Skip to main content
  • Conference proceedings
  • © 2007

Information Security and Privacy

12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4586)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ACISP: Australasian Conference on Information Security and Privacy

Conference proceedings info: ACISP 2007.

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

This is a preview of subscription content, access via your institution.

Table of contents (33 papers)

  1. Front Matter

  2. Stream Ciphers

    1. An Analysis of the Hermes8 Stream Ciphers

      • Steve Babbage, Carlos Cid, Norbert Pramstaller, HÃ¥vard Raddum
      Pages 1-10
    2. On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks

      • Sultan Zayid Al-Hinai, Ed Dawson, Matt Henricksen, Leonie Simpson
      Pages 11-28
    3. Strengthening NLS Against Crossword Puzzle Attack

      • Debojyoti Bhattacharya, Debdeep Mukhopadhyay, Dhiman Saha, D. RoyChowdhury
      Pages 29-44
  3. Hashing

    1. A New Strategy for Finding a Differential Path of SHA-1

      • Jun Yajima, Yu Sasaki, Yusuke Naito, Terutoshi Iwasaki, Takeshi Shimoyama, Noboru Kunihiro et al.
      Pages 45-58
    2. Preimage Attack on the Parallel FFT-Hashing Function

      • Donghoon Chang, Moti Yung, Jaechul Sung, Seokhie Hong, Sangjin Lee
      Pages 59-67
    3. Second Preimages for Iterated Hash Functions and Their Implications on MACs

      • Norbert Pramstaller, Mario Lamberger, Vincent Rijmen
      Pages 68-81
    4. On Building Hash Functions from Multivariate Quadratic Equations

      • Olivier Billet, Matt J. B. Robshaw, Thomas Peyrin
      Pages 82-95
  4. Biometrics

    1. An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication

      • Julien Bringer, Hervé Chabanne, Malika Izabachène, David Pointcheval, Qiang Tang, Sébastien Zimmer
      Pages 96-106
    2. Soft Generation of Secure Biometric Keys

      • Jovan Dj. Golić, Madalina Baltatu
      Pages 107-121
  5. Cryptanalysis

    1. Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128

      • Kitae Jeong, Changhoon Lee, Jaechul Sung, Seokhie Hong, Jongin Lim
      Pages 143-157
    2. Analysis of the SMS4 Block Cipher

      • Fen Liu, Wen Ji, Lei Hu, Jintai Ding, Shuwang Lv, Andrei Pyshkin et al.
      Pages 158-170
    3. Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme

      • Yongdong Wu, Feng Bao, Robert H. Deng
      Pages 171-183
  6. Public Key Cryptography

    1. \(\mathcal{TCH}o\): A Hardware-Oriented Trapdoor Cipher

      • Jean-Philippe Aumasson, Matthieu Finiasz, Willi Meier, Serge Vaudenay
      Pages 184-199
    2. Anonymity on Paillier’s Trap-Door Permutation

      • Ryotaro Hayashi, Keisuke Tanaka
      Pages 200-214
    3. Generic Certificateless Key Encapsulation Mechanism

      • Qiong Huang, Duncan S. Wong
      Pages 215-229
    4. Double-Size Bipartite Modular Multiplication

      • Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume
      Pages 230-244
    5. Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography

      • Erik Dahmen, Katsuyuki Okeya, Daniel Schepers
      Pages 245-258

Other Volumes

  1. Information Security and Privacy

Keywords

  • Information
  • Signatur
  • anonymity
  • authentication
  • bilinear pairings
  • biometrics
  • block ciphers
  • communication
  • cryptanalysis
  • cryptographic attacks
  • cryptographic hash function
  • data security
  • networks
  • privacy
  • security
  • algorithm analysis and problem complexity

Bibliographic Information

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions