The SCEAS System
Navigation Menu

Conferences in DBLP

Australasian Conference on Information Security and Privacy (ACISP) (acisp)
2007 (conf/acisp/2007)

  1. Steve Babbage, Carlos Cid, Norbert Pramstaller, Håvard Raddum
    An Analysis of the Hermes8 Stream Ciphers. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:1-10 [Conf]
  2. Sultan Al-Hinai, Ed Dawson, Matthew Henricksen, Leonie Ruth Simpson
    On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:11-28 [Conf]
  3. Debojyoti Bhattacharya, Debdeep Mukhopadhyay, Dhiman Saha, Dipanwita Roy Chowdhury
    Strengthening NLS Against Crossword Puzzle Attack. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:29-44 [Conf]
  4. Jun Yajima, Yu Sasaki, Yusuke Naito, Terutoshi Iwasaki, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta
    A New Strategy for Finding a Differential Path of SHA-1. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:45-58 [Conf]
  5. Donghoon Chang, Moti Yung, Jaechul Sung, Seokhie Hong, Sangjin Lee
    Preimage Attack on the Parallel FFT-Hashing Function. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:59-67 [Conf]
  6. Norbert Pramstaller, Mario Lamberger, Vincent Rijmen
    Second Preimages for Iterated Hash Functions and Their Implications on MACs. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:68-81 [Conf]
  7. Olivier Billet, Matthew J. B. Robshaw, Thomas Peyrin
    On Building Hash Functions from Multivariate Quadratic Equations. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:82-95 [Conf]
  8. Julien Bringer, Hervé Chabanne, Malika Izabachène, David Pointcheval, Qiang Tang, Sébastien Zimmer
    An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:96-106 [Conf]
  9. Jovan Dj. Golic, Madalina Baltatu
    Soft Generation of Secure Biometric Keys. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:107-121 [Conf]
  10. Toshinori Araki, Satoshi Obana
    Flaws in Some Secret Sharing Schemes Against Cheating. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:122-132 [Conf]
  11. Toshinori Araki
    Efficient (k, n) Threshold Secret Sharing Schemes Secure Against Cheating from n-1 Cheaters. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:133-142 [Conf]
  12. Kitae Jeong, Changhoon Lee, Jaechul Sung, Seokhie Hong, Jongin Lim
    Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:143-157 [Conf]
  13. Fen Liu, Wen Ji, Lei Hu, Jintai Ding, Shuwang Lv, Andrei Pyshkin, Ralf-Philipp Weinmann
    Analysis of the SMS4 Block Cipher. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:158-170 [Conf]
  14. Yongdong Wu, Feng Bao, Robert H. Deng
    Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:171-183 [Conf]
  15. Jean-Philippe Aumasson, Matthieu Finiasz, Willi Meier, Serge Vaudenay
    TCHo: A Hardware-Oriented Trapdoor Cipher. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:184-199 [Conf]
  16. Ryotaro Hayashi, Keisuke Tanaka
    Anonymity on Paillier's Trap-Door Permutation. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:200-214 [Conf]
  17. Qiong Huang, Duncan S. Wong
    Generic Certificateless Key Encapsulation Mechanism. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:215-229 [Conf]
  18. Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume
    Double-Size Bipartite Modular Multiplication. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:230-244 [Conf]
  19. Erik Dahmen, Katsuyuki Okeya, Daniel Schepers
    Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:245-258 [Conf]
  20. Takeru Ishihara, Hiroshi Aono, Sadayuki Hongo, Junji Shikata
    Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:259-273 [Conf]
  21. James Birkett, Alexander W. Dent, Gregory Neven, Jacob C. N. Schuldt
    Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:274-292 [Conf]
  22. Christophe Tartary, Huaxiong Wang
    Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:293-307 [Conf]
  23. Xinyi Huang, Yi Mu, Willy Susilo, Duncan S. Wong, Wei Wu
    Certificateless Signature Revisited. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:308-322 [Conf]
  24. Cheng-Kang Chu, Wen-Guey Tzeng
    Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:323-337 [Conf]
  25. Sylvain Pasini, Serge Vaudenay
    Hash-and-Sign with Weak Hashing Made Secure. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:338-354 [Conf]
  26. Kan Yasuda
    "Sandwich" Is Indeed Secure: How to Authenticate a Message with Just One Hashing. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:355-369 [Conf]
  27. Akihiro Yamamura, Takashi Kurokawa, Junji Nakazato
    Threshold Anonymous Group Identification and Zero-Knowledge Proof. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:370-384 [Conf]
  28. Mohammad Reza Reyhanitabar, Shuhong Wang, Reihaneh Safavi-Naini
    Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:385-399 [Conf]
  29. Stefan Brands, Liesje Demuynck, Bart De Decker
    A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:400-415 [Conf]
  30. Ivan Damgård, Martin Geisler, Mikkel Krøigaard
    Efficient and Secure Comparison for On-Line Auctions. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:416-430 [Conf]
  31. Man Ho Au, Willy Susilo, Yi Mu
    Practical Compact E-Cash. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:431-445 [Conf]
  32. Suvasini Panigrahi, Amlan Kundu, Shamik Sural, Arun K. Majumdar
    Use of Dempster-Shafer Theory and Bayesian Inferencing for Fraud Detection in Mobile Communication Networks. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:446-460 [Conf]
  33. Kannan Srinathan, Prasad Raghavendra, C. Pandu Rangan
    On Proactive Perfectly Secure Message Transmission. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:461-473 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002