Skip to main content
  • Conference proceedings
  • © 2007

Information Security and Privacy

12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 4586)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ACISP: Australasian Conference on Information Security and Privacy

Conference proceedings info: ACISP 2007.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (33 papers)

  1. Front Matter

  2. Stream Ciphers

    1. An Analysis of the Hermes8 Stream Ciphers

      • Steve Babbage, Carlos Cid, Norbert Pramstaller, HÃ¥vard Raddum
      Pages 1-10
    2. On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks

      • Sultan Zayid Al-Hinai, Ed Dawson, Matt Henricksen, Leonie Simpson
      Pages 11-28
    3. Strengthening NLS Against Crossword Puzzle Attack

      • Debojyoti Bhattacharya, Debdeep Mukhopadhyay, Dhiman Saha, D. RoyChowdhury
      Pages 29-44
  3. Hashing

    1. A New Strategy for Finding a Differential Path of SHA-1

      • Jun Yajima, Yu Sasaki, Yusuke Naito, Terutoshi Iwasaki, Takeshi Shimoyama, Noboru Kunihiro et al.
      Pages 45-58
    2. Preimage Attack on the Parallel FFT-Hashing Function

      • Donghoon Chang, Moti Yung, Jaechul Sung, Seokhie Hong, Sangjin Lee
      Pages 59-67
    3. Second Preimages for Iterated Hash Functions and Their Implications on MACs

      • Norbert Pramstaller, Mario Lamberger, Vincent Rijmen
      Pages 68-81
    4. On Building Hash Functions from Multivariate Quadratic Equations

      • Olivier Billet, Matt J. B. Robshaw, Thomas Peyrin
      Pages 82-95
  4. Biometrics

    1. An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication

      • Julien Bringer, Hervé Chabanne, Malika Izabachène, David Pointcheval, Qiang Tang, Sébastien Zimmer
      Pages 96-106
    2. Soft Generation of Secure Biometric Keys

      • Jovan Dj. Golić, Madalina Baltatu
      Pages 107-121
  5. Cryptanalysis

    1. Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128

      • Kitae Jeong, Changhoon Lee, Jaechul Sung, Seokhie Hong, Jongin Lim
      Pages 143-157
    2. Analysis of the SMS4 Block Cipher

      • Fen Liu, Wen Ji, Lei Hu, Jintai Ding, Shuwang Lv, Andrei Pyshkin et al.
      Pages 158-170
    3. Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme

      • Yongdong Wu, Feng Bao, Robert H. Deng
      Pages 171-183
  6. Public Key Cryptography

    1. \(\mathcal{TCH}o\): A Hardware-Oriented Trapdoor Cipher

      • Jean-Philippe Aumasson, Matthieu Finiasz, Willi Meier, Serge Vaudenay
      Pages 184-199
    2. Anonymity on Paillier’s Trap-Door Permutation

      • Ryotaro Hayashi, Keisuke Tanaka
      Pages 200-214
    3. Generic Certificateless Key Encapsulation Mechanism

      • Qiong Huang, Duncan S. Wong
      Pages 215-229
    4. Double-Size Bipartite Modular Multiplication

      • Masayuki Yoshino, Katsuyuki Okeya, Camille Vuillaume
      Pages 230-244
    5. Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography

      • Erik Dahmen, Katsuyuki Okeya, Daniel Schepers
      Pages 245-258

Other Volumes

  1. Information Security and Privacy

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access