Skip to main content
  • Conference proceedings
  • © 2010

Information Security and Privacy

15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010, Proceedings

Editors:

(view affiliations)

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6168)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ACISP: Australasian Conference on Information Security and Privacy

Conference proceedings info: ACISP 2010.

Buying options

eBook
USD 99.00
Price excludes VAT (USA)
  • ISBN: 978-3-642-14081-5
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout

This is a preview of subscription content, access via your institution.

Table of contents (24 papers)

  1. Front Matter

  2. Symmetric Key Encryption

    1. Cryptanalysis of a Generalized Unbalanced Feistel Network Structure

      • Ruilin Li, Bing Sun, Chao Li, Longjiang Qu
      Pages 1-18
    2. On Multidimensional Linear Cryptanalysis

      • Phuong Ha Nguyen, Lei Wei, Huaxiong Wang, San Ling
      Pages 37-52
    3. Side-Channel Analysis of the K2 Stream Cipher

      • Matt Henricksen, Wun She Yap, Chee Hoo Yian, Shinsaku Kiyomoto, Toshiaki Tanaka
      Pages 53-73
    4. On Unbiased Linear Approximations

      • Jonathan Etrog, Matthew J. B. Robshaw
      Pages 74-86
  3. Hash Functions

    1. Distinguishers for the Compression Function and Output Transformation of Hamsi-256

      • Jean-Philippe Aumasson, Emilia Käsper, Lars Ramkilde Knudsen, Krystian Matusiewicz, Rune Ødegård, Thomas Peyrin et al.
      Pages 87-103
    2. Second-Preimage Analysis of Reduced SHA-1

      • Christian Rechberger
      Pages 104-116
    3. Some Observations on Indifferentiability

      • Ewan Fleischmann, Michael Gorski, Stefan Lucks
      Pages 117-134
  4. Public Key Cryptography

    1. Adaptive and Composable Non-committing Encryptions

      • Huafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai
      Pages 135-144
    2. Strong Knowledge Extractors for Public-Key Encryption Schemes

      • Manuel Barbosa, Pooya Farshim
      Pages 164-181
    3. A Multi-trapdoor Commitment Scheme from the RSA Assumption

      • Ryo Nishimaki, Eiichiro Fujisaki, Keisuke Tanaka
      Pages 182-199
    4. Identity-Based Chameleon Hash Scheme without Key Exposure

      • Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Haibo Tian, Jin Li, Kwangjo Kim
      Pages 200-215
    5. The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key

      • Jun Shao, Min Feng, Bin Zhu, Zhenfu Cao, Peng Liu
      Pages 216-232
    6. Security Estimates for Quadratic Field Based Cryptosystems

      • Jean-François Biasse, Michael J. Jacobson Jr., Alan K. Silvester
      Pages 233-247
    7. Solving Generalized Small Inverse Problems

      • Noboru Kunihiro
      Pages 248-263
  5. Protocols

    1. One-Time-Password-Authenticated Key Exchange

      • Kenneth G. Paterson, Douglas Stebila
      Pages 264-281
    2. Predicate-Based Key Exchange

      • James Birkett, Douglas Stebila
      Pages 282-299
    3. Attribute-Based Authenticated Key Exchange

      • M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto
      Pages 300-317

Other Volumes

  1. Information Security and Privacy

    15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010. Proceedings

Keywords

  • Partition
  • calculus
  • classification
  • combinatorics
  • cryptanalysis
  • cryptography
  • cryptosystems
  • differential Probability
  • finite fields
  • hash function
  • insecure systems
  • key encryption
  • network security
  • proxy-reencryption
  • scrambling algorithm
  • algorithm analysis and problem complexity

Editors and Affiliations

  • Department of Computing, Macquarie University,, North Ryde, Australia

    Ron Steinfeld

  • Qualcomm Incorporated, Sydney, Australia

    Philip Hawkes

Bibliographic Information

Buying options

eBook
USD 99.00
Price excludes VAT (USA)
  • ISBN: 978-3-642-14081-5
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout