Login / Signup
ACISP (1)
2016
2019
2024
2016
2024
Keyphrases
Publications
2024
Anit Kumar Ghosal
,
Dipanwita Roychowdhury
Continuous Version of Non-malleable Codes from Authenticated Encryption.
ACISP (1)
(2024)
Luke Harmon
,
Gaetan Delavignette
,
Hanes Oliveira
đisplaystyle sfHERatio: Homomorphic Encryption of Rationals Using Laurent Polynomials.
ACISP (1)
(2024)
Ruida Wang
,
Benqiang Wei
,
Zhihao Li
,
Xianhui Lu
,
Kunpeng Wang
TFHE Bootstrapping: Faster, Smaller and Time-Space Trade-Offs.
ACISP (1)
(2024)
Tairong Huang
,
Shihe Ma
,
Anyu Wang
,
Xiaoyun Wang
Approximate Methods for the Computation of Step Functions in Homomorphic Encryption.
ACISP (1)
(2024)
Chao Chen
,
Fangguo Zhang
Parallel Algorithms on Hyperelliptic Pairings Using Hyperelliptic Nets.
ACISP (1)
(2024)
Zhilong Luo
,
Shifeng Sun
,
Zhedong Wang
,
Dawu Gu
Non-interactive Publicly Verifiable Searchable Encryption with Forward and Backward Privacy.
ACISP (1)
(2024)
Xiaomeng Sun
,
Wenying Zhang
,
René Rodríguez
,
Huimin Liu
] Based on Correlation Matrices.
ACISP (1)
(2024)
Jia-Chng Loh
,
Fuchun Guo
,
Willy Susilo
Pairing-Free ID-Based Signatures as Secure as Discrete Logarithm in AGM.
ACISP (1)
(2024)
Huina Li
,
Haochen Zhang
,
Kai Hu
,
Guozhen Liu
,
Weidong Qiu
AlgSAT - A SAT Method for Verification of Differential Trails from an Algebraic Perspective.
ACISP (1)
(2024)
Xiaodan Li
,
Wenling Wu
,
Yuhan Zhang
,
Ee Duan
Efficient Search for Optimal Permutations of Refined Type-II Generalized Feistel Structures.
ACISP (1)
(2024)
Keita Emura
On the Feasibility of Identity-Based Encryption with Equality Test Against Insider Attacks.
ACISP (1)
(2024)
Bishwajit Chakraborty
,
Chandranan Dhar
,
Mridul Nandi
Tight Multi-user Security of Ascon and Its Large Key Extension.
ACISP (1)
(2024)
Fangzhou Liu
,
Xueqi Zhu
,
Ruozhou Xu
,
Danping Shi
,
Peng Wang
The Offline Quantum Attack Against Modular Addition Variant of Even-Mansour Cipher.
ACISP (1)
(2024)
Xiuxiu Li
,
Wei Yu
,
Kunpeng Wang
A Novel Window τNAF on Koblitz Curves.
ACISP (1)
(2024)
Rikuto Kurahara
,
Kosei Sakamoto
,
Yuto Nakano
,
Takanori Isobe
Differential Distinguishing Attacks on SNOW-V, SNOW-Vi and KCipher-2.
ACISP (1)
(2024)
Thanh Xuan Khuc
,
Willy Susilo
,
Dung Hoang Duong
,
Fuchun Guo
,
Kazuhide Fukushima
,
Shinsaku Kiyomoto
Threshold Ring Signatures with Accountability.
ACISP (1)
(2024)
Man Chen
,
YuYue Chen
,
Rui Zong
,
ZengPeng Li
,
Zoe L. Jiang
F-FHEW: High-Precision Approximate Homomorphic Encryption with Batch Bootstrapping.
ACISP (1)
(2024)
Yuichi Tanishita
,
Ryuya Hayashi
,
Ryu Ishii
,
Takahiro Matsuda
,
Kanta Matsuura
On the Implications from Updatable Encryption to Public-Key Cryptographic Primitives.
ACISP (1)
(2024)
Robin Jadoul
,
Axel Mertens
,
Jeongeun Park
,
Hilder V. L. Pereira
NTRU-Based FHE for Larger Key and Message Space.
ACISP (1)
(2024)
Luqi Huang
,
Willy Susilo
,
Guomin Yang
,
Fuchun Guo
Key Cooperative Attribute-Based Encryption.
ACISP (1)
(2024)
Fanyang Zeng
,
Tian Tian
On the Security Bounds for Block Ciphers Without Whitening Key Addition Against Integral Distinguishers.
ACISP (1)
(2024)
Meng Li
,
Hanni Ding
,
Qing Wang
,
Zijian Zhang
,
Mauro Conti
Threshold Signatures with Private Accountability via Secretly Designated Witnesses.
ACISP (1)
(2024)
Yi Huang
,
Junping Wan
,
Zoe L. Jiang
,
Jun Zhou
,
Junbin Fang
,
Zhenfu Cao
An Efficient Integer-Wise ReLU on TFHE.
ACISP (1)
(2024)
Jie Xie
,
Yuncong Hu
,
Yu Yu
Hadamard Product Argument from Lagrange-Based Univariate Polynomials.
