×

Found 67 Documents (Results 1–67)

Flaws in the initialisation process of stream ciphers. (English) Zbl 1382.94043

Daras, Nicholas J. (ed.) et al., Computation, cryptography, and network security. Cham: Springer (ISBN 978-3-319-18274-2/hbk; 978-3-319-18275-9/ebook). 19-49 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

BP-XACML an authorisation policy language for business processes. (English) Zbl 1368.94083

Foo, Ernest (ed.) et al., Information security and privacy. 20th Australasian conference, ACISP 2015, Brisbane, QLD, Australia, June 29 – July 1, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-19961-0/pbk; 978-3-319-19962-7/ebook). Lecture Notes in Computer Science 9144, 307-325 (2015).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI Link

Weaknesses in the initialisation process of the common scrambling algorithm stream cipher. (English) Zbl 1355.94031

Schmidt, Kai-Uwe (ed.) et al., Sequences and their applications – SETA 2014. 8th international conference, Melbourne, VIC, Australia, November 24–28, 2014. Proceedings. Cham: Springer (ISBN 978-3-319-12324-0/pbk; 978-3-319-12325-7/ebook). Lecture Notes in Computer Science 8865, 220-233 (2014).
MSC:  94A55 94A60
PDFBibTeX XMLCite
Full Text: DOI

A general model for MAC generation using direct injection. (English) Zbl 1311.94069

Kutyłowski, Mirosław (ed.) et al., Information security and cryptology. 8th international conference, Inscrypt 2012, Beijing, China, November 28–30, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-38518-6/pbk). Lecture Notes in Computer Science 7763, 198-215 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Topics in cryptology – CT-RSA 2013. The cryptographers’ track at the RSA conference 2013, San Francisco, CA, USA, February 25–March 1, 2013. Proceedings. (English) Zbl 1258.94003

Lecture Notes in Computer Science 7779. Berlin: Springer (ISBN 978-3-642-36094-7/pbk). xiii, 405 p. (2013).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Analysis of indirect message injection for MAC generation using stream ciphers. (English) Zbl 1305.94031

Susilo, Willy (ed.) et al., Information security and privacy. 17th Australasian conference, ACISP 2012, Wollongong, NSW, Australia, July 9–11, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-31447-6/pbk). Lecture Notes in Computer Science 7372, 138-151 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

A framework for security analysis of key derivation functions. (English) Zbl 1291.94166

Ryan, Mark D. (ed.) et al., Information security practice and experience. 8th international conference, ISPEC 2012, Hangzhou, China, April 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29100-5/pbk). Lecture Notes in Computer Science 7232, 199-216 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

State convergence in the initialisation of stream ciphers. (English) Zbl 1279.94118

Parampalli, Udaya (ed.) et al., Information security and privacy. 16th Australasian conference, ACISP 2011, Melbourne, Australia, July 11–13, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22496-6/pbk). Lecture Notes in Computer Science 6812, 75-88 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A model for constraint and delegation management. (English) Zbl 1305.68083

Bao, Feng (ed.) et al., Information security practice and experience. 7th international conference, ISPEC 2011, Guangzhou, China, May 30 – June 1, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-21030-3/pbk). Lecture Notes in Computer Science 6672, 362-371 (2011).
MSC:  68P25 68M14 94A62
PDFBibTeX XMLCite
Full Text: DOI Link

Linearity within the SMS4 block cipher. (English) Zbl 1281.94064

Bao, Feng (ed.) et al., Information security and cryptology. 5th international conference, Inscrypt 2009, Beijing, China, December 12-15, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-16341-8/pbk). Lecture Notes in Computer Science 6151, 248-265 (2010).
MSC:  94A60 94B25
PDFBibTeX XMLCite
Full Text: DOI Link

Jacobi quartic curves revisited. (English) Zbl 1284.94078

Boyd, Colin (ed.) et al., Information security and privacy. 14th Australasian conference, ACISP 2009, Brisbane, Australia, July 1–3, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-02619-5/pbk). Lecture Notes in Computer Science 5594, 452-468 (2009).
MSC:  94A60 14G50
PDFBibTeX XMLCite
Full Text: DOI

Twisted Edwards curves revisited. (English) Zbl 1206.94074

Pieprzyk, Josef (ed.), Advances in cryptology – ASIACRYPT 2008. 14th international conference on the theory and application of cryptology and information security, Melbourne, Australia, December 7–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89254-0/pbk). Lecture Notes in Computer Science 5350, 326-343 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Bit-pattern based integral attack. (English) Zbl 1154.94443

