


default search action
19. ACISP 2014: Wollongong, NSW, Australia
- Willy Susilo

, Yi Mu:
Information Security and Privacy - 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings. Lecture Notes in Computer Science 8544, Springer 2014, ISBN 978-3-319-08343-8
Cryptanalysis
- Yanfeng Wang, Wenling Wu:

Improved Multidimensional Zero-Correlation Linear Cryptanalysis and Applications to LBlock and TWINE. 1-16 - Bungo Taga, Shiho Moriai, Kazumaro Aoki:

Differential and Impossible Differential Related-Key Attacks on Hierocrypt-L1. 17-33 - Subhadeep Banik

:
Some Insights into Differential Cryptanalysis of Grain v1. 34-49 - Petr Susil, Pouyan Sepehrdad, Serge Vaudenay:

On Selection of Samples in Algebraic Attacks and a New Technique to Find Hidden Low Degree Equations. 50-65
Cryptographic Protocols
- Yuyu Wang, Keisuke Tanaka:

Strongly Simulation-Extractable Leakage-Resilient NIZK. 66-81 - Liang Liu, Xiaofeng Chen, Wenjing Lou:

A Secure Three-Party Computational Protocol for Triangle Area. 82-97 - Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay:

Universally Composable Efficient Priced Oblivious Transfer from a Flexible Membership Encryption. 98-114 - Zheli Liu, Jin Li, Xiaofeng Chen, Jun Yang, Chunfu Jia:

TMDS: Thin-Model Data Sharing Scheme Supporting Keyword Search in Cloud Storage. 115-130
Cryptanalysis
- Xiao Zhong, Mingsheng Wang, Bin Zhang, Shengbao Wu:

Low Data Complexity Inversion Attacks on Stream Ciphers via Truncated Compressed Preimage Sets. 131-147 - Yanbin Pan, Yingpu Deng:

A New Attack against the Selvi-Vivek-Rangan Deterministic Identity Based Signature Scheme from ACISP 2012. 148-161 - Zhaojing Ding, Wei Guo, Liangjian Su, Jizeng Wei, Haihua Gu:

Further Research on N-1 Attack against Exponentiation Algorithms. 162-175 - Atsushi Takayasu, Noboru Kunihiro

:
Cryptanalysis of RSA with Multiple Small Secret Exponents. 176-191
Fine-grain Cryptographic Protocols
- Mingwu Zhang:

New Model and Construction of ABE: Achieving Key Resilient-Leakage and Attribute Direct-Revocation. 192-208 - Y. Sreenivasa Rao

, Ratna Dutta:
Expressive Bandwidth-Efficient Attribute Based Signature and Signcryption in Standard Model. 209-225 - Dan Yamamoto, Hisayoshi Sato, Yasuko Fukuzawa:

Incrementally Executable Signcryptions. 226-241 - Weiran Liu, Jianwei Liu

, Qianhong Wu, Bo Qin:
Hierarchical Identity-Based Broadcast Encryption. 242-257
Key Exchange
- Janaka Alawatugoda

, Colin Boyd, Douglas Stebila
:
Continuous After-the-Fact Leakage-Resilient Key Exchange. 258-273 - Yu Chen, Qiong Huang, Zongyang Zhang:

Sakai-Ohgishi-Kasahara Identity-Based Non-Interactive Key Exchange Scheme, Revisited. 274-289
Fundamentals
- Masayuki Fukumitsu, Shingo Hasegawa, Shuji Isobe, Hiroki Shizuya:

On the Impossibility of Proving Security of Strong-RSA Signatures via the RSA Assumption. 290-305 - Nilanjan Datta, Mridul Nandi

:
ELmE: A Misuse Resistant Parallel Authenticated Encryption. 306-321
Lattices and Homomorphic Encryption
- Shi Bai, Steven D. Galbraith

:
Lattice Decoding Attacks on Binary LWE. 322-337 - Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba

:
Privacy-Preserving Wildcards Pattern Matching Using Symmetric Somewhat Homomorphic Encryption. 338-353
Applications
- Zhongwen Zhang, Yuewu Wang, Jiwu Jing, Qiongxiao Wang, Lingguang Lei:

Once Root Always a Threat: Analyzing the Security Threats of Android Permission System. 354-369 - Qinglong Zhang, Zongbin Liu, Miao Li, Ji Xiang, Jiwu Jing:

A High-Throughput Unrolled ZUC Core for 100Gbps Data Transmission. 370-385 - Mohammed Shafiul Alam Khan, Chris J. Mitchell

:
Another Look at Privacy Threats in 3G Mobile Telephony. 386-396 - Weijin Wang

, Dengguo Feng, Yu Qin, Jianxiong Shao, Li Xi, XiaoBo Chu:
ExBLACR: Extending BLACR System. 397-412
Short Papers
- Sultan Alneyadi, Elankayer Sithirasenan, Vallipuram Muthukkumarasamy:

A Semantics-Aware Classification Approach for Data Leakage Prevention. 413-421 - Philip S. Vejre, Andrey Bogdanov

:
Route 66: Passively Breaking All GSM Channels. 422-429 - Yogachandran Rahulamathavan

, Veelasha Moonsamy, Lynn Margaret Batten, Su Shunliang, Muttukrishnan Rajarajan:
An Analysis of Tracking Settings in Blackberry 10 and Windows Phone 8 Smartphones. 430-437 - Zhijiao Zhang, Lei Zhang, Yu Chen, Yuanchun Shi:

Running Multiple Androids on One ARM Platform. 438-445 - Xingmin Cui, Da Yu, Patrick P. F. Chan, Lucas Chi Kwong Hui, Siu-Ming Yiu, Sihan Qing:

CoChecker: Detecting Capability and Sensitive Data Leaks from Component Chains in Android. 446-453 - Long Wen, Meiqin Wang:

Integral Zero-Correlation Distinguisher for ARX Block Cipher, with Application to SHACAL-2. 454-461

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














