TY - BOOK AU - Boyd,Colin AU - Simpson,Leonie TI - Information Security and Privacy: 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings SN - 9783642390593 PY - 2013/// CY - Berlin, Heidelberg PB - Springer Berlin Heidelberg KW - Computer science KW - Computer security KW - Data encryption (Computer science) KW - Coding theory KW - Application software KW - Management information systems KW - E-commerce N1 - Analysing the IOBC authenticated encryption mode -- A Chosen IV Related Key Attack on Grain -- Cryptanalysis of Helix and Phelix Revisited -- Toward Separating the Strong Adaptive Pseudo-Freeness from the Strong RSA Assumption -- Minkowski sum based lattice construction for multivariate simultaneous -- Coppersmith's technique and applications to RSA -- Lattices and security proofs -- Adaptive Precision Floating Point LL -- Better Lattice Constructions for Solving Multivariate Linear Equations Modulo Unknown Divisors -- Key-Dependent Message Chosen-Ciphertext Security of the Cramer-Shoup Cryptosystem -- Black-Box Separations and their Adaptability to the Non-Uniform Model -- Injective Encodings to Elliptic Curves -- Membership Encryption and Its Applications -- Towards Privacy Preserving Mobile Internet Communications -- Count-min sketches for estimating password frequency with Hamming Distance -- Secret sharing -- A rational secret sharing protocol with unconditional security in the synchronous setting -- Secret Sharing Schemes with Conversion Protocol to Achieve Short Share-Size and Extendibility to Multiparty Computation UR - http://dx.doi.org/10.1007/978-3-642-39059-3 ER -