Skip to main content
  • Conference proceedings
  • © 2014

Information Security and Privacy

19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 8544)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ACISP: Australasian Conference on Information Security and Privacy

Conference proceedings info: ACISP 2014.

Buying options

eBook USD 59.99
Price excludes VAT (USA)
  • ISBN: 978-3-319-08344-5
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 79.99
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (32 papers)

  1. Front Matter

  2. Cryptographic Protocols

    1. Strongly Simulation-Extractable Leakage-Resilient NIZK

      • Yuyu Wang, Keisuke Tanaka
      Pages 66-81
    2. A Secure Three-Party Computational Protocol for Triangle Area

      • Liang Liu, Xiaofeng Chen, Wenjing Lou
      Pages 82-97
    3. TMDS: Thin-Model Data Sharing Scheme Supporting Keyword Search in Cloud Storage

      • Zheli Liu, Jin Li, Xiaofeng Chen, Jun Yang, Chunfu Jia
      Pages 115-130
  3. Cryptanalysis

    1. Low Data Complexity Inversion Attacks on Stream Ciphers via Truncated Compressed Preimage Sets

      • Xiao Zhong, Mingsheng Wang, Bin Zhang, Shengbao Wu
      Pages 131-147
    2. Further Research on N-1 Attack against Exponentiation Algorithms

      • Zhaojing Ding, Wei Guo, Liangjian Su, Jizeng Wei, Haihua Gu
      Pages 162-175
    3. Cryptanalysis of RSA with Multiple Small Secret Exponents

      • Atsushi Takayasu, Noboru Kunihiro
      Pages 176-191
  4. Fine-grain Cryptographic Protocols

    1. Incrementally Executable Signcryptions

      • Dan Yamamoto, Hisayoshi Sato, Yasuko Fukuzawa
      Pages 226-241
    2. Hierarchical Identity-Based Broadcast Encryption

      • Weiran Liu, Jianwei Liu, Qianhong Wu, Bo Qin
      Pages 242-257
  5. Key Exchange

    1. Continuous After-the-Fact Leakage-Resilient Key Exchange

      • Janaka Alawatugoda, Colin Boyd, Douglas Stebila
      Pages 258-273
  6. Fundamentals

    1. On the Impossibility of Proving Security of Strong-RSA Signatures via the RSA Assumption

      • Masayuki Fukumitsu, Shingo Hasegawa, Shuji Isobe, Hiroki Shizuya
      Pages 290-305

Other Volumes

  1. Information Security and Privacy

    19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings

About this book

This book constitutes the refereed conference proceedings of the 19th Australasian Conference on Information Security and Privacy, ACISP 2014, held in Wollongong, NSW, Australia, in July 2014. The 26 revised full papers and 6 short papers presented in this volume were carefully selected from 91 submissions. The papers are organized in topical sections on cryptanalysis; cryptographic protocols; fine-grain cryptographic protocols; key exchange, fundamentals, lattices and homomorphic encryption, and applications.

Keywords

  • RSA
  • block and stream ciphers
  • cryptanalysis and other attacks
  • cryptographic applications
  • cryptographic protocols
  • cryptographic theory
  • cryptography
  • digital signatures
  • formal methods and theory of security
  • homomorphic encryption
  • information security
  • key exchange protocols
  • lattices
  • mobile security
  • security services
  • signcryption

Editors and Affiliations

  • Centre for Computer and Information Security Research, School of Computer Science and Software Engineering, University of Wollongong, Wollongong, Australia

    Willy Susilo, Yi Mu

Bibliographic Information

  • Book Title: Information Security and Privacy

  • Book Subtitle: 19th Australasian Conference, ACISP 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings

  • Editors: Willy Susilo, Yi Mu

  • Series Title: Lecture Notes in Computer Science

  • DOI: https://doi.org/10.1007/978-3-319-08344-5

  • Publisher: Springer Cham

  • eBook Packages: Computer Science, Computer Science (R0)

  • Copyright Information: Springer International Publishing Switzerland 2014

  • Softcover ISBN: 978-3-319-08343-8

  • eBook ISBN: 978-3-319-08344-5

  • Series ISSN: 0302-9743

  • Series E-ISSN: 1611-3349

  • Edition Number: 1

  • Number of Pages: XIV, 464

  • Number of Illustrations: 61 b/w illustrations

  • Topics: Data and Information Security, Cryptology, IT Operations

Buying options

eBook USD 59.99
Price excludes VAT (USA)
  • ISBN: 978-3-319-08344-5
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 79.99
Price excludes VAT (USA)