Information Security and Privacy : 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings

2013 
Analysing the IOBC authenticated encryption mode.- A Chosen IV Related Key Attack on Grain.- Cryptanalysis of Helix and Phelix Revisited.- Toward Separating the Strong Adaptive Pseudo-Freeness from the Strong RSA Assumption.- Minkowski sum based lattice construction for multivariate simultaneous.- Coppersmith's technique and applications to RSA.- Lattices and security proofs.- Adaptive Precision Floating Point LL.- Better Lattice Constructions for Solving Multivariate Linear Equations Modulo Unknown Divisors.- Key-Dependent Message Chosen-Ciphertext Security of the Cramer-Shoup Cryptosystem.- Black-Box Separations and their Adaptability to the Non-Uniform Model.- Injective Encodings to Elliptic Curves.- Membership Encryption and Its Applications.- Towards Privacy Preserving Mobile Internet Communications.- Count-min sketches for estimating password frequency with Hamming Distance.- Secret sharing.- A rational secret sharing protocol with unconditional security in the synchronous setting.- Secret Sharing Schemes with Conversion Protocol to Achieve Short Share-Size and Extendibility to Multiparty Computation.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    0
    References
    0
    Citations
    NaN
    KQI
    []