Information Security and Privacy

14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings

  • Colin Boyd
  • Juan González Nieto
Conference proceedings ACISP 2009

Part of the Lecture Notes in Computer Science book series (LNCS, volume 5594)

Table of contents

  1. Front Matter
  2. Invited Lecture

    1. Basie von Solms
      Pages 1-7
  3. Network Security

    1. Christian Seifert, Vipul Delwadia, Peter Komisarczuk, David Stirling, Ian Welch
      Pages 8-25
    2. Dang Vinh Pham, Dogan Kesdogan
      Pages 26-43
    3. Irfan Ahmed, Kyung-suk Lhee, Hyunjung Shin, ManPyo Hong
      Pages 44-59
  4. Symmetric Key Encryption

    1. Ewan Fleischmann, Michael Gorski, Stefan Lucks
      Pages 60-72
    2. Jiali Choy, Guanhan Chew, Khoongming Khoo, Huihui Yap
      Pages 73-89
    3. Onur Özen, Kerem Varıcı, Cihangir Tezcan, Çelebi Kocair
      Pages 90-107
    4. Leonie Simpson, Matt Henricksen, Wun-She Yap
      Pages 108-121
    5. Serdar Boztaş, Simon J. Puglisi, Andrew Turpin
      Pages 122-133
    6. Atsuko Miyaji, Masahiro Sukegawa
      Pages 134-152
  5. Hash Functions

    1. Mohammad Reza Reyhanitabar, Willy Susilo, Yi Mu
      Pages 153-170
    2. Jean-Philippe Aumasson, Eric Brier, Willi Meier, María Naya-Plasencia, Thomas Peyrin
      Pages 202-213
    3. Akira Numayama, Keisuke Tanaka
      Pages 232-248
  6. Invited Lecture

  7. Public Key Cryptography

    1. Ahto Buldas, Aivo Jürgenson, Margus Niitsoo
      Pages 264-275
    2. Kenneth G. Paterson, Sriramkrishnan Srinivasan
      Pages 276-292
    3. Harunaga Hiwatari, Keisuke Tanaka, Tomoyuki Asano, Koichi Sakumoto
      Pages 293-308
    4. Jeongdae Hong, Jinil Kim, Jihye Kim, Matthew K. Franklin, Kunsoo Park
      Pages 309-326
    5. Cheng-Kang Chu, Jian Weng, Sherman S. M. Chow, Jianying Zhou, Robert H. Deng
      Pages 327-342
    6. Toshihide Matsuda, Ryo Nishimaki, Akira Numayama, Keisuke Tanaka
      Pages 343-359
  8. Protocols

    1. Jiang Wu, Douglas R. Stinson
      Pages 360-376
    2. K. Y. Cheong, Takeshi Koshiba, Shohei Nishiyama
      Pages 377-388
    3. Douglas Stebila, Berkant Ustaoglu
      Pages 389-406
    4. Douglas Wikström
      Pages 407-421
  9. Implementation

    1. Michael Tunstall
      Pages 437-451
    2. Huseyin Hisil, Kenneth Koon-Ho Wong, Gary Carter, Ed Dawson
      Pages 452-468
  10. Back Matter

About these proceedings


This book constitutes the refereed proceedings of the 14th Australasian Conference on Information Security and Privacy, ACISP 2009, held in Brisbane, Australia, during July 1-3, 2009.

The 29 revised full papers presented together with two invited talks were carefully reviewed and selected from 106 submissions. The papers are organized in topical sections on network security, symmetric key encryption, hash functions, public key cryptography, protocols, and implementation.


AES block ciphers broadcast encryption cluster analysis collision resistant common scrambling algorithm cryptanalysis cryptographic attacks cryptography cryptosystems data security differential attack differential probability network security privacy

Editors and affiliations

  • Colin Boyd
    • 1
  • Juan González Nieto
    • 2
  1. 1.Information Security InstituteQueensland University of TechnologyBrisbaneAustralia
  2. 2.Information Security InstituteQueensland Univ. of TechnologyBrisbaneAustralia

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2009
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-02619-5
  • Online ISBN 978-3-642-02620-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site