


default search action
30th ACISP 2025: Wollongong, NSW, Australia - Part II
- Willy Susilo

, Josef Pieprzyk
:
Information Security and Privacy - 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025, Proceedings, Part II. Lecture Notes in Computer Science 15659, Springer 2025, ISBN 978-981-96-9097-8
Post-Quantum Cryptography
- Shaoxuan Zhang, Chun Guo, Meiqin Wang:

Towards Quantum Security of Hirose Compression Function and Romulus-H. 3-22 - Dung Bui:

Efficient Multi-instance Vector Commitment and Application to Post-quantum Signatures. 23-41 - Dixiao Du

, Yuejun Liu
, Yiwen Gao
, Jingdian Ming
, Hao Yuan, Yongbin Zhou
:
Breaking the Shield: Novel Fault Attacks on CRYSTALS-Dilithium. 42-63 - Takumi Nishimura

, Atsushi Takayasu
:
Efficient Revocable Identity-Based Encryption from Middle-Product LWE. 64-83 - Rishiraj Bhattacharyya, Sreehari Kollath, Christophe Petit

:
Code-Based Fully Dynamic Accountable Ring Signatures and Group Signatures Using the Helper Methodology. 84-103 - Yuki Seto

, Hiroki Furue, Atsushi Takayasu
:
Partial Key Exposure Attacks on UOV and Its Variants. 104-123 - Xiaohan Wan, Yang Wang, Haiyang Xue

, Mingqiang Wang:
Unbounded Multi-hop Proxy Re-encryption with HRA Security: An LWE-Based Optimization. 124-144 - Xianhui Lu, Yongjian Yin, Dingding Jia, Jingnan He, Yamin Liu, Yijian Liu, Hongbo Liu:

Fiat-Shamir with Rejection and Rotation. 145-165 - Qingfeng Wang

, Li-Ping Wang
:
Amoeba: More Flexible RLWE-Based KEM. 166-186 - Zhenzhi Lai, Udaya Parampalli:

Get Rid of Templates: A Chosen-Ciphertext Attack on ML-KEM with a DPA-Based Self-comparison Oracle. 187-207
Homomorphic Encryption and Applications
- Xinzhou Wang

, Shifeng Sun
, Dawu Gu
, Yuan Luo
:
Accountability for Server Misbehavior in Homomorphic Secret Sharing. 211-231 - Zejiu Tan, Junping Wan, Zoe L. Jiang, Jingjing Fan, Man Ho Au, Siu Ming Yiu:

High-Precision Homomorphic Modular Reduction for CKKS Bootstrapping. 232-251 - Chunling Chen, Xianhui Lu, Binwu Xiang, Bowen Huang, Ruida Wang, Yijian Liu:

Refined Error Management for Gate Bootstrapping. 252-274
Cryptographic Foundations and Number Theory
- Ying Liu, Xianhui Lu, Yu Zhang, Ruida Wang, Ziyao Liu, Kunpeng Wang:

Compact Lifting for NTT-Unfriendly Modulus. 277-296 - Ying Cai, Chengyi Qin, Mingqiang Wang:

Guaranteed Termination Asynchronous Complete Secret Sharing with Lower Communication and Optimal Resilience. 297-318 - Naoki Shimoe

, Noboru Kunihiro
:
Solving Generalized Approximate Divisor Multiples Problems. 319-339

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