Nyberg, Kaisa (ed.), Fast software encryption. 15th international workshop, FSE 2008, Lausanne, Switzerland, February 10–13, 2008. Revised selected papers. Berlin: Springer (ISBN 978-3-540-71038-7/pbk). Lecture Notes in Computer Science 5086, 363-381 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Information security practice and experience. Third international conference, ISPEC 2007, Hong Kong, China, May 7–9, 2007. Proceedings. (English) Zbl 1158.68304

Lecture Notes in Computer Science 4464. Berlin: Springer (ISBN 978-3-540-72159-8/pbk). xiii, 361 p. (2007).
PDFBibTeX XMLCite
Full Text: DOI

On the security of the LILI family of stream ciphers against algebraic attacks. (English) Zbl 1213.94076

Pieprzyk, Josef (ed.) et al., Information security and privacy. 12th Australasian conference, ACISP 2007. Townsville, Australia, July 2–4, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-73457-4/pbk). Lecture Notes in Computer Science 4586, 11-28 (2007).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI Link

New formulae for efficient elliptic curve arithmetic. (English) Zbl 1153.94390

Srinathan, K. (ed.) et al., Progress in cryptology – INDOCRYPT 2007. 8th international conference on cryptology in India, Chennai, India, December 9–13, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-77025-1/pbk). Lecture Notes in Computer Science 4859, 138-151 (2007).
PDFBibTeX XMLCite
Full Text: DOI Link

Information security and privacy. 12th Australasian conference, ACISP 2007. Townsville, Australia, July 2–4, 2007. Proceedings. (English) Zbl 1119.94002

Lecture Notes in Computer Science 4586. Berlin: Springer (ISBN 978-3-540-73457-4/pbk). xiv, 476 p. (2007).
PDFBibTeX XMLCite
Full Text: DOI

Klein bottle routing: an alternative to onion routing and mix network. (English) Zbl 1272.94056

Rhee, Min Surp (ed.) et al., Information security and cryptology – ICISC 2006. 9th international conference, Busan, Korea, November 30–December 1, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-49112-5/pbk). Lecture Notes in Computer Science 4296, 296-309 (2006).
MSC:  94A60 68M12
PDFBibTeX XMLCite
Full Text: DOI Link

Rekeying issues in the MUGI stream cipher. (English) Zbl 1151.94516

Preneel, Bart (ed.) et al., Selected areas in cryptography. 12th international workshop, SAC 2005, Kingston, ON, Canada, August 11–12, 2005. Revised selected papers. Berlin: Springer (ISBN 978-3-540-33108-7/pbk). Lecture Notes in Computer Science 3897, 175-188 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A novel range test. (English) Zbl 1176.94057

Batten, Lynn Margaret (ed.) et al., Information security and privacy. 11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3–5, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-35458-1/pbk). Lecture Notes in Computer Science 4058, 247-258 (2006).
MSC:  94A60 94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI Link

Ensuring fast implementations of symmetric ciphers on the intel pentium 4 and beyond. (English) Zbl 1176.94042

Batten, Lynn Margaret (ed.) et al., Information security and privacy. 11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3–5, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-35458-1/pbk). Lecture Notes in Computer Science 4058, 52-63 (2006).
MSC:  94A60 94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI Link

Constructing secure hash functions by enhancing merkle-damgård construction. (English) Zbl 1176.94040

Batten, Lynn Margaret (ed.) et al., Information security and privacy. 11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3–5, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-35458-1/pbk). Lecture Notes in Computer Science 4058, 407-420 (2006).
MSC:  94A60 94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Implementation of extension field arithmetic with applications to torus-based cryptography. (English) Zbl 1101.11051

Dorfer, G. (ed.) et al., Proceedings of the 70th workshop on general algebra “70. Arbeitstagung Allgemeine Algebra”, Vienna, Austria, May 26–29, 2005. Klagenfurt: Verlag Johannes Heyn (ISBN 3-7084-0194-8/pbk). Contributions to General Algebra 17, 201-216 (2006).
PDFBibTeX XMLCite

Simple and efficient shuffling with provable correctness and ZK privacy. (English) Zbl 1145.94449

Shoup, Victor (ed.), Advances in cryptology – CRYPTO 2005. 25th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28114-2/pbk). Lecture Notes in Computer Science 3621, 188-204 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

An efficient and verifiable solution to the millionaire problem. (English) Zbl 1133.94332

