Information Security and Privacy

14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings

  • Colin Boyd
  • Juan González Nieto
Conference proceedings ACISP 2009

DOI: 10.1007/978-3-642-02620-1

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5594)

Table of contents (31 papers)

  1. Front Matter
  2. Invited Lecture

    1. Is the Information Security King Naked?
      Basie von Solms
      Pages 1-7
  3. Network Security

    1. Measurement Study on Malicious Web Servers in the .nz Domain
      Christian Seifert, Vipul Delwadia, Peter Komisarczuk, David Stirling, Ian Welch
      Pages 8-25
    2. A Combinatorial Approach for an Anonymity Metric
      Dang Vinh Pham, Dogan Kesdogan
      Pages 26-43
    3. On Improving the Accuracy and Performance of Content-Based File Type Identification
      Irfan Ahmed, Kyung-suk Lhee, Hyunjung Shin, ManPyo Hong
      Pages 44-59
  4. Symmetric Key Encryption

    1. Attacking 9 and 10 Rounds of AES-256
      Ewan Fleischmann, Michael Gorski, Stefan Lucks
      Pages 60-72
    2. Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure
      Jiali Choy, Guanhan Chew, Khoongming Khoo, Huihui Yap
      Pages 73-89
    3. Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT
      Onur Özen, Kerem Varıcı, Cihangir Tezcan, Çelebi Kocair
      Pages 90-107
    4. Improved Cryptanalysis of the Common Scrambling Algorithm Stream Cipher
      Leonie Simpson, Matt Henricksen, Wun-She Yap
      Pages 108-121
    5. Testing Stream Ciphers by Finding the Longest Substring of a Given Density
      Serdar Boztaş, Simon J. Puglisi, Andrew Turpin
      Pages 122-133
    6. New Correlations of RC4 PRGA Using Nonzero-Bit Differences
      Atsuko Miyaji, Masahiro Sukegawa
      Pages 134-152
  5. Hash Functions

    1. Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders
      Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu
      Pages 153-170
    2. Inside the Hypercube
      Jean-Philippe Aumasson, Eric Brier, Willi Meier, María Naya-Plasencia, Thomas Peyrin
      Pages 202-213
    3. On the Weak Ideal Compression Functions
      Akira Numayama, Keisuke Tanaka
      Pages 232-248
  6. Invited Lecture

  7. Public Key Cryptography

About these proceedings


This book constitutes the refereed proceedings of the 14th Australasian Conference on Information Security and Privacy, ACISP 2009, held in Brisbane, Australia, during July 1-3, 2009.

The 29 revised full papers presented together with two invited talks were carefully reviewed and selected from 106 submissions. The papers are organized in topical sections on network security, symmetric key encryption, hash functions, public key cryptography, protocols, and implementation.


AES block ciphers broadcast encryption cluster analysis collision resistant common scrambling algorithm cryptanalysis cryptographic attacks cryptography cryptosystems data security differential attack differential probability network security privacy

Editors and affiliations

  • Colin Boyd
    • 1
  • Juan González Nieto
    • 2
  1. 1.Information Security InstituteQueensland University of TechnologyBrisbaneAustralia
  2. 2.Information Security InstituteQueensland Univ. of TechnologyBrisbaneAustralia

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-02619-5
  • Online ISBN 978-3-642-02620-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349