Login / Signup
ACISP (2)
2016
2019
2024
2016
2024
Keyphrases
Publications
2024
Jialiu Cheng
,
Yi Wang
,
Rongmao Chen
,
Xinyi Huang
Subverting Cryptographic Protocols from a Fine-Grained Perspective- A Case Study on 2-Party ECDSA.
ACISP (2)
(2024)
Kakeru Watanabe
,
Kazuki Yoneyama
Formal Verification of Challenge Flow in EMV 3-D Secure.
ACISP (2)
(2024)
Xinyu Zhang
,
Ron Steinfeld
,
Joseph K. Liu
,
Muhammed F. Esgin
,
Dongxi Liu
,
Sushmita Ruj
DualRing-PRF: Post-quantum (Linkable) Ring Signatures from Legendre and Power Residue PRFs.
ACISP (2)
(2024)
Mengce Zheng
,
Wei Yan
Improved Lattice-Based Attack on Mersenne Low Hamming Ratio Search Problem.
ACISP (2)
(2024)
Zixuan Wu
,
Rongmao Chen
,
Yi Wang
,
Qiong Wang
,
Wei Peng
An Efficient Hardware Implementation of Crystal-Dilithium on FPGA.
ACISP (2)
(2024)
Zhenzhen Bao
,
Jian Guo
,
Shun Li
,
Phuong Pham
Automatic Quantum Multi-collision Distinguishers and Rebound Attacks with Triangulation Algorithm.
ACISP (2)
(2024)
Nam Tran
,
Khoa Nguyen
,
Dongxi Liu
,
Josef Pieprzyk
,
Willy Susilo
Improved Multimodal Private Signatures from Lattices.
ACISP (2)
(2024)
Chen Wang
,
Jinliang Wang
,
Muzhou Li
,
Meiqin Wang
New Strategy for Evaluating Differential Clustering Effect of uBlock.
ACISP (2)
(2024)
Zhiwei Tang
,
Xuemeng Zhai
,
Gaolei Fei
,
Junyi Gao
,
Jianwei Ding
,
Keren Wang
,
Qiang Li
,
Guangmin Hu
An Account Matching Method Based on Hyper Graph.
ACISP (2)
(2024)
Quan Yuan
,
Chao Sun
,
Tsuyoshi Takagi
Revisiting the Security of Fiat-Shamir Signature Schemes Under Superposition Attacks.
ACISP (2)
(2024)
Hangyu Zhao
,
Hua Wu
,
Xuqiong Bian
,
Songtao Liu
,
Guang Cheng
,
Xiaoyan Hu
,
Zhiyi Tian
Unveiling the Unseen: Video Recognition Attacks on Social Software.
ACISP (2)
(2024)
Tuong Ngoc Nguyen
,
Willy Susilo
,
Dung Hoang Duong
,
Fuchun Guo
,
Kazuhide Fukushima
,
Shinsaku Kiyomoto
A Fault-Tolerant Content Moderation Mechanism for Secure Messaging Systems.
ACISP (2)
(2024)
Weiwei Cao
Revisiting Impossible Differential Cryptanalysis and Expanding the Application of MILP in Impossible Differential Attack.
ACISP (2)
(2024)
Arnaud Sipasseuth
Faster Verifications and Smaller Signatures: Trade-Offs for ALTEQ Using Rejections.
ACISP (2)
(2024)
Tomer Ashur
,
Thomas Buschman
,
Mohammad Mahzoun
Algebraic Cryptanalysis of the HADES Design Strategy: Application to Poseidon and Poseidon2.
ACISP (2)
(2024)
Madeline Moran
,
Arrianna Szymczak
,
Anna Hart
,
Shelia Kennison
,
Eric Chan-Tin
Deep Dive on Relationship Between Personality and Password Creation.
ACISP (2)
(2024)
Xiaokang Dai
,
Jingwei Chen
,
Wenyuan Wu
,
Yong Feng
Lattice-Based, More General Anti-leakage Model and Its Application in Decentralization.
ACISP (2)
(2024)
Saskia Bayreuther
,
Robin Berger
,
Felix Dörre
,
Jeremias Mechler
,
Jörn Müller-Quade
Hidden $\varDelta $-Fairness: A Novel Notion for Fair Secure Two-Party Computation.
ACISP (2)
(2024)
Li-Jie Jian
,
Ting-Yuan Wang
,
Bo-Yin Yang
,
Ming-Shing Chen
Jumping for Bernstein-Yang Inversion.
ACISP (2)
(2024)
Vincent Hwang
Pushing the Limit of Vectorized Polynomial Multiplications for NTRU Prime.
ACISP (2)
(2024)
Kazumasa Shinagawa
Size-Hiding Computation in the Honest-But-Curious Model.
ACISP (2)
(2024)
Yali Yuan
,
Yichao Wang
,
Guang Cheng
ProfistMAC: A Protocol Finite State Machine Classifier via Graph Representation.
ACISP (2)
(2024)
volume 14896, 2024
Information Security and Privacy - 29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15-17, 2024, Proceedings, Part II
ACISP (2)
14896 (2024)
2017
Jean-Guillaume Dumas
,
Vincent Zucca
Prover Efficient Public Verification of Dense or Sparse/Structured Matrix-Vector Multiplication.