Park, Choonsik (ed.) et al., Information security and cryptology – ICISC 2004. 7th international conference, Seoul, Korea, December 2–3, 2004. Revised Selected Papers. Berlin: Springer (ISBN 978-3-540-26226-8/pbk). Lecture Notes in Computer Science 3506, 51-66 (2005).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Dragon: A fast word based stream cipher. (English) Zbl 1133.68336

Park, Choonsik (ed.) et al., Information security and cryptology – ICISC 2004. 7th international conference, Seoul, Korea, December 2–3, 2004. Revised Selected Papers. Berlin: Springer (ISBN 978-3-540-26226-8/pbk). Lecture Notes in Computer Science 3506, 33-50 (2005).
MSC:  68P25 94A60 94A55
PDFBibTeX XMLCite
Full Text: DOI

A novel method to maintain privacy in mobile agent applications. (English) Zbl 1154.94428

Desmedt, Yvo G. (ed.) et al., Cryptology and network security. 4th international conference, CANS 2005, Xiamen, China, December 14–16, 2005. Proceedings. Berlin: Springer (ISBN 3-540-30849-0/pbk). Lecture Notes in Computer Science 3810, 247-260 (2005).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Ciphertext comparison, a new solution to the millionaire problem. (English) Zbl 1122.94396

Qing, Sihan (ed.) et al., Information and communications security. 7th international conference, ICICS 2005, Beijing, China, December 10–13, 2005. Proceedings. Berlin: Springer (ISBN 3-540-30934-9/pbk). Lecture Notes in Computer Science 3783, 84-96 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Optimization of electronic first-bid sealed-bid auction based on homomorphic secret sharing. (English) Zbl 1126.94338

Dawson, Ed (ed.) et al., Progress in cryptology – Mycrypt 2005. First international conference on cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28–30, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28938-0/pbk). Lecture Notes in Computer Science 3715, 84-98 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Progress in cryptology – Mycrypt 2005. First international conference on cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28–30, 2005. Proceedings. (English) Zbl 1089.94001

Lecture Notes in Computer Science 3715. Berlin: Springer (ISBN 3-540-28938-0/pbk). xi, 329 p. (2005).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

A correct, private, and efficient mix network. (English) Zbl 1198.94121

Bao, Feng (ed.) et al., Public key cryptography – PKC 2004. 7th international workshop on theory and practice in public key cryptography, Singapore, March 1–4, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21018-0/pbk). Lecture Notes in Computer Science 2947, 439-454 (2004).
MSC:  94A60 68M12 94A62
PDFBibTeX XMLCite
Full Text: DOI

A complete divide and conquer attack on the Alpha1 stream cipher. (English) Zbl 1092.94502

Lim, Jong In (ed.) et al., Information security and cryptology – ICISC 2003. 6th international conference, Seoul, Korea, November 27–28, 2003. Revised papers. Berlin: Springer (ISBN 3-540-21376-7/pbk). Lecture Notes in Computer Science 2971, 418-431 (2004).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Providing receipt-freeness in mixnet-based voting protocols. (English) Zbl 1092.68601

Lim, Jong In (ed.) et al., Information security and cryptology – ICISC 2003. 6th international conference, Seoul, Korea, November 27–28, 2003. Revised papers. Berlin: Springer (ISBN 3-540-21376-7/pbk). Lecture Notes in Computer Science 2971, 245-258 (2004).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Multiplicative homomorphic e-voting. (English) Zbl 1113.94318

Canteaut, Anne (ed.) et al., Progress in cryptology – INDOCRYPT 2004. 5th international conference on cryptology in India, Chennai, India, December 20-22, 2004. Berlin: Springer (ISBN 3-540-24130-2/pbk). Lecture Notes in Computer Science 3348, 61-72 (2004).
MSC:  94A60 91B12
PDFBibTeX XMLCite
Full Text: DOI

A mobile agent system providing offer privacy. (English) Zbl 1098.68927

Wang, Huaxiong (ed.) et al., Information security and privacy. 9th Australasian conference, ACISP 2004, Sydney, Australia, July 13–15, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22379-7/pbk). Lecture Notes in Computer Science 3108, 301-312 (2004).
MSC:  68T99 94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Batch verification for equality of discrete logarithms and threshold decryptions. (English) Zbl 1103.68506

Jakobsson, Markus (ed.) et al., Applied cryptography and network security. Second international conference, ACNS 2004, Yellow Mountain, China, June 8–11, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22217-0/pbk). Lecture Notes in Computer Science 3089, 494-508 (2004).
MSC:  68P25 94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

The security of fixed versus random elliptic curves in cryptography. (English) Zbl 1044.94530

