


default search action
27th ACISP 2022: Wollongong, NSW, Australia
- Khoa Nguyen
, Guomin Yang
, Fuchun Guo
, Willy Susilo
:
Information Security and Privacy - 27th Australasian Conference, ACISP 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings. Lecture Notes in Computer Science 13494, Springer 2022, ISBN 978-3-031-22300-6
Symmetric-Key Cryptography
- Jian Guo, Ling Song, Haoyang Wang
:
Key Structures: Improved Related-Key Boomerang Attack Against the Full AES-256. 3-23 - Lorenzo Grassi
, Christian Rechberger:
Truncated Differential Properties of the Diagonal Set of Inputs for 5-Round AES. 24-45 - Shotaro Miyashita, Ryoma Ito
, Atsuko Miyaji
:
PNB-Focused Differential Cryptanalysis of ChaCha Stream Cipher. 46-66 - Yuhan Zhang, Wenling Wu, Lei Zhang:
Improved Differential Attack on Round-Reduced LEA. 67-84 - Subodh Bijwe, Amit Kumar Chauhan, Somitra Kumar Sanadhya:
Implementing Grover Oracle for Lightweight Block Ciphers Under Depth Constraints. 85-105 - Yongxia Mao, Wenling Wu, Bolin Wang, Li Zhang:
Improved Division Property for Ciphers with Complex Linear Layers. 106-124 - Alexandre Adomnicai, Kazuhiko Minematsu, Maki Shigeri:
Fast Skinny-128 SIMD Implementations for Sequential Modes of Operation. 125-144
Public-Key Cryptanalysis
- Jinzheng Cao
, Yanbin Pan, Qingfeng Cheng
, Xinghua Li:
Handle the Traces: Revisiting the Attack on ECDSA with EHNP. 147-167 - Lei Bi, Xianhui Lu, Junjie Luo, Kunpeng Wang:
Hybrid Dual and Meet-LWE Attack. 168-188 - Wenshuo Guo, Fangwei Fu:
Cryptanalysis and Repair of a Gabidulin Code Based Cryptosystem from ACISP 2018. 189-205
Public-Key Cryptography
- Yusaku Maeda, Koji Nuida
:
Chosen Ciphertext Secure Keyed Two-Level Homomorphic Encryption. 209-228 - Yumei Li
, Mingwu Zhang, Futai Zhang:
Structure-Preserving Linearly Homomorphic Signature with Designated Combiner for Subspace. 229-243 - Angelique Faye Loe, Liam Medley
, Christian O'Connell, Elizabeth A. Quaglia
:
TIDE: A Novel Approach to Constructing Timed-Release Encryption. 244-264 - Shimin Pan
, Kwan Yin Chan
, Handong Cui
, Tsz Hon Yuen:
Multi-signatures for ECDSA and Its Applications in Blockchain. 265-285
Post-quantum Cryptography
- Shi Bai, Austin Beard, Floyd Johnson, Sulani K. B. Vidhanalage, Tran Ngo:
Fiat-Shamir Signatures Based on Module-NTRU. 289-308 - Kittiphon Phalakarn
, Vorapong Suppakitpaisarn, M. Anwar Hasan:
Speeding-Up Parallel Computation of Large Smooth-Degree Isogeny Using Precedence-Constrained Scheduling. 309-331 - Xiaohui Ding, Muhammed F. Esgin, Amin Sakzad, Ron Steinfeld:
An Injectivity Analysis of Crystals-Kyber and Implications on Quantum Security. 332-351
Cryptographic Protocols
- Kristian Gjøsteen
, Thomas Haines, Johannes Müller
, Peter B. Rønne
, Tjerand Silde
:
Verifiable Decryption in the Head. 355-374 - Handong Zhang, Puwen Wei, Haiyang Xue
, Yi Deng, Jinsong Li, Wei Wang, Guoxiao Liu:
Resumable Zero-Knowledge for Circuits from Symmetric Key Primitives. 375-398 - Donghoon Chang, Surabhi Garg
, Munawar Hasan, Sweta Mishra
:
On Security of Fuzzy Commitment Scheme for Biometric Authentication. 399-419 - Mayank Raikwar
, Danilo Gligoroski
:
SoK: Decentralized Randomness Beacon Protocols. 420-446
Blockchain
- Xiaofei Wu, Hao Wang, Chunpeng Ge, Lu Zhou, Qiong Huang, Lanju Kong, Lizhen Cui, Zhe Liu:
CCOM: Cost-Efficient and Collusion-Resistant Oracle Mechanism for Smart Contracts. 449-468 - Shenwei Chen, Zhen Liu, Yu Long, Dawu Gu:
DeChain: A Blockchain Framework Enhancing Decentralization via Sharding. 469-488 - Arash Mirzaei, Amin Sakzad, Jiangshan Yu, Ron Steinfeld:
Garrison: A Novel Watchtower Scheme for Bitcoin. 489-508 - Chen Zhao, Jianing Ding, Zhenzhen Li, Zhen Li, Gang Xiong
, Gaopeng Gou:
Shoot Before You Escape: Dynamic Behavior Monitor of Bitcoin Users via Bi-Temporal Network Analytics. 509-528

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.