Information Security and Privacy

16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings

Editors:

ISBN: 978-3-642-22496-6 (Print) 978-3-642-22497-3 (Online)

Table of contents (36 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Invited Talks

    1. No Access

      Book Chapter

      Pages 1-15

      On Known and New Differentially Uniform Functions

  3. Symmetric Key Cryptography

    1. No Access

      Book Chapter

      Pages 16-33

      New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256

    2. No Access

      Book Chapter

      Pages 34-46

      Results on the Immunity of Boolean Functions against Probabilistic Algebraic Attacks

    3. No Access

      Book Chapter

      Pages 47-60

      Finding More Boolean Functions with Maximum Algebraic Immunity Based on Univariate Polynomial Representation

    4. No Access

      Book Chapter

      Pages 61-74

      Improving the Algorithm 2 in Multidimensional Linear Cryptanalysis

    5. No Access

      Book Chapter

      Pages 75-88

      State Convergence in the Initialisation of Stream Ciphers

    6. No Access

      Book Chapter

      Pages 89-105

      On Maximum Differential Probability of Generalized Feistel

    7. No Access

      Book Chapter

      Pages 106-119

      Double SP-Functions: Enhanced Generalized Feistel Networks

    8. No Access

      Book Chapter

      Pages 120-141

      Algebraic Techniques in Differential Cryptanalysis Revisited

  4. Hash Functions

    1. No Access

      Book Chapter

      Pages 142-156

      Faster and Smoother – VSH Revisited

    2. No Access

      Book Chapter

      Pages 157-171

      Cryptanalysis of the Compression Function of SIMD

  5. Protocols

    1. No Access

      Book Chapter

      Pages 172-188

      Electronic Cash with Anonymous User Suspension

    2. No Access

      Book Chapter

      Pages 189-207

      T-Robust Scalable Group Key Exchange Protocol with O(logn) Complexity

    3. No Access

      Book Chapter

      Pages 208-225

      Application-Binding Protocol in the User Centric Smart Card Ownership Model

  6. Access Control and Security

    1. No Access

      Book Chapter

      Pages 226-240

      Security in Depth through Smart Space Cascades

    2. No Access

      Book Chapter

      Pages 241-258

      GeoEnc: Geometric Area Based Keys and Policies in Functional Encryption Systems

    3. No Access

      Book Chapter

      Pages 259-275

      An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder Theorem

    4. No Access

      Book Chapter

      Pages 276-291

      DMIPS - Defensive Mechanism against IP Spoofing

  7. Public Key Cryptography

    1. No Access

      Book Chapter

      Pages 292-309

      Provably Secure Key Assignment Schemes from Factoring

    2. No Access

      Book Chapter

      Pages 310-318

      Efficient CCA-Secure CDH Based KEM Balanced between Ciphertext and Key

previous Page of 2