Safavi-Naini, Rei (ed.) et al., Information security and privacy. 8th Australasian conference, ACISP 2003, Wollongong, Australia, July 9–11, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40515-1/pbk). Lect. Notes Comput. Sci. 2727, 55-66 (2003).
MSC:  94A60 11Y40 14G50
PDFBibTeX XMLCite
Full Text: Link

Non-interactive auction scheme with strong privacy. (English) Zbl 1031.94524

Lee, Pil Joong (ed.) et al., Information security and cryptology - ICISC 2002. 5th international conference, Seoul, Korea, November 28-29, 2002. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2587, 407-420 (2003).
MSC:  94A60 91B26 68P25
PDFBibTeX XMLCite
Full Text: Link

Robust, privacy protecting and publicly verifiable sealed-bid auction. (English) Zbl 1023.68565

Deng, Robert (ed.) et al., Information and communications security. 4th international conference, ICICS 2002, Singapore, December 9-12, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2513, 147-159 (2002).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: Link

Modelling trust structures for public key infrastructures. (English) Zbl 1020.94534

Batten, Lynn (ed.) et al., Information security and privacy. 7th Australasian conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2384, 56-70 (2002).
MSC:  94A62 68P25
PDFBibTeX XMLCite
Full Text: Link

The LILI-II keystream generator. (English) Zbl 1020.94514

Batten, Lynn (ed.) et al., Information security and privacy. 7th Australasian conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2384, 25-39 (2002).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: Link

A new design of privilege management infrastructure for organizations using outsourced PKI. (English) Zbl 1019.68544

Chan, Agnes Hui (ed.) et al., Information security. 5th international conference, ISC 2002, Sao Paulo, Brazil, September 30 - October 2, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2433, 136-149 (2002).
MSC:  68P25 94A62
PDFBibTeX XMLCite
Full Text: Link

A public key cryptosystem based on the subgroup membership problem. (English) Zbl 1050.94522

Qing, Sihan (ed.) et al., Information and communications security. 3rd international conference, ICICS 2001, Xian, China, November 13–16, 2001. Proceedings. Berlin: Springer (ISBN 3-540-42880-1). Lect. Notes Comput. Sci. 2229, 352-363 (2001).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: Link

Cryptographic salt: A countermeasure against denial-of-service attacks. (English) Zbl 0994.68551

Varadharajan, Vijay (ed.) et al., Information security and privacy. 6th Australasian conference, ACISP 2001, Sydney, Australia, July 11-13, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2119, 334-343 (2001).
PDFBibTeX XMLCite
Full Text: Link

A survey of divide and conquer attacks on certain irregularly clocked stream ciphers. (English) Zbl 1003.94520

Lam, Kwok-Yan (ed.) et al., Cryptography and computational number theory. Proceedings of the workshop, CCNT’99, Singapore, November 22-26, 1999. Basel: Birkhäuser. Prog. Comput. Sci. Appl. Log. 20, 165-185 (2001).
MSC:  94A55 94A60
PDFBibTeX XMLCite

Classification of authentication protocols: A practical approach. (English) Zbl 1044.68611

Pieprzyk, Josef (ed.) et al., Information security. 3rd international workshop, ISW 2000, Wollongong, Australia, December 20–21, 2000. Proceedings. Berlin: Springer (ISBN 3-540-41416-9). Lect. Notes Comput. Sci. 1975, 194-208 (2000).
MSC:  68P25 94A62
PDFBibTeX XMLCite
Full Text: Link

Key recovery system for the commercial environment. (English) Zbl 0963.68220

Dawson, Ed (ed.) et al., Information security and privacy. 5th Australasian conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1841, 149-162 (2000).
MSC:  68U99 94A60 68P25
PDFBibTeX XMLCite

Designing Boolean functions for cryptographic applications. (English) Zbl 0987.94034

Dorninger, D. (ed.) et al., Contributions to general algebra 12. Proceedings of the 58th workshop on general algebra “58. Arbeitstagung Allgemeine Algebra”, Vienna, Austria, June 3-6, 1999. Klagenfurt: Verlag Johannes Heyn. 1-21 (2000).
MSC:  94A60 06E30 94C10
PDFBibTeX XMLCite

Key recovery in third generation wireless communication systems. (English) Zbl 0969.94019

Imai, Hideki (ed.) et al., Public key cryptography. 3rd international workshop on Practice and theory in public key cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1751, 223-237 (2000).
MSC:  94A60 68P25
PDFBibTeX XMLCite

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software