Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Ryoma Ito 0001, Atsuko Miyaji |
New Iterated RC4 Key Correlations. |
ACISP |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Xavier Boyen, Thomas Haines |
Forward-Secure Linkable Ring Signatures. |
ACISP |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Xuecheng Ma, Xin Wang, Dongdai Lin |
Anonymous Identity-Based Encryption with Identity Recovery. |
ACISP |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Yali Zeng, Xu Li, Xu Yang 0002, Qikui Xu, Dongcheng Wang |
A Practical Privacy Preserving Protocol in Database-Driven Cognitive Radio Networks. |
ACISP |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Deqing Zou, Zhijun Deng, Zhen Li 0027, Hai Jin 0001 |
Automatically Identifying Security Bug Reports via Multitype Features Analysis. |
ACISP |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Jintai Ding, Scott R. Fluhrer, Saraswathy RV |
Complete Attack on RLWE Key Exchange with Reused Keys, Without Signal Leakage. |
ACISP |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Hyung Tae Lee, Huaxiong Wang, Kai Zhang 0016 |
Security Analysis and Modification of ID-Based Encryption with Equality Test from ACISP 2017. |
ACISP |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Yusuke Naito 0001 |
Keyed Sponge with Prefix-Free Padding: Independence Between Capacity and Online Queries Without the Suffix Key. |
ACISP |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Pinaki Sarkar, Mayank Baranwal, Sukumar Nandi |
CRT-KPS: A Key Predistribution Schemes Using CRT. |
ACISP |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Terry Shue Chien Lau, Chik How Tan |
A New Encryption Scheme Based on Rank Metric Codes. |
ACISP |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Yan Xu 0007, Ran Ding, Jie Cui 0004, Hong Zhong 0001 |
Intrusion-Resilient Public Auditing Protocol for Data Storage in Cloud Computing. |
ACISP |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Wilson Abel Alberto Torres, Ron Steinfeld, Amin Sakzad, Joseph K. Liu, Veronika Kuchta, Nandita Bhattacharjee, Man Ho Au, Jacob Cheng |
Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0). |
ACISP |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Daode Zhang, Kai Zhang 0016, Bao Li 0001, Xianhui Lu, Haiyang Xue, Jie Li |
Lattice-Based Dual Receiver Encryption and More. |
ACISP |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Bernardo David, Rafael Dowsley, Mario Larangeira |
21 - Bringing Down the Complexity: Fast Composable Protocols for Card Games Without Secret State. |
ACISP |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Jung Hee Cheon, Jinhyuck Jeong, Dongwoo Kim 0003, Jongchan Lee |
A Reusable Fuzzy Extractor with Practical Storage Size: Modifying Canetti et al.'s Construction. |
ACISP |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Chi Liu, Rongmao Chen, Yi Wang 0055, Yongjun Wang |
Asymmetric Subversion Attacks on Signature Schemes. |
ACISP |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Nicolas Marrière, Valérie Nachef, Emmanuel Volte |
Differential Attacks on Reduced Round LILLIPUT. |
ACISP |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Jiayuan Yin, Changren Wang, Zongyang Zhang, Jianwei Liu 0001 |
Revisiting the Incentive Mechanism of Bitcoin-NG. |
ACISP |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Xingye Lu, Zhenfei Zhang, Man Ho Au |
Practical Signatures from the Partial Fourier Recovery Problem Revisited: A Provably-Secure and Gaussian-Distributed Construction. |
ACISP |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Shimin Li, Bei Liang, Rui Xue 0001 |
Private Functional Signatures: Definition and Construction. |
ACISP |
2018 |
DBLP DOI BibTeX RDF |
|
1 | Benjamin Dowling, Douglas Stebila |
Modelling Ciphersuite and Version Negotiation in the TLS Protocol. |
ACISP |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yiteng Feng, Yi Mu 0001, Guomin Yang, Joseph K. Liu |
A New Public Remote Integrity Checking Scheme with User Privacy. |
ACISP |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Clémentine Gritti, Willy Susilo, Thomas Plantard |
Efficient Dynamic Provable Data Possession with Public Verifiability and Data Privacy. |
ACISP |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Nilanjan Datta, Kan Yasuda |
Generalizing PMAC Under Weaker Assumptions. |
ACISP |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Megha Agrawal, Donghoon Chang, Somitra Sanadhya |
