings, pp. 192-208, 2014, Springer, 978-3-319-08343-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Liang Liu, Xiaofeng Chen 0001, Wenjing Lou |
A Secure Three-Party Computational Protocol for Triangle Area. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings, pp. 82-97, 2014, Springer, 978-3-319-08343-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Shi Bai 0001, Steven D. Galbraith |
Lattice Decoding Attacks on Binary LWE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings, pp. 322-337, 2014, Springer, 978-3-319-08343-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Dan Yamamoto, Hisayoshi Sato, Yasuko Fukuzawa |
Incrementally Executable Signcryptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings, pp. 226-241, 2014, Springer, 978-3-319-08343-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Zhongwen Zhang, Yuewu Wang, Jiwu Jing, Qiongxiao Wang, Lingguang Lei |
Once Root Always a Threat: Analyzing the Security Threats of Android Permission System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings, pp. 354-369, 2014, Springer, 978-3-319-08343-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Petr Susil, Pouyan Sepehrdad, Serge Vaudenay |
On Selection of Samples in Algebraic Attacks and a New Technique to Find Hidden Low Degree Equations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings, pp. 50-65, 2014, Springer, 978-3-319-08343-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Zheli Liu, Jin Li 0002, Xiaofeng Chen 0001, Jun Yang 0032, Chunfu Jia |
TMDS: Thin-Model Data Sharing Scheme Supporting Keyword Search in Cloud Storage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings, pp. 115-130, 2014, Springer, 978-3-319-08343-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Subhadeep Banik |
Some Insights into Differential Cryptanalysis of Grain v1. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings, pp. 34-49, 2014, Springer, 978-3-319-08343-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yanfeng Wang, Wenling Wu |
Improved Multidimensional Zero-Correlation Linear Cryptanalysis and Applications to LBlock and TWINE. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings, pp. 1-16, 2014, Springer, 978-3-319-08343-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba |
Privacy-Preserving Wildcards Pattern Matching Using Symmetric Somewhat Homomorphic Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings, pp. 338-353, 2014, Springer, 978-3-319-08343-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Willy Susilo, Yi Mu 0001 (eds.) |
Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![Springer, 978-3-319-08343-8 The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Xingmin Cui, Da Yu, Patrick P. F. Chan, Lucas Chi Kwong Hui, Siu-Ming Yiu, Sihan Qing |
CoChecker: Detecting Capability and Sensitive Data Leaks from Component Chains in Android. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings, pp. 446-453, 2014, Springer, 978-3-319-08343-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Masayuki Fukumitsu, Shingo Hasegawa, Shuji Isobe, Hiroki Shizuya |
On the Impossibility of Proving Security of Strong-RSA Signatures via the RSA Assumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings, pp. 290-305, 2014, Springer, 978-3-319-08343-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Sultan Alneyadi, Elankayer Sithirasenan, Vallipuram Muthukkumarasamy |
A Semantics-Aware Classification Approach for Data Leakage Prevention. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings, pp. 413-421, 2014, Springer, 978-3-319-08343-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Philip S. Vejre, Andrey Bogdanov |
Route 66: Passively Breaking All GSM Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings, pp. 422-429, 2014, Springer, 978-3-319-08343-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Zhaojing Ding, Wei Guo 0005, Liangjian Su, Jizeng Wei, Haihua Gu |
Further Research on N-1 Attack against Exponentiation Algorithms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings, pp. 162-175, 2014, Springer, 978-3-319-08343-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yuyu Wang 0001, Keisuke Tanaka |
Strongly Simulation-Extractable Leakage-Resilient NIZK. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings, pp. 66-81, 2014, Springer, 978-3-319-08343-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yanbin Pan, Yingpu Deng |
A New Attack against the Selvi-Vivek-Rangan Deterministic Identity Based Signature Scheme from ACISP 2012. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings, pp. 148-161, 2014, Springer, 978-3-319-08343-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Long Wen, Meiqin Wang |
Integral Zero-Correlation Distinguisher for ARX Block Cipher, with Application to SHACAL-2. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings, pp. 454-461, 2014, Springer, 978-3-319-08343-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay |
Universally Composable Efficient Priced Oblivious Transfer from a Flexible Membership Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings, pp. 98-114, 2014, Springer, 978-3-319-08343-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Janaka Alawatugoda 0001, Colin Boyd, Douglas Stebila |
Continuous After-the-Fact Leakage-Resilient Key Exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings, pp. 258-273, 2014, Springer, 978-3-319-08343-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Zhijiao Zhang, Lei Zhang, Yu Chen 0004, Yuanchun Shi |
Running Multiple Androids on One ARM Platform. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings, pp. 438-445, 2014, Springer, 978-3-319-08343-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Qinglong Zhang, Zongbin Liu, Miao Li, Ji Xiang, Jiwu Jing |
A High-Throughput Unrolled ZUC Core for 100Gbps Data Transmission. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings, pp. 370-385, 2014, Springer, 978-3-319-08343-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Atsushi Takayasu, Noboru Kunihiro |
