


default search action
30th ACISP 2025: Wollongong, NSW, Australia - Part II
- Willy Susilo
, Josef Pieprzyk
:
Information Security and Privacy - 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025, Proceedings, Part II. Lecture Notes in Computer Science 15659, Springer 2025, ISBN 978-981-96-9097-8
Post-Quantum Cryptography
- Shaoxuan Zhang, Chun Guo, Meiqin Wang:
Towards Quantum Security of Hirose Compression Function and Romulus-H. 3-22 - Dung Bui:
Efficient Multi-instance Vector Commitment and Application to Post-quantum Signatures. 23-41 - Dixiao Du, Yuejun Liu, Yiwen Gao, Jingdian Ming, Hao Yuan, Yongbin Zhou:
Breaking the Shield: Novel Fault Attacks on CRYSTALS-Dilithium. 42-63 - Takumi Nishimura, Atsushi Takayasu:
Efficient Revocable Identity-Based Encryption from Middle-Product LWE. 64-83 - Rishiraj Bhattacharyya, Sreehari Kollath, Christophe Petit:
Code-Based Fully Dynamic Accountable Ring Signatures and Group Signatures Using the Helper Methodology. 84-103 - Yuki Seto, Hiroki Furue, Atsushi Takayasu:
Partial Key Exposure Attacks on UOV and Its Variants. 104-123 - Xiaohan Wan, Yang Wang, Haiyang Xue, Mingqiang Wang:
Unbounded Multi-hop Proxy Re-encryption with HRA Security: An LWE-Based Optimization. 124-144 - Xianhui Lu, Yongjian Yin, Dingding Jia, Jingnan He, Yamin Liu, Yijian Liu, Hongbo Liu:
Fiat-Shamir with Rejection and Rotation. 145-165 - Qingfeng Wang, Li-Ping Wang:
Amoeba: More Flexible RLWE-Based KEM. 166-186 - Zhenzhi Lai, Udaya Parampalli:
Get Rid of Templates: A Chosen-Ciphertext Attack on ML-KEM with a DPA-Based Self-comparison Oracle. 187-207
Homomorphic Encryption and Applications
- Xinzhou Wang, Shifeng Sun, Dawu Gu, Yuan Luo:
Accountability for Server Misbehavior in Homomorphic Secret Sharing. 211-231 - Zejiu Tan, Junping Wan, Zoe L. Jiang, Jingjing Fan, Man Ho Au, Siu Ming Yiu:
High-Precision Homomorphic Modular Reduction for CKKS Bootstrapping. 232-251 - Chunling Chen, Xianhui Lu, Binwu Xiang, Bowen Huang, Ruida Wang, Yijian Liu:
Refined Error Management for Gate Bootstrapping. 252-274
Cryptographic Foundations and Number Theory
- Ying Liu, Xianhui Lu, Yu Zhang, Ruida Wang, Ziyao Liu, Kunpeng Wang:
Compact Lifting for NTT-Unfriendly Modulus. 277-296 - Ying Cai, Chengyi Qin, Mingqiang Wang:
Guaranteed Termination Asynchronous Complete Secret Sharing with Lower Communication and Optimal Resilience. 297-318 - Naoki Shimoe, Noboru Kunihiro:
Solving Generalized Approximate Divisor Multiples Problems. 319-339

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.