Information Security and Privacy

13th Australasian Conference, ACISP 2008, Wollongong, Australia, July 7-9, 2008. Proceedings

  • Editors
  • Yi Mu
  • Willy Susilo
  • Jennifer Seberry
Conference proceedings ACISP 2008

DOI: 10.1007/978-3-540-70500-0

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5107)

Table of contents (34 papers)

  1. Front Matter
  2. New Paradigms for Password Security
    Xavier Boyen
    Pages 1-5
  3. Secure Biometric Authentication with Improved Accuracy
    Manuel Barbosa, Thierry Brouard, Stéphane Cauchie, Simão Melo de Sousa
    Pages 21-36
  4. A Critical Analysis and Improvement of AACS Drive-Host Authentication
    Jiayuan Sui, Douglas R. Stinson
    Pages 37-52
  5. Comparing the Pre- and Post-specified Peer Models for Key Agreement
    Alfred Menezes, Berkant Ustaoglu
    Pages 53-68
  6. Efficient One-Round Key Exchange in the Standard Model
    Colin Boyd, Yvonne Cliff, Juan Gonzalez Nieto, Kenneth G. Paterson
    Pages 69-83
  7. On the Improvement of the BDF Attack on LSBS-RSA
    Hung-Min Sun, Mu-En Wu, Huaxiong Wang, Jian Guo
    Pages 84-97
  8. Public-Key Cryptosystems with Primitive Power Roots of Unity
    Takato Hirano, Koichiro Wada, Keisuke Tanaka
    Pages 98-112
  9. Distributed Verification of Mixing - Local Forking Proofs Model
    Jacek Cichoń, Marek Klonowski, Mirosław Kutyłowski
    Pages 128-140
  10. Fully-Simulatable Oblivious Set Transfer
    Huafei Zhu
    Pages 141-154
  11. Efficient Disjointness Tests for Private Datasets
    Qingsong Ye, Huaxiong Wang, Josef Pieprzyk, Xian-Mo Zhang
    Pages 155-169
  12. Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary
    Arpita Patra, Ashish Choudhary, Madhu Vaidyanathan, C. Pandu Rangan
    Pages 170-186
  13. Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers
    Debra L. Cook, Moti Yung, Angelos D. Keromytis
    Pages 187-202
  14. Multidimensional Linear Cryptanalysis of Reduced Round Serpent
    Miia Hermelin, Joo Yeon Cho, Kaisa Nyberg
    Pages 203-215
  15. Cryptanalysis of Reduced-Round SMS4 Block Cipher
    Lei Zhang, Wentao Zhang, Wenling Wu
    Pages 216-229
  16. On the Unprovable Security of 2-Key XCBC
    Peng Wang, Dengguo Feng, Wenling Wu, Liting Zhang
    Pages 230-238
  17. Looking Back at a New Hash Function
    Olivier Billet, Matthew J. B. Robshaw, Yannick Seurin, Yiqun Lisa Yin
    Pages 239-253
  18. Non-linear Reduced Round Attacks against SHA-2 Hash Family
    Somitra Kumar Sanadhya, Palash Sarkar
    Pages 254-266

About these proceedings


This book constitutes the refereed proceedings of the 13th Australasian Conference on Information Security and Privacy, ACISP 2008, held in Wollongong, Australia, in July 2008.

The 33 revised full papers presented were carefully reviewed and selected from 111 submissions. The papers cover a range of topics in information security, including authentication, key management, public key cryptography, privacy, anonymity, secure communication, ciphers, network security, elliptic curves, hash functions, and database security.


anonymity biometrics block ciphers classifier cryptanalysis cryptographic hash function cryptographic protocols cryptography cryptosystems data security digital signature schemes distributed system elliptic curve cryptography encryption faul

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2008
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-69971-2
  • Online ISBN 978-3-540-70500-0
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349