Information Security and Privacy

14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings

Editors:

ISBN: 978-3-642-02619-5 (Print) 978-3-642-02620-1 (Online)

Table of contents (31 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Invited Lecture

    1. No Access

      Book Chapter

      Pages 1-7

      Is the Information Security King Naked?

  3. Network Security

    1. No Access

      Book Chapter

      Pages 8-25

      Measurement Study on Malicious Web Servers in the .nz Domain

    2. No Access

      Book Chapter

      Pages 26-43

      A Combinatorial Approach for an Anonymity Metric

    3. No Access

      Book Chapter

      Pages 44-59

      On Improving the Accuracy and Performance of Content-Based File Type Identification

  4. Symmetric Key Encryption

    1. No Access

      Book Chapter

      Pages 60-72

      Attacking 9 and 10 Rounds of AES-256

    2. No Access

      Book Chapter

      Pages 73-89

      Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure

    3. No Access

      Book Chapter

      Pages 90-107

      Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT

    4. No Access

      Book Chapter

      Pages 108-121

      Improved Cryptanalysis of the Common Scrambling Algorithm Stream Cipher

    5. No Access

      Book Chapter

      Pages 122-133

      Testing Stream Ciphers by Finding the Longest Substring of a Given Density

    6. No Access

      Book Chapter

      Pages 134-152

      New Correlations of RC4 PRGA Using Nonzero-Bit Differences

  5. Hash Functions

    1. No Access

      Book Chapter

      Pages 153-170

      Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders

    2. No Access

      Book Chapter

      Pages 171-184

      Characterizing Padding Rules of MD Hash Functions Preserving Collision Security

    3. No Access

      Book Chapter

      Pages 185-201

      Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256

    4. No Access

      Book Chapter

      Pages 202-213

      Inside the Hypercube

    5. No Access

      Book Chapter

      Pages 214-231

      Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others

    6. No Access

      Book Chapter

      Pages 232-248

      On the Weak Ideal Compression Functions

  6. Invited Lecture

    1. No Access

      Book Chapter

      Pages 249-249

      Hardening the Network from the Friend Within

  7. Public Key Cryptography

    1. No Access

      Book Chapter

      Pages 250-263

      Reducing the Complexity in the Distributed Computation of Private RSA Keys

    2. No Access

      Book Chapter

      Pages 264-275

      Efficiency Bounds for Adversary Constructions in Black-Box Reductions

    3. No Access

      Book Chapter

      Pages 276-292

      Building Key-Private Public-Key Encryption Schemes

previous Page of 2