Information security and privacy [electronic resource] : 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13-15, 2004 : proceedings / Huaxiong Wang, Josef Pieprzyk, Vijay Varadharajan (eds.).
- Lecture notes in computer science, 3108
- Restrictions on Access:
- License restrictions may limit access.
- Machine generated contents note: Multi-service oriented broadcast encryption / Guang Gong / Shaoquan Jiang -- Secure and insecure modifications of the subset difference broadcast encryption scheme / Tomoyuki Asano -- Linear code implies public-key traitor tracing with revocation / Vu Dong To / Reihaneh Safavi-Naini -- TTS without revocation capability secure against CCA2 / Chong Hee Kim / Yong Ho Hwang / Pil Joong Lee -- Single database private information retrieval with logarithmic communication / Yan-Cheng Chang -- Information theoretically secure oblivious polynomial evaluation : model, bounds, and constructions / Goichiro Hanaoka / Hideki Imai / Joern Mueller-Quade / Anderson C. A. Nascimento / Akira Otsuka / Andreas Winter -- Optimistic fair exchange based on publicly verifiable secret sharing / Gildas Avoine / Serge Vaudenay -- NGSCB : a trusted open system / Marcus Peinado / Yuqun Chen / Paul England / John Manferdelli -- The Biryukoc-Demirci attack on reduced-round versions of IDEA and MESH ciphers / Jorge Nakahara, Jr. / Bart Preneel / Joos Vandewalle -- Differential-linear type attacks on reduced rounds of SHACAL-2 / Yongsup Shin / Jongsung Kim / Guil Kim / Seokhie Hong / Sangjin Lee -- The related-key rectangle attack - application to SHACAL-1 / Jongsung Kim / Guil Kim / Seokhie Hong / Sangjin Lee / Dowon Hong -- Related key differential cryptanalysis of full-round SPECTR-H64 and CIKS-1 / Youngdai Ko / Changhoon Lee / Seokhie Hong / Sangjin Lee -- The security of cryptosystems based on class semigroups of imaginary quadratic non-maximal orders / Michael J. Jacobson, Jr. -- Analysis of a conference scheme under active and passive attacks / Feng Bao -- Cryptanalysis of two password-authenticated key exchange protocols / Zhiguo Wan / Shuhong Wang -- Analysis and improvement of Micali's fair contract signing protocol / Feng Bao / Guilin Wang / Jianying Zhou / Huafei Zhu -- Digital signature schemes with domain parameters / Serge Vaudenay -- Generic construction of certificateless signature / Dae Hyun Yum / Pil Joong Lee -- A generalization of PGV-hash functions and security analysis in black-box model / Wonil Lee / Mridul Nandi / Palash Sarkar / Donghoon Chang / Sangjin Lee / Kouichi Sakurai -- How to re-use round function in super-pseudorandom permutation / Tetsu Iwata / Kaoru Kurosawa -- How to remove MAC from DHIES / Kaoru Kurosawa / Toshihiko Matsuo -- Symmetric key authentication services revisited / Bruno Crispo / Bogdan C. Popescu / Andrew S. Tanenbaum -- Improvements to the point halving algorithm / Brian King / Ben Rubin -- Theoretical analysis of XL over small fields / Bo-Yin Yang / Jiun-Ming Chen -- A new method for securing elliptic scalar multiplication against side-channel attacks / Chae Hoon Lim -- A mobile agent system providing offer privacy / Ming Yao / Matt Henricksen / Greg Maitland / Ernest Foo / Ed Dawson -- Identity-based strong designated verifier signature schemes / Willy Susilo / Fangguo Zhang / Yi Mu -- Linkable spontaneous anonymous group signature for ad hoc groups / Joseph K. Liu / Victor K. Wei / Duncan S. Wong -- A group signature scheme with efficient membership revocation for reasonable groups / Toru Nakanishi / Yuji Sugiyama -- Convertible nominative signatures / Zhenjie Huang / Yumin Wang -- Protocols with security proofs for mobile applications / Yiu Shing Terry Tin / Harikrishna Vasanta / Colin Boyd / Juan Manuel Gonzalez Nieto -- Secure bilinear Diffie-Hellman bits / Steven D. Galbraith / Herbie J. Hopkins / Igor E. Shparlinski -- Weak property of malleability in NTRUSign / SungJun Min / Go Yamamoto / Kwangjo Kim -- Information security risk assessment, aggregation, and mitigation / Arjen Lenstra / Tim Voss -- A weighted graph approach to authorization delegation and conflict resolution / Chun Ruan / Vijay Varadharajan -- Authorization mechanisms for virtual organizations in distributed computing systems / Xi-Bin Zhao / Kwok-Yan Lam / Siu-Leung Chung / Ming Gu / Jia-Guang Sun -- Unconditionally secure encryption under strong attacks / Luke McAven / Rei Safavi-Naini / Moti Yung -- ManTiCore : encryption with joint cipher-state authentication / Erik Anderson / Cheryl Beaver / Timothy Draelos / Richard Schroeppel / Mark Torgerson -- On security of XTR public key cryptosystems against side channel attacks / Dong-Guk Han / Jongin Lim / Kouichi Sakurai -- On the exact flexibility of the flexible countermeasure against side channel attacks / Katsuyuki Okeya / Tsuyoshi Takagi / Camille Vuillaume.
- 3540223797 (pbk.)
- Bibliography Note:
- Includes bibliographical references and index.
View MARC record | catkey: 7846746