Information Security and Privacy: 16th Australasian Conference, ACISP 2011, Melbourne, Australia, July 11-13, 2011. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the 16th Australasian Conference on Information Security and Privacy, ACISP 2011, held in Melbourne, Australia, in July 2011.
The 24 revised full papers presented together with an invited talk and 9 poster papers were carefully reviewed and selected from 103 submissions. The papers are organized in topical sections on symmetric key cryptography, hash functions, cryptographic protocols, access control and security, and public key cryptography.

Author(s): Claude Carlet (auth.), Udaya Parampalli, Philip Hawkes (eds.)
Series: Lecture Notes in Computer Science 6812
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2011

Language: English
Pages: 464
Tags: Data Encryption; Management of Computing and Information Systems; Operating Systems; Computer Communication Networks; Discrete Mathematics in Computer Science; Computer Imaging, Vision, Pattern Recognition and Graphics

Front Matter....Pages -
On Known and New Differentially Uniform Functions....Pages 1-15
New Impossible Differential Attacks of Reduced-Round Camellia-192 and Camellia-256....Pages 16-33
Results on the Immunity of Boolean Functions against Probabilistic Algebraic Attacks....Pages 34-46
Finding More Boolean Functions with Maximum Algebraic Immunity Based on Univariate Polynomial Representation....Pages 47-60
Improving the Algorithm 2 in Multidimensional Linear Cryptanalysis....Pages 61-74
State Convergence in the Initialisation of Stream Ciphers....Pages 75-88
On Maximum Differential Probability of Generalized Feistel....Pages 89-105
Double SP-Functions: Enhanced Generalized Feistel Networks....Pages 106-119
Algebraic Techniques in Differential Cryptanalysis Revisited....Pages 120-141
Faster and Smoother – VSH Revisited....Pages 142-156
Cryptanalysis of the Compression Function of SIMD....Pages 157-171
Electronic Cash with Anonymous User Suspension....Pages 172-188
T -Robust Scalable Group Key Exchange Protocol with O (log n ) Complexity....Pages 189-207
Application-Binding Protocol in the User Centric Smart Card Ownership Model....Pages 208-225
Security in Depth through Smart Space Cascades....Pages 226-240
GeoEnc: Geometric Area Based Keys and Policies in Functional Encryption Systems....Pages 241-258
An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder Theorem....Pages 259-275
DMIPS - Defensive Mechanism against IP Spoofing....Pages 276-291
Provably Secure Key Assignment Schemes from Factoring....Pages 292-309
Efficient CCA-Secure CDH Based KEM Balanced between Ciphertext and Key....Pages 310-318
Generic Construction of Strongly Secure Timed-Release Public-Key Encryption....Pages 319-336
Identity-Based Server-Aided Decryption....Pages 337-352
A Generic Variant of NIST’s KAS2 Key Agreement Protocol....Pages 353-370
A Single Key Pair is Adequate for the Zheng Signcryption....Pages 371-388
Towards Public Key Encryption Scheme Supporting Equality Test with Fine-Grained Authorization....Pages 389-406
Lattice-Based Completely Non-malleable PKE in the Standard Model (Poster)....Pages 407-411
Compliance or Security, What Cost? (Poster)....Pages 412-416
Preimage Attacks on Full-ARIRANG (Poster)....Pages 417-422
Finding Collisions for Reduced Luffa -256 v2 (Poster)....Pages 423-427
Improved Security Analysis of Fugue-256 (Poster)....Pages 428-432
Improved Meet-in-the-Middle Cryptanalysis of KTANTAN (Poster)....Pages 433-438
Toward Dynamic Attribute-Based Signcryption (Poster)....Pages 439-443
A Verifiable Distributed Oblivious Transfer Protocol....Pages 444-450
Impracticality of Efficient PVSS in Real Life Security Standard (Poster)....Pages 451-455
Electromagnetic Analysis Enhancement with Signal Processing Techniques (Poster)....Pages 456-461
Erratum: Compliance or Security, What Cost? (Poster)....Pages E1-E1
Back Matter....Pages -