Skip to main content
  • Conference proceedings
  • © 2012

Information Security and Privacy

17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings

  • Up to date results
  • Tast track conference proceedings
  • State of the art research

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 7372)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): ACISP: Australasian Conference on Information Security and Privacy

Conference proceedings info: ACISP 2012.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (35 papers)

  1. Front Matter

  2. Fundamentals

    1. Optimal Bounds for Multi-Prime Φ-Hiding Assumption

      • Kaori Tosu, Noboru Kunihiro
      Pages 1-14
    2. Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchange

      • Atsushi Fujioka, Mark Manulis, Koutarou Suzuki, Berkant UstaoÄŸlu
      Pages 15-28
    3. A Game-Theoretic Perspective on Oblivious Transfer

      • Haruna Higo, Keisuke Tanaka, Akihiro Yamada, Kenji Yasunaga
      Pages 29-42
  3. Cryptanalysis

    1. Improved Known-Key Distinguishers on Feistel-SP Ciphers and Application to Camellia

      • Yu Sasaki, Sareh Emami, Deukjo Hong, Ashish Kumar
      Pages 87-100
    2. Low Data Complexity Attack on Reduced Camellia-256

      • Jiazhe Chen, Leibo Li
      Pages 101-114
    3. Cryptanalysis of RSA with a Small Parameter

      • Xianmeng Meng, Xuexin Zheng
      Pages 115-123
    4. An Algebraic Broadcast Attack against NTRU

      • Jintai Ding, Yanbin Pan, Yingpu Deng
      Pages 124-137
  4. Message Authentication Codes and Hash Functions

    1. Analysis of Indirect Message Injection for MAC Generation Using Stream Ciphers

      • Mufeed ALMashrafi, Harry Bartlett, Leonie Simpson, Ed Dawson, Kenneth Koon-Ho Wong
      Pages 138-151
    2. Weimar-DM: A Highly Secure Double-Length Compression Function

      • Ewan Fleischmann, Christian Forler, Stefan Lucks, Jakob Wenzel
      Pages 152-165
  5. Public Key Cryptography

    1. An Efficient IND-CCA2 Secure Variant of the Niederreiter Encryption Scheme in the Standard Model

      • K. Preetha Mathew, Sachin Vasant, Sridhar Venkatesan, C. Pandu Rangan
      Pages 166-179
    2. Zero-Knowledge Protocols for the McEliece Encryption

      • Kirill Morozov, Tsuyoshi Takagi
      Pages 180-193
    3. Effort-Release Public-Key Encryption from Cryptographic Puzzles

      • Jothi Rangasamy, Douglas Stebila, Colin Boyd, Juan Manuel González-Nieto, Lakshmi Kuppusamy
      Pages 194-207
    4. Leakage-Resilience of Stateless/Stateful Public-Key Encryption from Hash Proofs

      • Manh Ha Nguyen, Keisuke Tanaka, Kenji Yasunaga
      Pages 208-222

Other Volumes

  1. Information Security and Privacy

About this book

This book constitutes the refereed proceedings of the 17th Australasian Conference on Information Security and Privacy, ACISP 2012, held in Wollongong, Australia, in July 2012. The 30 revised full papers presented together with 5 short papers were carefully reviewed and selected from 89 submissions. The papers are organized in topical sections on fundamentals; cryptanalysis; message authentication codes and hash functions; public key cryptography; digital signatures; identity-based and attribute-based cryptography; lattice-based cryptography; lightweight cryptography.

Editors and Affiliations

  • School of Computer Science and Software Engineering, University of Wollongong, Wollongong, Australia

    Willy Susilo, Yi Mu, Jennifer Seberry

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access