ACISP (1)
(2024)
volume 14895, 2024
Information Security and Privacy - 29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15-17, 2024, Proceedings, Part I
ACISP (1)
14895 (2024)
2017
Hong Zhu
,
Zhuolin Mei
,
Bing Wu
,
Hongbo Li
,
Zongmin Cui
Fuzzy Keyword Search and Access Control over Ciphertexts in Cloud Computing.
ACISP (1)
(2017)
Yuhei Watanabe
,
Takanori Isobe
,
Masakatu Morii
Conditional Differential Cryptanalysis for Kreyvium.
ACISP (1)
(2017)
Tingting Cui
,
Ling Sun
,
Huaifeng Chen
,
Meiqin Wang
Statistical Integral Distinguisher with Multi-structure and Its Application on AES.
ACISP (1)
(2017)
Peng Xu
,
Shuai Liang
,
Wei Wang
,
Willy Susilo
,
Qianhong Wu
,
Hai Jin
Dynamic Searchable Symmetric Encryption with Physical Deletion and Small Leakage.
ACISP (1)
(2017)
Katsuyuki Takashima
New Proof Techniques for DLIN-Based Adaptively Secure Attribute-Based Encryption.
ACISP (1)
(2017)
Shiwei Zhang
,
Yi Mu
,
Guomin Yang
,
Xiaofen Wang
Hierarchical Functional Encryption for Linear Transformations.
ACISP (1)
(2017)
Shabnam Kasra Kermanshahi
,
Joseph K. Liu
,
Ron Steinfeld
Multi-user Cloud-Based Secure Keyword Search.
ACISP (1)
(2017)
Mengce Zheng
,
Noboru Kunihiro
,
Honggang Hu
Improved Factoring Attacks on Multi-prime RSA with Small Prime Difference.
ACISP (1)
(2017)
Hui Cui
,
Robert H. Deng
,
Joseph K. Liu
,
Yingjiu Li
Attribute-Based Encryption with Expressive and Authorized Keyword Search.
ACISP (1)
(2017)
Puwen Wei
,
Wei Wang
,
Bingxin Zhu
,
Siu-Ming Yiu
Tightly-Secure Encryption in the Multi-user, Multi-challenge Setting with Improved Efficiency.
ACISP (1)
(2017)
Gildas Avoine
,
Xavier Carpent
,
Barbara Kordy
,
Florent Tardif
How to Handle Rainbow Tables with External Memory.
ACISP (1)
(2017)
Yanjiang Yang
,
Joseph K. Liu
,
Zhuo Wei
,
Xinyi Huang
Towards Revocable Fine-Grained Encryption of Cloud Data: Reducing Trust upon Cloud.
ACISP (1)
(2017)
Xiao Zhang
,
Shengli Liu
,
Dawu Gu
Tightly-Secure Signatures from the Decisional Composite Residuosity Assumption.
ACISP (1)
(2017)
Ivan Tjuawinata
,
Tao Huang
,
Hongjun Wu
Cryptanalysis of Simpira v2.
ACISP (1)
(2017)
Suvradip Chakraborty
,
Goutam Paul
,
C. Pandu Rangan
Efficient Compilers for After-the-Fact Leakage: From CPA to CCA-2 Secure PKE to AKE.
ACISP (1)
(2017)
Michael Till Beck
,
Jan Camenisch
,
David Derler
,
Stephan Krenn
,
Henrich C. Pöhls
,
Kai Samelin
,
Daniel Slamanig
Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures.
ACISP (1)
(2017)
Atsushi Takayasu
,
Yohei Watanabe
Lattice-Based Revocable Identity-Based Encryption with Bounded Decryption Key Exposure Resistance.
ACISP (1)
(2017)
Tong Wu
,
Sha Ma
,
Yi Mu
,
Shengke Zeng
ID-Based Encryption with Equality Test Against Insider Attack.
ACISP (1)
(2017)
Shengmin Xu
,
Guomin Yang
,
Yi Mu
,
Willy Susilo
Mergeable and Revocable Identity-Based Encryption.
ACISP (1)
(2017)
Hassan Qahur Al Mahri
,
Leonie Simpson
,
Harry Bartlett
,
Ed Dawson
,
Kenneth Koon-Ho Wong
Fault Attacks on XEX Mode with Application to Certain Authenticated Encryption Modes.
ACISP (1)
(2017)
Shuai Han
,
Shengli Liu
KDM-Secure Public-Key Encryption from Constant-Noise LPN.
ACISP (1)
(2017)
Shujie Cui
,
Muhammad Rizwan Asghar
,
Steven D. Galbraith
,
Giovanni Russello
Secure and Practical Searchable Encryption: A Position Paper.
ACISP (1)
(2017)
Yuki Funabiki
,
Yosuke Todo
,
Takanori Isobe
,
Masakatu Morii
Improved Integral Attack on HIGHT.
ACISP (1)
(2017)
Ahto Buldas
,
Matthias Geihs
,
Johannes Buchmann
Long-Term Secure Commitments via Extractable-Binding Commitments.
ACISP (1)
(2017)
volume 10342, 2017
Information Security and Privacy - 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part I
ACISP (1)
10342 (2017)