Information Security and Privacy 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings / [electronic resource] :
edited by Colin Boyd, Leonie Simpson.
- Berlin, Heidelberg : Springer Berlin Heidelberg, 2013.
- 1 online resource (XII, 437 p. 70 ill.)
- Lecture Notes in Computer Science, 7959 0302-9743 ; .
Analysing the IOBC authenticated encryption mode -- A Chosen IV Related Key Attack on Grain -- Cryptanalysis of Helix and Phelix Revisited -- Toward Separating the Strong Adaptive Pseudo-Freeness from the Strong RSA Assumption -- Minkowski sum based lattice construction for multivariate simultaneous -- Coppersmith's technique and applications to RSA -- Lattices and security proofs -- Adaptive Precision Floating Point LL -- Better Lattice Constructions for Solving Multivariate Linear Equations Modulo Unknown Divisors -- Key-Dependent Message Chosen-Ciphertext Security of the Cramer-Shoup Cryptosystem -- Black-Box Separations and their Adaptability to the Non-Uniform Model -- Injective Encodings to Elliptic Curves -- Membership Encryption and Its Applications -- Towards Privacy Preserving Mobile Internet Communications -- Count-min sketches for estimating password frequency with Hamming Distance -- Secret sharing -- A rational secret sharing protocol with unconditional security in the synchronous setting -- Secret Sharing Schemes with Conversion Protocol to Achieve Short Share-Size and Extendibility to Multiparty Computation.
9783642390593
Computer science. Computer security. Data encryption (Computer science). Coding theory. Application software. Management information systems. E-commerce.