Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Junko Takahashi, Toshinori Fukunaga, Kazumaro Aoki, Hitoshi Fuji |
Highly Accurate Key Extraction Method for Access-Driven Cache Attacks Using Correlation Coefficient. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings, pp. 286-301, 2013, Springer, 978-3-642-39058-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yang Yu, Zhanfei Zhou |
A Rational Secret Sharing Protocol with Unconditional Security in the Synchronous Setting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings, pp. 403-418, 2013, Springer, 978-3-642-39058-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Plantard, Willy Susilo, Zhenfei Zhang |
Adaptive Precision Floating Point LLL. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings, pp. 104-117, 2013, Springer, 978-3-642-39058-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hiroaki Anada, Seiko Arita, Sari Handa, Yosuke Iwabuchi |
Attribute-Based Identification: Definitions and Efficient Constructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings, pp. 168-186, 2013, Springer, 978-3-642-39058-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yuliang Zheng 0001 |
Public Key Cryptography for Mobile Cloud. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings, pp. 435, 2013, Springer, 978-3-642-39058-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hui Zhang, Tsuyoshi Takagi |
Attacks on Multi-Prime RSA with Small Prime Difference. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings, pp. 41-56, 2013, Springer, 978-3-642-39058-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Dongxia Bai, Hongbo Yu, Gaoli Wang, Xiaoyun Wang 0001 |
Improved Boomerang Attacks on SM3. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings, pp. 251-266, 2013, Springer, 978-3-642-39058-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Masayuki Fukumitsu, Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya |
Toward Separating the Strong Adaptive Pseudo-freeness from the Strong RSA Assumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings, pp. 72-87, 2013, Springer, 978-3-642-39058-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Chris J. Mitchell |
Analysing the IOBC Authenticated Encryption Mode. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings, pp. 1-12, 2013, Springer, 978-3-642-39058-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yao Lu 0002, Rui Zhang 0002, Dongdai Lin |
Factoring Multi-power RSA Modulus N = p r q with Partial Known Bits. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings, pp. 57-71, 2013, Springer, 978-3-642-39058-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ryo Kikuchi, Koji Chida, Dai Ikarashi, Koki Hamada, Katsumi Takahashi |
Secret Sharing Schemes with Conversion Protocol to Achieve Short Share-Size and Extendibility to Multiparty Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings, pp. 419-434, 2013, Springer, 978-3-642-39058-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar 0001, Meltem Sönmez Turan |
A Chosen IV Related Key Attack on Grain-128a. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings, pp. 13-26, 2013, Springer, 978-3-642-39058-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Atsushi Takayasu, Noboru Kunihiro |
Better Lattice Constructions for Solving Multivariate Linear Equations Modulo Unknown Divisors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings, pp. 118-135, 2013, Springer, 978-3-642-39058-6. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jie Chen 0021, Hoon Wei Lim, San Ling, Huaxiong Wang, Khoa Nguyen 0002 |
Revocable Identity-Based Encryption from Lattices. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, pp. 390-403, 2012, Springer, 978-3-642-31447-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini, Philip Ogunbona |
Private Fingerprint Matching. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, pp. 426-433, 2012, Springer, 978-3-642-31447-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Atsushi Fujioka, Mark Manulis, Koutarou Suzuki, Berkant Ustaoglu |
Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, pp. 15-28, 2012, Springer, 978-3-642-31447-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Haruna Higo, Keisuke Tanaka, Akihiro Yamada, Kenji Yasunaga |
A Game-Theoretic Perspective on Oblivious Transfer. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, pp. 29-42, 2012, Springer, 978-3-642-31447-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jothi Rangasamy, Douglas Stebila, Colin Boyd, Juan Manuel González Nieto, Lakshmi Kuppusamy |
Effort-Release Public-Key Encryption from Cryptographic Puzzles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, pp. 194-207, 2012, Springer, 978-3-642-31447-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Duong Hieu Phan, David Pointcheval, Siamak Fayyaz Shahandashti, Mario Strefler |
Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, pp. 308-321, 2012, Springer, 978-3-642-31447-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yoshinori Aono, Manindra Agrawal, Takakazu Satoh, Osamu Watanabe 0001 |