Cryptanalysis of RSA with Multiple Small Secret Exponents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings, pp. 176-191, 2014, Springer, 978-3-319-08343-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Y. Sreenivasa Rao, Ratna Dutta |
Expressive Bandwidth-Efficient Attribute Based Signature and Signcryption in Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings, pp. 209-225, 2014, Springer, 978-3-319-08343-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yogachandran Rahulamathavan, Veelasha Moonsamy, Lynn Margaret Batten, Su Shunliang, Muttukrishnan Rajarajan |
An Analysis of Tracking Settings in Blackberry 10 and Windows Phone 8 Smartphones. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings, pp. 430-437, 2014, Springer, 978-3-319-08343-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Weiran Liu, Jianwei Liu 0001, Qianhong Wu, Bo Qin |
Hierarchical Identity-Based Broadcast Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings, pp. 242-257, 2014, Springer, 978-3-319-08343-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Bungo Taga, Shiho Moriai, Kazumaro Aoki |
Differential and Impossible Differential Related-Key Attacks on Hierocrypt-L1. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings, pp. 17-33, 2014, Springer, 978-3-319-08343-8. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Essam Ghadafi |
Formalizing Group Blind Signatures and Practical Constructions without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings, pp. 330-346, 2013, Springer, 978-3-642-39058-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ahto Buldas, Margus Niitsoo |
Black-Box Separations and Their Adaptability to the Non-uniform Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings, pp. 152-167, 2013, Springer, 978-3-642-39058-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Zhenqing Shi, Bin Zhang 0003, Dengguo Feng |
Cryptanalysis of Helix and Phelix Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings, pp. 27-40, 2013, Springer, 978-3-642-39058-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Leah F. South, Douglas Stebila |
Count-Min Sketches for Estimating Password Frequency within Hamming Distance Two. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings, pp. 388-402, 2013, Springer, 978-3-642-39058-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Byoung-Il Kim, Jin Hong 0001 |
Analysis of the Non-perfect Table Fuzzy Rainbow Tradeoff. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings, pp. 347-362, 2013, Springer, 978-3-642-39058-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yoshinori Aono |
Minkowski Sum Based Lattice Construction for Multivariate Simultaneous Coppersmith's Technique and Applications to RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings, pp. 88-103, 2013, Springer, 978-3-642-39058-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Baodong Qin, Shengli Liu 0001, Zhengan Huang |
Key-Dependent Message Chosen-Ciphertext Security of the Cramer-Shoup Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings, pp. 136-151, 2013, Springer, 978-3-642-39058-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ahto Buldas, Risto Laanoja |
Security Proofs for Hash Tree Time-Stamping Using Hash Functions with Small Output Size. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings, pp. 235-250, 2013, Springer, 978-3-642-39058-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Fuchun Guo, Yi Mu 0001, Willy Susilo, Vijay Varadharajan |
Membership Encryption and Its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings, pp. 219-234, 2013, Springer, 978-3-642-39058-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yosuke Todo |
Upper Bounds for the Security of Several Feistel Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings, pp. 302-317, 2013, Springer, 978-3-642-39058-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Kristian Gjøsteen, George Petrides, Asgeir Steine |
Towards Privacy Preserving Mobile Internet Communications - How Close Can We Get? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings, pp. 379-387, 2013, Springer, 978-3-642-39058-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Seyit Ahmet Çamtepe |
Complexity of Increasing the Secure Connectivity in Wireless Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings, pp. 363-378, 2013, Springer, 978-3-642-39058-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Xavier Boyen |
Expressive Cryptography: Lattice Perspectives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings, pp. 267, 2013, Springer, 978-3-642-39058-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Colin Boyd, Leonie Simpson (eds.) |
Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![Springer, 978-3-642-39058-6 The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Willy Susilo, Man Ho Au, Yang Wang 0074, Duncan S. Wong |
Fairness in Concurrent Signatures Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings, pp. 318-329, 2013, Springer, 978-3-642-39058-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Takanori Isobe 0001, Yu Sasaki, Jiageng Chen |
Related-Key Boomerang Attacks on KATAN32/48/64. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings, pp. 268-285, 2013, Springer, 978-3-642-39058-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Pierre-Alain Fouque, Antoine Joux, Mehdi Tibouchi |
Injective Encodings to Elliptic Curves. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings, pp. 203-218, 2013, Springer, 978-3-642-39058-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yang Wang 0074, Mark Manulis, Man Ho Au, Willy Susilo |
Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt". ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings, pp. 187-202, 2013, Springer, 978-3-642-39058-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|