Skip to main content
  • Conference proceedings
  • © 2010

Information Security and Privacy

15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 6168)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ACISP: Australasian Conference on Information Security and Privacy

Conference proceedings info: ACISP 2010.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (24 papers)

  1. Front Matter

  2. Symmetric Key Encryption

    1. Cryptanalysis of a Generalized Unbalanced Feistel Network Structure

      • Ruilin Li, Bing Sun, Chao Li, Longjiang Qu
      Pages 1-18
    2. On Multidimensional Linear Cryptanalysis

      • Phuong Ha Nguyen, Lei Wei, Huaxiong Wang, San Ling
      Pages 37-52
    3. Side-Channel Analysis of the K2 Stream Cipher

      • Matt Henricksen, Wun She Yap, Chee Hoo Yian, Shinsaku Kiyomoto, Toshiaki Tanaka
      Pages 53-73
    4. On Unbiased Linear Approximations

      • Jonathan Etrog, Matthew J. B. Robshaw
      Pages 74-86
  3. Hash Functions

    1. Distinguishers for the Compression Function and Output Transformation of Hamsi-256

      • Jean-Philippe Aumasson, Emilia Käsper, Lars Ramkilde Knudsen, Krystian Matusiewicz, Rune ØdegÃ¥rd, Thomas Peyrin et al.
      Pages 87-103
    2. Second-Preimage Analysis of Reduced SHA-1

      • Christian Rechberger
      Pages 104-116
    3. Some Observations on Indifferentiability

      • Ewan Fleischmann, Michael Gorski, Stefan Lucks
      Pages 117-134
  4. Public Key Cryptography

    1. Adaptive and Composable Non-committing Encryptions

      • Huafei Zhu, Tadashi Araragi, Takashi Nishide, Kouichi Sakurai
      Pages 135-144
    2. Strong Knowledge Extractors for Public-Key Encryption Schemes

      • Manuel Barbosa, Pooya Farshim
      Pages 164-181
    3. A Multi-trapdoor Commitment Scheme from the RSA Assumption

      • Ryo Nishimaki, Eiichiro Fujisaki, Keisuke Tanaka
      Pages 182-199
    4. Identity-Based Chameleon Hash Scheme without Key Exposure

      • Xiaofeng Chen, Fangguo Zhang, Willy Susilo, Haibo Tian, Jin Li, Kwangjo Kim
      Pages 200-215
    5. The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key

      • Jun Shao, Min Feng, Bin Zhu, Zhenfu Cao, Peng Liu
      Pages 216-232
    6. Security Estimates for Quadratic Field Based Cryptosystems

      • Jean-François Biasse, Michael J. Jacobson Jr., Alan K. Silvester
      Pages 233-247
    7. Solving Generalized Small Inverse Problems

      • Noboru Kunihiro
      Pages 248-263
  5. Protocols

    1. One-Time-Password-Authenticated Key Exchange

      • Kenneth G. Paterson, Douglas Stebila
      Pages 264-281
    2. Predicate-Based Key Exchange

      • James Birkett, Douglas Stebila
      Pages 282-299
    3. Attribute-Based Authenticated Key Exchange

      • M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto
      Pages 300-317

Other Volumes

  1. Information Security and Privacy

Editors and Affiliations

  • Department of Computing, Macquarie University,, North Ryde, Australia

    Ron Steinfeld

  • Qualcomm Incorporated, Sydney, Australia

    Philip Hawkes

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access