On the Optimality of Lattices for the Coppersmith Technique. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, pp. 376-389, 2012, Springer, 978-3-642-31447-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jun Shao 0001 |
Anonymous ID-Based Proxy Re-Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, pp. 364-375, 2012, Springer, 978-3-642-31447-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Wenpan Jing, Haixia Xu 0002, Bao Li 0001 |
Non-malleable Instance-Dependent Commitment in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, pp. 450-457, 2012, Springer, 978-3-642-31447-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Xuhua Zhou, Xuhua Ding, Kefei Chen |
A Generic Construction of Accountable Decryption and Its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, pp. 322-335, 2012, Springer, 978-3-642-31447-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Aijun Ge 0001, Rui Zhang 0002, Cheng Chen, Chuangui Ma, Zhenfeng Zhang |
Threshold Ciphertext Policy Attribute-Based Encryption with Constant Size Ciphertexts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, pp. 336-349, 2012, Springer, 978-3-642-31447-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Ewan Fleischmann, Christian Forler, Stefan Lucks, Jakob Wenzel 0001 |
Weimar-DM: A Highly Secure Double-Length Compression Function. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, pp. 152-165, 2012, Springer, 978-3-642-31447-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jiazhe Chen, Leibo Li |
Low Data Complexity Attack on Reduced Camellia-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, pp. 101-114, 2012, Springer, 978-3-642-31447-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Jintai Ding, Yanbin Pan, Yingpu Deng |
An Algebraic Broadcast Attack against NTRU. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, pp. 124-137, 2012, Springer, 978-3-642-31447-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Peter Lory, Manuel Liedel |
Accelerating the Secure Distributed Computation of the Mean by a Chebyshev Expansion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, pp. 57-70, 2012, Springer, 978-3-642-31447-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Paul Stankovski, Martin Hell, Thomas Johansson 0001 |
Analysis of Xorrotation with Application to an HC-128 Variant. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, pp. 419-425, 2012, Springer, 978-3-642-31447-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | A. S. M. Kayes, Jun Han 0004, Alan W. Colman |
ICAF: A Context-Aware Framework for Access Control. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, pp. 442-449, 2012, Springer, 978-3-642-31447-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Haibo Tian, Xiaofeng Chen 0001, Jin Li 0002 |
A Short Non-delegatable Strong Designated Verifier Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, pp. 261-279, 2012, Springer, 978-3-642-31447-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kaori Tosu, Noboru Kunihiro |
Optimal Bounds for Multi-Prime Φ-Hiding Assumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, pp. 1-14, 2012, Springer, 978-3-642-31447-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kun Peng, Matt Henricksen |
How to Fix Two RSA-Based PVSS Schemes - Exploration and Solution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, pp. 223-234, 2012, Springer, 978-3-642-31447-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Takanori Isobe 0001, Kyoji Shibutani |
Security Analysis of the Lightweight Block Ciphers XTEA, LED and Piccolo. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, pp. 71-86, 2012, Springer, 978-3-642-31447-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kaoru Kurosawa, Ryo Nojima, Le Trieu Phong |
Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, pp. 235-246, 2012, Springer, 978-3-642-31447-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kirill Morozov, Tsuyoshi Takagi |
Zero-Knowledge Protocols for the McEliece Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, pp. 180-193, 2012, Springer, 978-3-642-31447-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Mufeed Juma AlMashrafi, Harry Bartlett, Leonie Simpson, Ed Dawson, Kenneth Koon-Ho Wong |
Analysis of Indirect Message Injection for MAC Generation Using Stream Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, pp. 138-151, 2012, Springer, 978-3-642-31447-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Xianmeng Meng, Xuexin Zheng |
Cryptanalysis of RSA with a Small Parameter. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, pp. 115-123, 2012, Springer, 978-3-642-31447-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yu Sasaki, Sareh Emami, Deukjo Hong, Ashish Kumar |
Improved Known-Key Distinguishers on Feistel-SP Ciphers and Application to Camellia. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, pp. 87-100, 2012, Springer, 978-3-642-31447-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | K. Preetha Mathew, Sachin Vasant, Sridhar Venkatesan, C. Pandu Rangan |