sp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained Devices. |
ACISP |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Khalid Alissa, Jason Reid, Ed Dawson, Farzad Salim |
BP-XACML an Authorisation Policy Language for Business Processes. |
ACISP |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Tarun Kumar Bansal, Donghoon Chang, Somitra Kumar Sanadhya |
Sponge Based CCA2 Secure Asymmetric Encryption for Arbitrary Length Message. |
ACISP |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yusuke Sakai 0001, Keita Emura, Jacob C. N. Schuldt, Goichiro Hanaoka, Kazuo Ohta |
Dynamic Threshold Public-Key Encryption with Decryption Consistency from Static Assumptions. |
ACISP |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Christophe Nègre, Guilherme Perin |
Trade-Off Approaches for Leak Resistant Modular Arithmetic in RNS. |
ACISP |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Daniel J. Bernstein, Andreas Hülsing, Tanja Lange 0001, Ruben Niederhagen |
Bad Directions in Cryptographic Hash Functions. |
ACISP |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Kaoru Kurosawa, Le Trieu Phong |
IBE Under k k -LIN with Shorter Ciphertexts and Private Keys. |
ACISP |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ryoma Ito 0001, Atsuko Miyaji |
How TKIP Induces Biases of Internal States of Generic RC4. |
ACISP |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Shamit Ghosh, Dhiman Saha, Abhrajit Sengupta, Dipanwita Roy Chowdhury |
Preventing Fault Attacks Using Fault Randomization with a Case Study on AES. |
ACISP |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Felix Günther 0001, Bertram Poettering |
Linkable Message Tagging: Solving the Key Distribution Problem of Signature Schemes. |
ACISP |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yuyu Wang 0001, Keisuke Tanaka |
Generic Transformation to Strongly Existentially Unforgeable Signature Schemes with Continuous Leakage Resiliency. |
ACISP |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Qiang Tang 0001 |
Towards Forward Security Properties for PEKS and IBE. |
ACISP |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Ernest Foo, Douglas Stebila (eds.) |
Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings |
ACISP |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Rongmao Chen, Yi Mu 0001, Guomin Yang, Fuchun Guo, Xiaofen Wang |
A New General Framework for Secure Public Key Encryption with Keyword Search. |
ACISP |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Gildas Avoine, Adrien Bourgeois, Xavier Carpent |
Analysis of Rainbow Tables with Fingerprints. |
ACISP |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jianchang Lai, Yi Mu 0001, Fuchun Guo, Willy Susilo |
Improved Identity-Based Online/Offline Encryption. |
ACISP |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Tingting Zhang, Hongda Li 0001, Guifang Huang |
Constant-Round Leakage-Resilient Zero-Knowledge Argument for NP from the Knowledge-of-Exponent Assumption. |
ACISP |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yuu Ishida, Yohei Watanabe 0001, Junji Shikata |
Constructions of CCA-Secure Revocable Identity-Based Encryption. |
ACISP |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Bingke Ma, Bao Li 0001, Ronglin Hao, Xiaoqian Li |
Cryptanalysis of Reduced-Round Whirlwind. |
ACISP |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Priyanka Bose, Dipanjan Das 0002, Chandrasekaran Pandu Rangan |
Constant Size Ring Signature Without Random Oracle. |
ACISP |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Biaoshuai Tao, Hongjun Wu 0001 |
Improving the Biclique Cryptanalysis of AES. |
ACISP |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Leliel Trethowen, Craig Anslow, Stuart Marshall, Ian Welch |
VisRAID: Visualizing Remote Access for Intrusion Detection. |
ACISP |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Zhelei Sun, Peng Wang 0009, Liting Zhang |
Weak-Key and Related-Key Analysis of Hash-Counter-Hash Tweakable Enciphering Schemes. |
ACISP |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba |
Secure Statistical Analysis Using RLWE-Based Homomorphic Encryption. |
ACISP |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Rolf Egert, Marc Fischlin, David Gens, Sven Jacob, Matthias Senker, Jörn Tillmanns |
Privately Computing Set-Union and Set-Intersection Cardinality via Bloom Filters. |
ACISP |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Yu Chen 0003, Qiong Huang 0001, Zongyang Zhang |
Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Scheme, Revisited. |
ACISP |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Nilanjan Datta, Mridul Nandi |
ELmE: A Misuse Resistant Parallel Authenticated Encryption. |
ACISP |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mohammed Shafiul Alam Khan, Chris J. Mitchell |
Another Look at Privacy Threats in 3G Mobile Telephony. |
ACISP |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Xiao Zhong, Mingsheng Wang, Bin Zhang, Shengbao Wu |
Low Data Complexity Inversion Attacks on Stream Ciphers via Truncated Compressed Preimage Sets. |
ACISP |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Weijin Wang, Dengguo Feng, Yu Qin, Jianxiong Shao, Li Xi, XiaoBo Chu |
ExBLACR: Extending BLACR System. |
ACISP |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mingwu Zhang |
New Model and Construction of ABE: Achieving Key Resilient-Leakage and Attribute Direct-Revocation. |
ACISP |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Liang Liu, Xiaofeng Chen 0001, Wenjing Lou |
A Secure Three-Party Computational Protocol for Triangle Area. |
ACISP |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Shi Bai 0001, Steven D. Galbraith |
Lattice Decoding Attacks on Binary LWE. |
ACISP |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Dan Yamamoto, Hisayoshi Sato, Yasuko Fukuzawa |
Incrementally Executable Signcryptions. |
ACISP |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Zhongwen Zhang, Yuewu Wang, Jiwu Jing, Qiongxiao Wang, Lingguang Lei |
Once Root Always a Threat: Analyzing the Security Threats of Android Permission System. |
ACISP |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Petr Susil, Pouyan Sepehrdad, Serge Vaudenay |
On Selection of Samples in Algebraic Attacks and a New Technique to Find Hidden Low Degree Equations. |
ACISP |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Zheli Liu, Jin Li 0002, Xiaofeng Chen 0001, Jun Yang 0032, Chunfu Jia |
TMDS: Thin-Model Data Sharing Scheme Supporting Keyword Search in Cloud Storage. |
ACISP |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Subhadeep Banik |
Some Insights into Differential Cryptanalysis of Grain v1. |
ACISP |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yanfeng Wang, Wenling Wu |
Improved Multidimensional Zero-Correlation Linear Cryptanalysis and Applications to LBlock and TWINE. |
ACISP |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba |
Privacy-Preserving Wildcards Pattern Matching Using Symmetric Somewhat Homomorphic Encryption. |
ACISP |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Willy Susilo, Yi Mu 0001 (eds.) |
Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings |
ACISP |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Xingmin Cui, Da Yu, Patrick P. F. Chan, Lucas Chi Kwong Hui, Siu-Ming Yiu, Sihan Qing |
CoChecker: Detecting Capability and Sensitive Data Leaks from Component Chains in Android. |
ACISP |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Masayuki Fukumitsu, Shingo Hasegawa, Shuji Isobe, Hiroki Shizuya |
On the Impossibility of Proving Security of Strong-RSA Signatures via the RSA Assumption. |
ACISP |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Sultan Alneyadi, Elankayer Sithirasenan, Vallipuram Muthukkumarasamy |
A Semantics-Aware Classification Approach for Data Leakage Prevention. |
ACISP |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Philip S. Vejre, Andrey Bogdanov |
Route 66: Passively Breaking All GSM Channels. |
ACISP |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Zhaojing Ding, Wei Guo 0005, Liangjian Su, Jizeng Wei, Haihua Gu |
Further Research on N-1 Attack against Exponentiation Algorithms. |
ACISP |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yuyu Wang 0001, Keisuke Tanaka |
Strongly Simulation-Extractable Leakage-Resilient NIZK. |
ACISP |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yanbin Pan, Yingpu Deng |
A New Attack against the Selvi-Vivek-Rangan Deterministic Identity Based Signature Scheme from ACISP 2012. |
ACISP |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Long Wen, Meiqin Wang |
Integral Zero-Correlation Distinguisher for ARX Block Cipher, with Application to SHACAL-2. |
ACISP |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay |
Universally Composable Efficient Priced Oblivious Transfer from a Flexible Membership Encryption. |
