CYBER DEAL: 50% off all Springer eBooks | Get this offer!

Security and Cryptology

Information Security and Privacy

11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings

Editors: Batten, Lynn, Safavi-Naini, Reihaneh (Eds.)

Free Preview

Buy this book

eBook $99.00
price for USA in USD
  • ISBN 978-3-540-35459-8
  • Digitally watermarked, DRM-free
  • Included format: PDF
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover $129.00
price for USA in USD
About this book

The 11th Australasian Conference on Information Security and Privacy (ACISP 2006) was held in Melbourne, 3–5 July, 2006. The conference was sponsored by Deakin University, the Research Network for a Secure Australia, and was organized in cooperation with the University of Wollongong. The conference brought together researchers,practitioners and a wide range of other users from academia, industries and government organizations. The program included 35 papers covering important aspects of information security technologies. The papers were selected from 133 submissions through a two-stage anonymous review process. Each paper received at least three reviews by members of the Program Committee, and was then scrutinized by the whole committee during a two-week discussion. There were 19 papers eligible for the “best student paper” award. The award was given to Yang Cui from the U- versity of Tokyo for the paper “Tag-KEM from Set Partial Domain One-Way Permutations. ” In addition to the regular papers the program also included three invited talks. Bart Preneel gave an invited talk entitled “Electronic Identity Cards: Threats and Opportunities. ” Mike Burmester’s talk was “Towards Provable - curity for Ubiquitous Applications. ” The details of the third talk had not been ?nalized at the time of publication of these proceedings. We wish to thank all the authors of submitted papers for providing the c- tent for the conference;their high-quality submissions madethe task of selecting a program very di?cult.

Table of contents (36 chapters)

Table of contents (36 chapters)
  • Algebraic Attacks on Clock-Controlled Stream Ciphers

    Pages 1-16

    Al-Hinai, Sultan (et al.)

  • Cache Based Power Analysis Attacks on AES

    Pages 17-28

    Fournier, Jacques (et al.)

  • Distinguishing Attack on SOBER-128 with Linear Masking

    Pages 29-39

    Cho, Joo Yeon (et al.)

  • Evaluating the Resistance of Stream Ciphers with Linear Feedback Against Fast Algebraic Attacks

    Pages 40-51

    Braeken, An (et al.)

  • Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond

    Pages 52-63

    Henricksen, Matt (et al.)

Buy this book

eBook $99.00
price for USA in USD
  • ISBN 978-3-540-35459-8
  • Digitally watermarked, DRM-free
  • Included format: PDF
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover $129.00
price for USA in USD
Loading...

Recommended for you

Loading...

Bibliographic Information

Bibliographic Information
Book Title
Information Security and Privacy
Book Subtitle
11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings
Editors
  • Lynn Batten
  • Reihaneh Safavi-Naini
Series Title
Security and Cryptology
Series Volume
4058
Copyright
2006
Publisher
Springer-Verlag Berlin Heidelberg
Copyright Holder
Springer-Verlag Berlin Heidelberg
eBook ISBN
978-3-540-35459-8
DOI
10.1007/11780656
Softcover ISBN
978-3-540-35458-1
Edition Number
1
Number of Pages
XII, 446
Topics