Information Security and Privacy [electronic resource] : 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings / edited by Colin Boyd, Leonie Simpson.
Record details
- ISBN: 9783642390593
- Physical Description: XII, 437 p. 70 illus. online resource.
- Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : 2013.
Search for related items by subject
Search for related items by series
Other Formats and Editions
Electronic resources
Analysing the IOBC authenticated encryption mode | ||
A Chosen IV Related Key Attack on Grain | ||
Cryptanalysis of Helix and Phelix Revisited | ||
Toward Separating the Strong Adaptive Pseudo-Freeness from the Strong RSA Assumption | ||
Minkowski sum based lattice construction for multivariate simultaneous | ||
Coppersmith's technique and applications to RSA | ||
Lattices and security proofs | ||
Adaptive Precision Floating Point LL | ||
Better Lattice Constructions for Solving Multivariate Linear Equations Modulo Unknown Divisors | ||
Key-Dependent Message Chosen-Ciphertext Security of the Cramer-Shoup Cryptosystem | ||
Black-Box Separations and their Adaptability to the Non-Uniform Model | ||
Injective Encodings to Elliptic Curves | ||
Membership Encryption and Its Applications | ||
Towards Privacy Preserving Mobile Internet Communications | ||
Count-min sketches for estimating password frequency with Hamming Distance | ||
Secret sharing | ||
A rational secret sharing protocol with unconditional security in the synchronous setting | ||
Secret Sharing Schemes with Conversion Protocol to Achieve Short Share-Size and Extendibility to Multiparty Computation. |