Information Security and Privacy

9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings


ISBN: 978-3-540-22379-5 (Print) 978-3-540-27800-9 (Online)
Download Book (4,507 KB) As a courtesy to our readers the eBook is provided DRM-free. However, please note that Springer uses effective methods and state-of-the art technology to detect, stop, and prosecute illegal sharing to safeguard our authors’ interests.

Table of contents (41 chapters)

previous Page of 3
  1. Front Matter

    Pages -

  2. Broadcast Encryption and Traitor Tracing

    1. Book Chapter

      Pages 1-11

      Multi-service Oriented Broadcast Encryption

    2. Book Chapter

      Pages 12-23

      Secure and Insecure Modifications of the Subset Difference Broadcast Encryption Scheme

    3. Book Chapter

      Pages 24-35

      Linear Code Implies Public-Key Traitor Tracing with Revocation

    4. Book Chapter

      Pages 36-49

      TTS without Revocation Capability Secure Against CCA2

  3. Private Information Retrieval and Oblivious Transfer

    1. Book Chapter

      Pages 50-61

      Single Database Private Information Retrieval with Logarithmic Communication

    2. Book Chapter

      Pages 62-73

      Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions

  4. Trust and Secret Sharing

    1. Book Chapter

      Pages 74-85

      Optimistic Fair Exchange Based on Publicly Verifiable Secret Sharing

    2. Book Chapter

      Pages 86-97

      NGSCB: A Trusted Open System

  5. Cryptanalysis (I)

    1. Book Chapter

      Pages 98-109

      The Biryukov-Demirci Attack on Reduced-Round Versions of IDEA and MESH Ciphers

    2. Book Chapter

      Pages 110-122

      Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2

    3. Book Chapter

      Pages 123-136

      The Related-Key Rectangle Attack – Application to SHACAL-1

    4. Book Chapter

      Pages 137-148

      Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1

    5. Book Chapter

      Pages 149-156

      The Security of Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders

  6. Cryptanalysis (II)

    1. Book Chapter

      Pages 157-163

      Analysis of a Conference Scheme Under Active and Passive Attacks

    2. Book Chapter

      Pages 164-175

      Cryptanalysis of Two Password-Authenticated Key Exchange Protocols

    3. Book Chapter

      Pages 176-187

      Analysis and Improvement of Micali’s Fair Contract Signing Protocol

  7. Digital Signatures (I)

    1. Book Chapter

      Pages 188-199

      Digital Signature Schemes with Domain Parameters

    2. Book Chapter

      Pages 200-211

      Generic Construction of Certificateless Signature

  8. Cryptosystems (I)

    1. Book Chapter

      Pages 212-223

      A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model

    2. Book Chapter

      Pages 224-235

      How to Re-use Round Function in Super-Pseudorandom Permutation

previous Page of 3