Skip to main content
  • Conference proceedings
  • © 2013

Information Security and Privacy

18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013, Proceedings

  • Fast track conference proceedings
  • State of the art research
  • Up to date results

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7959)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ACISP: Australasian Conference on Information Security and Privacy

Conference proceedings info: ACISP 2013.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (30 papers)

  1. Front Matter

  2. Cryptanalysis I

    1. A Chosen IV Related Key Attack on Grain-128a

      • Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar, Turan Meltem Sönmez
      Pages 13-26
    2. Cryptanalysis of Helix and Phelix Revisited

      • Zhenqing Shi, Bin Zhang, Dengguo Feng
      Pages 27-40
  3. Lattices and Security Proofs

    1. Adaptive Precision Floating Point LLL

      • Thomas Plantard, Willy Susilo, Zhenfei Zhang
      Pages 104-117
    2. Key-Dependent Message Chosen-Ciphertext Security of the Cramer-Shoup Cryptosystem

      • Baodong Qin, Shengli Liu, Zhengan Huang
      Pages 136-151
  4. Public Key Cryptography

    1. Attribute-Based Identification: Definitions and Efficient Constructions

      • Hiroaki Anada, Seiko Arita, Sari Handa, Yosuke Iwabuchi
      Pages 168-186
    2. Relations among Privacy Notions for Signcryption and Key Invisible “Sign-then-Encrypt”

      • Yang Wang, Mark Manulis, Man Ho Au, Willy Susilo
      Pages 187-202
    3. Injective Encodings to Elliptic Curves

      • Pierre-Alain Fouque, Antoine Joux, Mehdi Tibouchi
      Pages 203-218
    4. Membership Encryption and Its Applications

      • Fuchun Guo, Yi Mu, Willy Susilo, Vijay Varadharajan
      Pages 219-234
  5. Hashing

    1. Improved Boomerang Attacks on SM3

      • Dongxia Bai, Hongbo Yu, Gaoli Wang, Xiaoyun Wang
      Pages 251-266
  6. Invited Talk

  7. Cryptanalysis II

    1. Related-Key Boomerang Attacks on KATAN32/48/64

      • Takanori Isobe, Yu Sasaki, Jiageng Chen
      Pages 268-285

Other Volumes

  1. Information Security and Privacy

About this book

This book constitutes the refereed conference proceedings of the 18th Australasian Conference on Information Security and Privacy, ACISP 2013, held in Brisbane, Australia, in July 2013. The 28 revised full papers presented were carefully selected from 78 submissions. Conference papers are organized in technical sessions, covering topics of Cryptanalysis, RSA, Lattices and Security Proofs, Public Key Cryptography, Hashing, Signatures, Passwords, Mobile Security, and Secret Sharing.

Editors and Affiliations

  • Queensland University of Technology, Brisbane, Australia

    Colin Boyd, Leonie Simpson

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access