ACISP |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Janaka Alawatugoda 0001, Colin Boyd, Douglas Stebila |
Continuous After-the-Fact Leakage-Resilient Key Exchange. |
ACISP |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Zhijiao Zhang, Lei Zhang, Yu Chen 0004, Yuanchun Shi |
Running Multiple Androids on One ARM Platform. |
ACISP |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Qinglong Zhang, Zongbin Liu, Miao Li, Ji Xiang, Jiwu Jing |
A High-Throughput Unrolled ZUC Core for 100Gbps Data Transmission. |
ACISP |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Atsushi Takayasu, Noboru Kunihiro |
Cryptanalysis of RSA with Multiple Small Secret Exponents. |
ACISP |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Y. Sreenivasa Rao, Ratna Dutta |
Expressive Bandwidth-Efficient Attribute Based Signature and Signcryption in Standard Model. |
ACISP |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yogachandran Rahulamathavan, Veelasha Moonsamy, Lynn Margaret Batten, Su Shunliang, Muttukrishnan Rajarajan |
An Analysis of Tracking Settings in Blackberry 10 and Windows Phone 8 Smartphones. |
ACISP |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Weiran Liu, Jianwei Liu 0001, Qianhong Wu, Bo Qin |
Hierarchical Identity-Based Broadcast Encryption. |
ACISP |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Bungo Taga, Shiho Moriai, Kazumaro Aoki |
Differential and Impossible Differential Related-Key Attacks on Hierocrypt-L1. |
ACISP |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Essam Ghadafi |
Formalizing Group Blind Signatures and Practical Constructions without Random Oracles. |
ACISP |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ahto Buldas, Margus Niitsoo |
Black-Box Separations and Their Adaptability to the Non-uniform Model. |
ACISP |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Zhenqing Shi, Bin Zhang 0003, Dengguo Feng |
Cryptanalysis of Helix and Phelix Revisited. |
ACISP |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Leah F. South, Douglas Stebila |
Count-Min Sketches for Estimating Password Frequency within Hamming Distance Two. |
ACISP |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Byoung-Il Kim, Jin Hong 0001 |
Analysis of the Non-perfect Table Fuzzy Rainbow Tradeoff. |
ACISP |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yoshinori Aono |
Minkowski Sum Based Lattice Construction for Multivariate Simultaneous Coppersmith's Technique and Applications to RSA. |
ACISP |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Baodong Qin, Shengli Liu 0001, Zhengan Huang |
Key-Dependent Message Chosen-Ciphertext Security of the Cramer-Shoup Cryptosystem. |
ACISP |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ahto Buldas, Risto Laanoja |
Security Proofs for Hash Tree Time-Stamping Using Hash Functions with Small Output Size. |
ACISP |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Fuchun Guo, Yi Mu 0001, Willy Susilo, Vijay Varadharajan |
Membership Encryption and Its Applications. |
ACISP |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yosuke Todo |
Upper Bounds for the Security of Several Feistel Networks. |
ACISP |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Kristian Gjøsteen, George Petrides, Asgeir Steine |
Towards Privacy Preserving Mobile Internet Communications - How Close Can We Get? |
ACISP |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Seyit Ahmet Çamtepe |
Complexity of Increasing the Secure Connectivity in Wireless Ad Hoc Networks. |
ACISP |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Xavier Boyen |
Expressive Cryptography: Lattice Perspectives. |
ACISP |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Colin Boyd, Leonie Simpson (eds.) |
Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings |
ACISP |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Willy Susilo, Man Ho Au, Yang Wang 0074, Duncan S. Wong |
Fairness in Concurrent Signatures Revisited. |
ACISP |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Takanori Isobe 0001, Yu Sasaki, Jiageng Chen |
Related-Key Boomerang Attacks on KATAN32/48/64. |
ACISP |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Pierre-Alain Fouque, Antoine Joux, Mehdi Tibouchi |
Injective Encodings to Elliptic Curves. |
ACISP |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yang Wang 0074, Mark Manulis, Man Ho Au, Willy Susilo |
Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt". |
ACISP |
2013 |
DBLP DOI BibTeX RDF |
|