Information Security and Privacy

18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings

Editors:

ISBN: 978-3-642-39058-6 (Print) 978-3-642-39059-3 (Online)

Table of contents (30 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Cryptanalysis I

    1. No Access

      Book Chapter

      Pages 1-12

      Analysing the IOBC Authenticated Encryption Mode

    2. No Access

      Book Chapter

      Pages 13-26

      A Chosen IV Related Key Attack on Grain-128a

    3. No Access

      Book Chapter

      Pages 27-40

      Cryptanalysis of Helix and Phelix Revisited

  3. RSA

    1. No Access

      Book Chapter

      Pages 41-56

      Attacks on Multi-Prime RSA with Small Prime Difference

    2. No Access

      Book Chapter

      Pages 57-71

      Factoring Multi-power RSA Modulus N = p r q with Partial Known Bits

    3. No Access

      Book Chapter

      Pages 72-87

      Toward Separating the Strong Adaptive Pseudo-freeness from the Strong RSA Assumption

    4. No Access

      Book Chapter

      Pages 88-103

      Minkowski Sum Based Lattice Construction for Multivariate Simultaneous Coppersmith’s Technique and Applications to RSA

  4. Lattices and Security Proofs

    1. No Access

      Book Chapter

      Pages 104-117

      Adaptive Precision Floating Point LLL

    2. No Access

      Book Chapter

      Pages 118-135

      Better Lattice Constructions for Solving Multivariate Linear Equations Modulo Unknown Divisors

    3. No Access

      Book Chapter

      Pages 136-151

      Key-Dependent Message Chosen-Ciphertext Security of the Cramer-Shoup Cryptosystem

    4. No Access

      Book Chapter

      Pages 152-167

      Black-Box Separations and Their Adaptability to the Non-uniform Model

  5. Public Key Cryptography

    1. No Access

      Book Chapter

      Pages 168-186

      Attribute-Based Identification: Definitions and Efficient Constructions

    2. No Access

      Book Chapter

      Pages 187-202

      Relations among Privacy Notions for Signcryption and Key Invisible “Sign-then-Encrypt”

    3. No Access

      Book Chapter

      Pages 203-218

      Injective Encodings to Elliptic Curves

    4. No Access

      Book Chapter

      Pages 219-234

      Membership Encryption and Its Applications

  6. Hashing

    1. No Access

      Book Chapter

      Pages 235-250

      Security Proofs for Hash Tree Time-Stamping Using Hash Functions with Small Output Size

    2. No Access

      Book Chapter

      Pages 251-266

      Improved Boomerang Attacks on SM3

  7. Invited Talk

    1. No Access

      Book Chapter

      Pages 267-267

      Expressive Cryptography: Lattice Perspectives

  8. Cryptanalysis II

    1. No Access

      Book Chapter

      Pages 268-285

      Related-Key Boomerang Attacks on KATAN32/48/64

    2. No Access

      Book Chapter

      Pages 286-301

      Highly Accurate Key Extraction Method for Access-Driven Cache Attacks Using Correlation Coefficient

previous Page of 2