An Efficient IND-CCA2 Secure Variant of the Niederreiter Encryption Scheme in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, pp. 166-179, 2012, Springer, 978-3-642-31447-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Kaleb Lee, Colin Boyd, Juan Manuel González Nieto |
Minimizing Information Leakage of Tree-Based RFID Authentication Protocols Using Alternate Tree-Walking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, pp. 434-441, 2012, Springer, 978-3-642-31447-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Axel Poschmann, Matthew J. B. Robshaw |
On Area, Time, and the Right Trade-Off. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, pp. 404-418, 2012, Springer, 978-3-642-31447-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan |
Deterministic Identity Based Signature Scheme and Its Application for Aggregate Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, pp. 280-293, 2012, Springer, 978-3-642-31447-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Manh Ha Nguyen, Keisuke Tanaka, Kenji Yasunaga |
Leakage-Resilience of Stateless/Stateful Public-Key Encryption from Hash Proofs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, pp. 208-222, 2012, Springer, 978-3-642-31447-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Willy Susilo, Yi Mu 0001, Jennifer Seberry (eds.) |
Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![Springer, 978-3-642-31447-6 The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Xiao Tan 0003, Duncan S. Wong |
Generalized First Pre-image Tractable Random Oracle Model and Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, pp. 247-260, 2012, Springer, 978-3-642-31447-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Tsz Hon Yuen, Siu-Ming Yiu, Lucas Chi Kwong Hui |
Fully Leakage-Resilient Signatures with Auxiliary Inputs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, pp. 294-307, 2012, Springer, 978-3-642-31447-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yuji Nagashima, Noboru Kunihiro |
Faster Algorithm for Solving Hard Knapsacks for Moderate Message Length. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, pp. 43-56, 2012, Springer, 978-3-642-31447-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Juan Manuel González Nieto, Mark Manulis, Dongdong Sun |
Fully Private Revocable Predicate Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings, pp. 350-363, 2012, Springer, 978-3-642-31447-6. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Phuong Ha Nguyen, Hongjun Wu 0001, Huaxiong Wang |
Improving the Algorithm 2 in Multidimensional Linear Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings, pp. 61-74, 2011, Springer, 978-3-642-22496-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sanjit Chatterjee, Alfred Menezes, Berkant Ustaoglu |
A Generic Variant of NIST's KAS2 Key Agreement Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings, pp. 353-370, 2011, Springer, 978-3-642-22496-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Reza Sepahi, Ron Steinfeld, Josef Pieprzyk |
Lattice-Based Completely Non-malleable PKE in the Standard Model (Poster). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings, pp. 407-411, 2011, Springer, 978-3-642-22496-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Praveen Gauravaram, Lars R. Knudsen, Nasour Bagheri, Lei Wei 0001 |
Improved Security Analysis of Fugue-256 (Poster). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings, pp. 428-432, 2011, Springer, 978-3-642-22496-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Udaya Parampalli, Philip Hawkes (eds.) |
Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![Springer, 978-3-642-22496-6 The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yusong Du, Fangguo Zhang |
Finding More Boolean Functions with Maximum Algebraic Immunity Based on Univariate Polynomial Representation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings, pp. 47-60, 2011, Springer, 978-3-642-22496-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Meicheng Liu, Dongdai Lin, Dingyi Pei |
Results on the Immunity of Boolean Functions against Probabilistic Algebraic Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings, pp. 34-46, 2011, Springer, 978-3-642-22496-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Hongying Liu, Yukiyasu Tsunoo, Satoshi Goto |
Electromagnetic Analysis Enhancement with Signal Processing Techniques (Poster). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings, pp. 456-461, 2011, Springer, 978-3-642-22496-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Sui-Guan Teo, Ali Al-Hamdan, Harry Bartlett, Leonie Simpson, Kenneth Koon-Ho Wong, Ed Dawson |
State Convergence in the Initialisation of Stream Ciphers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings, pp. 75-88, 2011, Springer, 978-3-642-22496-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Lei Wei 0001, Christian Rechberger, Jian Guo 0001, Hongjun Wu 0001, Huaxiong Wang, San Ling |
Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings, pp. 433-438, 2011, Springer, 978-3-642-22496-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Keita Emura, Atsuko Miyaji, Mohammad Shahriar Rahman |
