Information Security and Privacy

7th Australasian Conference, ACISP 2002 Melbourne, Australia, July 3–5, 2002 Proceedings

  • Lynn Batten
  • Jennifer Seberry
Conference proceedings ACISP 2002

DOI: 10.1007/3-540-45450-0

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2384)

Table of contents (37 papers)

  1. Front Matter
    Pages I-XII
  2. Key Handling

    1. Security Analysis and Improvement of the Global Key Recovery System
      Yanjiang Yang, Feng Bao, Robert H. Deng
      Pages 17-24
    2. The LILI-II Keystream Generator
      A. Clark, Ed Dawson, J. Fuller, J. Golić, H -J. Lee, William Millan et al.
      Pages 25-39
    3. A Secure Re-keying Scheme with Key Recovery Property
      Hartono Kurnio, Rei Safavi-Naini, Huaxiong Wang
      Pages 40-55
  3. Trust and Secret Sharing

    1. Modelling Trust Structures for Public Key Infrastructures
      Marie Henderson, Robert Coulter, Ed Dawson, Eiji Okamoto
      Pages 56-70
    2. Size of Broadcast in Threshold Schemes with Disenrollment
      S. G. Barwick, W. -A. Jackson, Keith M. Martin, Peter R. Wild
      Pages 71-88
    3. Efficient Sharing of Encrypted Data
      Krista Bennett, Christian Grothoff, Tzvetan Horozov, Ioana Patrascu
      Pages 107-120
    4. Cheating Prevention in Linear Secret Sharing
      Josef Pieprzyk, Xian-Mo Zhang
      Pages 121-135
  4. Fast Computation

    1. Note on Fast Computation of Secret RSA Exponents
      Wieland Fischer, Jean-Pierre Seifert
      Pages 136-143
  5. Cryptanalysis I

    1. Cryptanalysis of Stream Cipher COS (2, 128) Mode I
      Hongjun Wu, Feng Bao
      Pages 154-158
    2. The Analysis of Zheng-Seberry Scheme
      David Soldera, Jennifer Seberry, Chengxin Qu
      Pages 159-168
    3. Cryptanalysis of Stream Cipher Alpha1
      Hongjun Wu
      Pages 169-175
  6. Elliptic Curves

  7. AES

    1. Strengthening the Key Schedule of the AES
      Lauren May, Matt Henricksen, William Millan, Gary Carter, Ed Dawson
      Pages 226-240

About these proceedings


The Seventh Australasian Conference in Information Security and Privacy (ACISP) was held in Melbourne, 3–5July, 2002. The conference was sponsored by Deakin University and iCORE, Alberta, Canada and the Australian Com- ter Society. The aims of the annual ACISP conferences have been to bring together people working in di?erent areas of computer, communication, and information security from universities, industry, and government institutions. The conferences give the participants the opportunity to discuss the latest developments in the rapidly growing area of information security and privacy. The reviewing process took six weeks and we heartily thank all the m- bers of the program committee and the external referees for the many hours of valuable time given to the conference. The program committee accepted 36 papers from the 94 submitted. From those papers accepted 10 papers were from Australia, 5each from Korea and USA, 4 each from Singapore and Germany, 2 from Japan, and 1 each from The Netherlands, UK, Spain, Bulgaria, and India. The authors of every paper, whether accepted or not, made a valued contribution to the conference. In addition to the contributed papers, we were delighted to have presen- tions from the Victorian Privacy Commissioner, Paul Chadwick, and eminent researchers Professor Hugh Williams, Calgary, Canada, Professor Bimal Roy, ISI, Kolkota, India (whose invited talk was formally referred and accepted by the program committee), and Dr Hank Wolfe from Otago, New Zealand.


AEX Administration Information RSA advanced encryption standard cryptanalysis cryptographic protocols cryptography cryptology data encryption data security privacy secur networks security trust

Editors and affiliations

  • Lynn Batten
    • 1
  • Jennifer Seberry
    • 2
  1. 1.Rusden CampusDeakin UniversityMelbourneAustralia
  2. 2.Department of Computer ScienceUniversity of WollongongWollongongAustralia

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2002
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-43861-8
  • Online ISBN 978-3-540-45450-2
  • Series Print ISSN 0302-9743