Security and Cryptology

Information Security and Privacy

11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings

Editors: Batten, Lynn, Safavi-Naini, Reihaneh (Eds.)

Buy this book

eBook $99.00
price for USA in USD (gross)
  • ISBN 978-3-540-35459-8
  • Digitally watermarked, DRM-free
  • Included format: PDF
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover $129.00
price for USA in USD
  • ISBN 978-3-540-35458-1
  • Free shipping for individuals worldwide
  • Usually dispatched within 3 to 5 business days.
About this book

The 11th Australasian Conference on Information Security and Privacy (ACISP 2006) was held in Melbourne, 3–5 July, 2006. The conference was sponsored by Deakin University, the Research Network for a Secure Australia, and was organized in cooperation with the University of Wollongong. The conference brought together researchers,practitioners and a wide range of other users from academia, industries and government organizations. The program included 35 papers covering important aspects of information security technologies. The papers were selected from 133 submissions through a two-stage anonymous review process. Each paper received at least three reviews by members of the Program Committee, and was then scrutinized by the whole committee during a two-week discussion. There were 19 papers eligible for the “best student paper” award. The award was given to Yang Cui from the U- versity of Tokyo for the paper “Tag-KEM from Set Partial Domain One-Way Permutations. ” In addition to the regular papers the program also included three invited talks. Bart Preneel gave an invited talk entitled “Electronic Identity Cards: Threats and Opportunities. ” Mike Burmester’s talk was “Towards Provable - curity for Ubiquitous Applications. ” The details of the third talk had not been ?nalized at the time of publication of these proceedings. We wish to thank all the authors of submitted papers for providing the c- tent for the conference;their high-quality submissions madethe task of selecting a program very di?cult.

Table of contents (36 chapters)

  • Algebraic Attacks on Clock-Controlled Stream Ciphers

    Al-Hinai, Sultan (et al.)

    Pages 1-16

  • Cache Based Power Analysis Attacks on AES

    Fournier, Jacques (et al.)

    Pages 17-28

  • Distinguishing Attack on SOBER-128 with Linear Masking

    Cho, Joo Yeon (et al.)

    Pages 29-39

  • Evaluating the Resistance of Stream Ciphers with Linear Feedback Against Fast Algebraic Attacks

    Braeken, An (et al.)

    Pages 40-51

  • Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond

    Henricksen, Matt (et al.)

    Pages 52-63

Buy this book

eBook $99.00
price for USA in USD (gross)
  • ISBN 978-3-540-35459-8
  • Digitally watermarked, DRM-free
  • Included format: PDF
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover $129.00
price for USA in USD
  • ISBN 978-3-540-35458-1
  • Free shipping for individuals worldwide
  • Usually dispatched within 3 to 5 business days.
Loading...

Recommended for you

Loading...

Bibliographic Information

Bibliographic Information
Book Title
Information Security and Privacy
Book Subtitle
11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings
Editors
  • Lynn Batten
  • Reihaneh Safavi-Naini
Series Title
Security and Cryptology
Series Volume
4058
Copyright
2006
Publisher
Springer-Verlag Berlin Heidelberg
Copyright Holder
Springer-Verlag Berlin Heidelberg
eBook ISBN
978-3-540-35459-8
DOI
10.1007/11780656
Softcover ISBN
978-3-540-35458-1
Edition Number
1
Number of Pages
XII, 446
Topics