Toward Dynamic Attribute-Based Signcryption (Poster). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings, pp. 439-443, 2011, Springer, 978-3-642-22496-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Claude Carlet |
On Known and New Differentially Uniform Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings, pp. 1-15, 2011, Springer, 978-3-642-22496-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Christian L. F. Corniaux, Hossein Ghodosi |
A Verifiable Distributed Oblivious Transfer Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings, pp. 444-450, 2011, Springer, 978-3-642-22496-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Atsushi Fujioka, Yoshiaki Okamoto, Taiichi Saito |
Generic Construction of Strongly Secure Timed-Release Public-Key Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings, pp. 319-336, 2011, Springer, 978-3-642-22496-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Juraj Sarinay |
Faster and Smoother - VSH Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings, pp. 142-156, 2011, Springer, 978-3-642-22496-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jia Fan, Yuliang Zheng 0001, Xiaohu Tang |
A Single Key Pair is Adequate for the Zheng Signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings, pp. 371-388, 2011, Springer, 978-3-642-22496-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Chiaki Ohtahara, Keita Okada, Yu Sasaki, Takeshi Shimoyama |
Preimage Attacks on Full-ARIRANG (Poster). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings, pp. 417-422, 2011, Springer, 978-3-642-22496-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Kun Peng |
Impracticality of Efficient PVSS in Real Life Security Standard (Poster). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings, pp. 451-455, 2011, Springer, 978-3-642-22496-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yamin Liu, Bao Li 0001, Xianhui Lu, Dingding Jia |
Efficient CCA-Secure CDH Based KEM Balanced between Ciphertext and Key. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings, pp. 310-318, 2011, Springer, 978-3-642-22496-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Bart Preneel, Hirotaka Yoshida, Dai Watanabe |
Finding Collisions for Reduced Luffa-256 v2 (Poster). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings, pp. 423-427, 2011, Springer, 978-3-642-22496-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Benjamin W. Long |
Security in Depth through Smart Space Cascades. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings, pp. 226-240, 2011, Springer, 978-3-642-22496-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Craig S. Wright |
Compliance or Security, What Cost? (Poster). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings, pp. 412-416, 2011, Springer, 978-3-642-22496-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Joseph K. Liu, Cheng-Kang Chu, Jianying Zhou 0001 |
Identity-Based Server-Aided Decryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings, pp. 337-352, 2011, Springer, 978-3-642-22496-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Shashank Lagishetty, Pruthvi Reddy Sabbu, Kannan Srinathan |
DMIPS - Defensive Mechanism against IP Spoofing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings, pp. 276-291, 2011, Springer, 978-3-642-22496-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Meiqin Wang, Yue Sun, Nicky Mouha, Bart Preneel |
Algebraic Techniques in Differential Cryptanalysis Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings, pp. 120-141, 2011, Springer, 978-3-642-22496-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Hongbo Yu, Xiaoyun Wang 0001 |
Cryptanalysis of the Compression Function of SIMD. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings, pp. 157-171, 2011, Springer, 978-3-642-22496-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Mingwu Zhang, Tsuyoshi Takagi |
GeoEnc: Geometric Area Based Keys and Policies in Functional Encryption Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings, pp. 241-258, 2011, Springer, 978-3-642-22496-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes |
Application-Binding Protocol in the User Centric Smart Card Ownership Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings, pp. 208-225, 2011, Springer, 978-3-642-22496-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Eduarda S. V. Freire 0001, Kenneth G. Paterson |
Provably Secure Key Assignment Schemes from Factoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings, pp. 292-309, 2011, Springer, 978-3-642-22496-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Jiazhe Chen, Keting Jia, Hongbo Yu, Xiaoyun Wang 0001 |
New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings, pp. 16-33, 2011, Springer, 978-3-642-22496-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Qiang Tang 0001 |
Towards Public Key Encryption Scheme Supporting Equality Test with Fine-Grained Authorization. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings, pp. 389-406, 2011, Springer, 978-3-642-22496-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Andrey Bogdanov, Kyoji Shibutani |
