Information Security and Privacy

15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings

Editors:

ISBN: 978-3-642-14080-8 (Print) 978-3-642-14081-5 (Online)

Table of contents (24 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Symmetric Key Encryption

    1. No Access

      Book Chapter

      Pages 1-18

      Cryptanalysis of a Generalized Unbalanced Feistel Network Structure

    2. No Access

      Book Chapter

      Pages 19-36

      Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Systems

    3. No Access

      Book Chapter

      Pages 37-52

      On Multidimensional Linear Cryptanalysis

    4. No Access

      Book Chapter

      Pages 53-73

      Side-Channel Analysis of the K2 Stream Cipher

    5. No Access

      Book Chapter

      Pages 74-86

      On Unbiased Linear Approximations

  3. Hash Functions

    1. No Access

      Book Chapter

      Pages 87-103

      Distinguishers for the Compression Function and Output Transformation of Hamsi-256

    2. No Access

      Book Chapter

      Pages 104-116

      Second-Preimage Analysis of Reduced SHA-1

    3. No Access

      Book Chapter

      Pages 117-134

      Some Observations on Indifferentiability

  4. Public Key Cryptography

    1. No Access

      Book Chapter

      Pages 135-144

      Adaptive and Composable Non-committing Encryptions

    2. No Access

      Book Chapter

      Pages 145-163

      Relations among Notions of Complete Non-malleability: Indistinguishability Characterisation and Efficient Construction without Random Oracles

    3. No Access

      Book Chapter

      Pages 164-181

      Strong Knowledge Extractors for Public-Key Encryption Schemes

    4. No Access

      Book Chapter

      Pages 182-199

      A Multi-trapdoor Commitment Scheme from the RSA Assumption

    5. No Access

      Book Chapter

      Pages 200-215

      Identity-Based Chameleon Hash Scheme without Key Exposure

    6. No Access

      Book Chapter

      Pages 216-232

      The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key

    7. No Access

      Book Chapter

      Pages 233-247

      Security Estimates for Quadratic Field Based Cryptosystems

    8. No Access

      Book Chapter

      Pages 248-263

      Solving Generalized Small Inverse Problems

  5. Protocols

    1. No Access

      Book Chapter

      Pages 264-281

      One-Time-Password-Authenticated Key Exchange

    2. No Access

      Book Chapter

      Pages 282-299

      Predicate-Based Key Exchange

    3. No Access

      Book Chapter

      Pages 300-317

      Attribute-Based Authenticated Key Exchange

    4. No Access

      Book Chapter

      Pages 318-335

      Optimally Tight Security Proofs for Hash-Then-Publish Time-Stamping

previous Page of 2