ACISP (2)
(2017)
Christian Forler
,
Eik List
,
Stefan Lucks
,
Jakob Wenzel
Reforgeability of Authenticated Encryption Schemes.
ACISP (2)
(2017)
Alex Davidson
,
Carlos Cid
An Efficient Toolkit for Computing Private Set Operations.
ACISP (2)
(2017)
Eunkyung Kim
,
Mehdi Tibouchi
Secure GLS Recomposition for Sum-of-Square Cofactors.
ACISP (2)
(2017)
Swapan Maiti
,
Shamit Ghosh
,
Dipanwita Roy Chowdhury
On the Security of Designing a Cellular Automata Based Stream Cipher.
ACISP (2)
(2017)
Yusuke Naito
Indifferentiability of Double-Block-Length Hash Function Without Feed-Forward Operations.
ACISP (2)
(2017)
Sumanta Sarkar
,
Habeeb Syed
Analysis of Toeplitz MDS Matrices.
ACISP (2)
(2017)
Clark D. Thomborson
,
Marc Jeanmougin
Stegogames.
ACISP (2)
(2017)
Yang-Wai Chow
,
Willy Susilo
,
Joseph Tonien
,
Wei Zong
A QR Code Watermarking Approach Based on the DWT-DCT Technique.
ACISP (2)
(2017)
Jason H. M. Ying
,
Noboru Kunihiro
Solving the DLP with Low Hamming Weight Product Exponents and Improved Attacks on the GPS Identification Scheme.
ACISP (2)
(2017)
Weizhi Meng
,
Lee Wang Hao
,
Man Ho Au
,
Zhe Liu
Exploring Effect of Location Number on Map-Based Graphical Password Authentication.
ACISP (2)
(2017)
Nicholas R. Rodofile
,
Thomas Schmidt
,
Sebastian T. Sherry
,
Christopher Djamaludin
,
Kenneth Radke
,
Ernest Foo
Process Control Cyber-Attacks and Labelled Datasets on S7Comm Critical Infrastructure.
ACISP (2)
(2017)
Keita Emura
Privacy-Preserving Aggregation of Time-Series Data with Public Verifiability from Simple Assumptions.
ACISP (2)
(2017)
Yan Lin
,
Xiaoxiao Tang
,
Debin Gao
SafeStack ^+ : Enhanced Dual Stack to Combat Data-Flow Hijacking.
ACISP (2)
(2017)
Weizhong Qiang
,
JiaZhen Guo
,
Hai Jin
,
Weifeng Li
JSFfox: Run-Timely Confining JavaScript for Firefox.
ACISP (2)
(2017)
Jiawei Zhan
,
Quan Zhou
,
Xiaozhuo Gu
,
Yuewu Wang
,
Yingjiao Niu
Splitting Third-Party Libraries' Privileges from Android Apps.
ACISP (2)
(2017)
Theo Fanuela Prabowo
,
Chik How Tan
Generating Complete Edwards Curves.
ACISP (2)
(2017)
Mitsuhiro Hattori
,
Takato Hirano
,
Nori Matsuda
,
Rina Shimizu
,
Ye Wang
Privacy-Utility Tradeoff for Applications Using Energy Disaggregation of Smart-Meter Data.
ACISP (2)
(2017)
Weizhong Qiang
,
Yingda Huang
,
Deqing Zou
,
Hai Jin
,
Shizhen Wang
,
Guozhong Sun
Fully Context-Sensitive CFI for COTS Binaries.
ACISP (2)
(2017)
Hao Sun
,
Jinshu Su
,
Xiaofeng Wang
,
Rongmao Chen
,
Yujing Liu
,
Qiaolin Hu
PriMal: Cloud-Based Privacy-Preserving Malware Detection.
ACISP (2)
(2017)
Yangguang Tian
,
Shiwei Zhang
,
Guomin Yang
,
Yi Mu
,
Yong Yu
Privacy-Preserving k-time Authenticated Secret Handshakes.
ACISP (2)
(2017)
Fan Jiang
,
Cen Zhang
,
Shaoyin Cheng
FFFuzzer: Filter Your Fuzz to Get Accuracy, Efficiency and Schedulability.
ACISP (2)
(2017)
Abhishek Singh
,
Binanda Sengupta
,
Sushmita Ruj
Certificate Transparency with Enhancements and Short Proofs.
ACISP (2)
(2017)
Andreas Erwig
,
Marc Fischlin
,
Martin Hald
,
Dominik Helm
,
Robert Kiel
,
Florian Kübler
,
Michael Kümmerlin
,
Jakob Laenge
,
Felix Rohrbach
Redactable Graph Hashing, Revisited - (Extended Abstract).
ACISP (2)
(2017)
Reza Rezaeian Farashahi
,
Seyed Gholamhossein Hosseini
Differential Addition on Twisted Edwards Curves.
ACISP (2)
(2017)
Jingnan He
,
Wenpan Jing
,
Bao Li
,
Xianhui Lu
,
Dingding Jia
Dual-Mode Cryptosystem Based on the Learning with Errors Problem.
ACISP (2)
(2017)
volume 10343, 2017
Information Security and Privacy - 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part II
ACISP (2)
10343 (2017)