Limit search to available items
Book Cover
Author ACISP 2012 (2012 : Wollongong, N.S.W.)

Title Information security and privacy : 17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings / Willy Susilo, Yi Mu, Jennifer Seberry (eds.)
Published Berlin ; New York : Springer, [2012]
Online access available from:
Springer eBooks    View Resource Record  


Description 1 online resource (xiv, 460 pages) : illustrations
Series Lecture notes in computer science, 1611-3349 ; 7372
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 7372. 1611-3349
LNCS sublibrary. SL 4, Security and cryptology.
Contents Optimal Bounds for Multi-Prime [Phi]-Hiding Assumption / Kaori Tosu and Noboru Kunihiro -- Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchange / Atsushi Fujioka, Mark Manulis, Koutarou Suzuki and Berkant Ustaoğlu -- A Game-Theoretic Perspective on Oblivious Transfer / Haruna Higo, Keisuke Tanaka, Akihiro Yamada and Kenji Yasunaga -- Faster Algorithm for Solving Hard Knapsacks for Moderate Message Length / Yuji Nagashima and Noboru Kunihiro -- Accelerating the Secure Distributed Computation of the Mean by a Chebyshev Expansion / Peter Lory and Manuel Liedel -- Security Analysis of the Lightweight Block Ciphers XTEA, LED and Piccolo / Takanori Isobe and Kyoji Shibutani -- Improved Known-Key Distinguishers on Feistel-SP Ciphers and Application to Camellia / Yu Sasaki, Sareh Emami, Deukjo Hong and Ashish Kumar -- Low Data Complexity Attack on Reduced Camellia-256 / Jiazhe Chen and Leibo Li
Cryptanalysis of RSA with a Small Parameter / Xianmeng Meng and Xuexin Zheng -- An Algebraic Broadcast Attack against NTRU / Jintai Ding, Yanbin Pan and Yingpu Deng -- Analysis of Indirect Message Injection for MAC Generation Using Stream Ciphers / Mufeed ALMashrafi, Harry Bartlett, Leonie Simpson, Ed Dawson and Kenneth Koon-Ho Wong -- Weimar-DM: A Highly Secure Double-Length Compression Function / Ewan Fleischmann, Christian Forler, Stefan Lucks and Jakob Wenzel -- An Efficient IND-CCA2 Secure Variant of the Niederreiter Encryption Scheme in the Standard Model / K. Preetha Mathew, Sachin Vasant, Sridhar Venkatesan and C. Pandu Rangan -- Zero-Knowledge Protocols for the McEliece Encryption / Kirill Morozov and Tsuyoshi Takagi -- Effort-Release Public-Key Encryption from Cryptographic Puzzles / Jothi Rangasamy, Douglas Stebila, Colin Boyd, Juan Manuel González-Nieto and Lakshmi Kuppusamy -- Leakage-Resilience of Stateless/Stateful Public-Key Encryption from Hash Proofs / Manh Ha Nguyen, Keisuke Tanaka and Kenji Yasunaga
How to Fix Two RSA-Based PVSS Schemes--Exploration and Solution / Kun Peng and Matt Henricksen -- Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions / Kaoru Kurosawa, Ryo Nojima and Le Trieu Phong -- Generalized First Pre-image Tractable Random Oracle Model and Signature Schemes / Xiao Tan and Duncan S. Wong -- A Short Non-delegatable Strong Designated Verifier Signature / Haibo Tian, Xiaofeng Chen and Jin Li -- Deterministic Identity Based Signature Scheme and Its Application for Aggregate Signatures / S. Sharmila Deva Selvi, S. Sree Vivek and C. Pandu Rangan -- Fully Leakage-Resilient Signatures with Auxiliary Inputs / Tsz Hon Yuen, Siu Ming Yiu and Lucas C.K. Hui -- Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts / Duong-Hieu Phan, David Pointcheval, Siamak F. Shahandashti and Mario Strefler -- A Generic Construction of Accountable Decryption and Its Applications / Xuhua Zhou, Xuhua Ding and Kefei Chen
Threshold Ciphertext Policy Attribute-Based Encryption with Constant Size Ciphertexts / Aijun Ge, Rui Zhang, Cheng Chen, Chuangui Ma and Zhenfeng Zhang -- Fully Private Revocable Predicate Encryption / Juan Manuel González-Nieto, Mark Manulis and Dongdong Sun -- Anonymous ID-Based Proxy Re-Encryption / Jun Shao -- On the Optimality of Lattices for the Coppersmith Technique / Yoshinori Aono, Manindra Agrawal, Takakazu Satoh and Osamu Watanabe -- Revocable Identity-Based Encryption from Lattices / Jie Chen, Hoon Wei Lim, San Ling, Huaxiong Wang and Khoa Nguyen -- On Area, Time, and the Right Trade-Off / A. Poschmann and M.J.B. Robshaw -- Analysis of Xorrotation with Application to an HC-128 Variant / Paul Stankovski, Martin Hell and Thomas Johansson -- Private Fingerprint Matching / Siamak F. Shahandashti, Reihaneh Safavi-Naini and Philip Ogunbona -- Minimizing Information Leakage of Tree-Based RFID Authentication Protocols Using Alternate Tree-Walking / Kaleb Lee, Colin Boyd and Juan Manule González-Nieto -- ICAF: A Context-Aware Framework for Access Control / A.S.M. Kayes, Jun Han and Alan Colman -- Non-malleable Instance-Dependent Commitment in the Standard Model / Wenpan Jing, Haixia Xu and Bao Li
Summary This book constitutes the refereed proceedings of the 17th Australasian Conference on Information Security and Privacy, ACISP 2012, held in Wollongong, Australia, in July 2012. The 30 revised full papers presented together with 5 short papers were carefully reviewed and selected from 89 submissions. The papers are organized in topical sections on fundamentals; cryptanalysis; message authentication codes and hash functions; public key cryptography; digital signatures; identity-based and attribute-based cryptography; lattice-based cryptography; lightweight cryptography
Analysis Computer science
Data protection
Data encryption (Computer science)
Coding theory
Information systems
Systems and Data Security
Management of Computing and Information Systems
Coding and Information Theory
Computer Appl. in Administrative Data Processing
Bibliography Includes bibliographical references and author index
Notes Online resource; title from PDF title page (SpringerLink, viewed Aug. 14, 2012)
Subject Data encryption (Computer science) -- Congresses.
Data protection -- Congresses.
Computer security -- Congresses.
Genre/Form Conference papers and proceedings.
Conference papers and proceedings.
Form Electronic book
Author Susilo, Willy.
Mu, Yi, 1955-
Seberry, Jennifer, 1944-
ISBN 9783642314483 (electronic bk.)
3642314481 (electronic bk.)
Other Titles ACISP 2012