Double SP-Functions: Enhanced Generalized Feistel Networks - Extended Abstract. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings, pp. 106-119, 2011, Springer, 978-3-642-22496-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Kazuhiko Minematsu, Tomoyasu Suzaki, Maki Shigeri |
On Maximum Differential Probability of Generalized Feistel. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings, pp. 89-105, 2011, Springer, 978-3-642-22496-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Tetsuya Hatano, Atsuko Miyaji, Takashi Sato |
T-Robust Scalable Group Key Exchange Protocol with O(logn) Complexity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings, pp. 189-207, 2011, Springer, 978-3-642-22496-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Yun Zhang, Christophe Tartary, Huaxiong Wang |
An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder Theorem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings, pp. 259-275, 2011, Springer, 978-3-642-22496-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Man Ho Au, Willy Susilo, Yi Mu 0001 |
Electronic Cash with Anonymous User Suspension. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings, pp. 172-188, 2011, Springer, 978-3-642-22496-6. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
1 | Manuel Barbosa, Pooya Farshim |
Relations among Notions of Complete Non-malleability: Indistinguishability Characterisation and Efficient Construction without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings, pp. 145-163, 2010, Springer, 978-3-642-14080-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Huafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai |
Adaptive and Composable Non-committing Encryptions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings, pp. 135-144, 2010, Springer, 978-3-642-14080-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jean-François Biasse, Michael J. Jacobson Jr., Alan K. Silvester |
Security Estimates for Quadratic Field Based Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings, pp. 233-247, 2010, Springer, 978-3-642-14080-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Kenneth Koon-Ho Wong, Gregory V. Bard |
Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings, pp. 19-36, 2010, Springer, 978-3-642-14080-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Matthew Henricksen, Wun-She Yap, Chee Hoo Yian, Shinsaku Kiyomoto, Toshiaki Tanaka |
Side-Channel Analysis of the K2 Stream Cipher. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings, pp. 53-73, 2010, Springer, 978-3-642-14080-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Kenneth G. Paterson, Douglas Stebila |
One-Time-Password-Authenticated Key Exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings, pp. 264-281, 2010, Springer, 978-3-642-14080-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ryo Nishimaki, Eiichiro Fujisaki, Keisuke Tanaka |
A Multi-trapdoor Commitment Scheme from the RSA Assumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings, pp. 182-199, 2010, Springer, 978-3-642-14080-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Man Ho Au, Willy Susilo, Yi Mu 0001 |
Proof-of-Knowledge of Representation of Committed Value and Its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings, pp. 352-369, 2010, Springer, 978-3-642-14080-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Phuong Ha Nguyen, Lei Wei 0001, Huaxiong Wang, San Ling |
On Multidimensional Linear Cryptanalysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings, pp. 37-52, 2010, Springer, 978-3-642-14080-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Xiaofeng Chen 0001, Fangguo Zhang, Willy Susilo, Haibo Tian, Jin Li 0002, Kwangjo Kim |
Identity-Based Chameleon Hash Scheme without Key Exposure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings, pp. 200-215, 2010, Springer, 978-3-642-14080-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto |
Attribute-Based Authenticated Key Exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings, pp. 300-317, 2010, Springer, 978-3-642-14080-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Jonathan Etrog, Matthew J. B. Robshaw |
On Unbiased Linear Approximations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings, pp. 74-86, 2010, Springer, 978-3-642-14080-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Ahto Buldas, Margus Niitsoo |
Optimally Tight Security Proofs for Hash-Then-Publish Time-Stamping. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings, pp. 318-335, 2010, Springer, 978-3-642-14080-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | Christian Rechberger |
Second-Preimage Analysis of Reduced SHA-1. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings, pp. 104-116, 2010, Springer, 978-3-642-14080-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|
1 | James Birkett, Douglas Stebila |
Predicate-Based Key Exchange. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy - 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings, pp. 282-299, 2010, Springer, 978-3-642-14080-8. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
|