Information Security and Privacy 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings /

Corporate Author: SpringerLink (Online service)
Other Authors: Pieprzyk, Josef. (Editor, http://id.loc.gov/vocabulary/relators/edt), Ghodosi, Hossein. (Editor, http://id.loc.gov/vocabulary/relators/edt), Dawson, Ed. (Editor, http://id.loc.gov/vocabulary/relators/edt)
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2007.
Edition:1st ed. 2007.
Series:Security and Cryptology ; 4586
Subjects:
Online Access:https://doi.org/10.1007/978-3-540-73458-1
Table of Contents:
  • Stream Ciphers
  • An Analysis of the Hermes8 Stream Ciphers
  • On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks
  • Strengthening NLS Against Crossword Puzzle Attack
  • Hashing
  • A New Strategy for Finding a Differential Path of SHA-1
  • Preimage Attack on the Parallel FFT-Hashing Function
  • Second Preimages for Iterated Hash Functions and Their Implications on MACs
  • On Building Hash Functions from Multivariate Quadratic Equations
  • Biometrics
  • An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication
  • Soft Generation of Secure Biometric Keys
  • Secret Sharing
  • Flaws in Some Secret Sharing Schemes Against Cheating
  • Efficient (k,n) Threshold Secret Sharing Schemes Secure Against Cheating from n???1 Cheaters
  • Cryptanalysis
  • Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128
  • Analysis of the SMS4 Block Cipher
  • Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme
  • Public Key Cryptography
  • : A Hardware-Oriented Trapdoor Cipher
  • Anonymity on Paillier’s Trap-Door Permutation
  • Generic Certificateless Key Encapsulation Mechanism
  • Double-Size Bipartite Modular Multiplication
  • Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography
  • Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM
  • Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards
  • Authentication
  • Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication
  • Certificateless Signature Revisited
  • Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures
  • Hash-and-Sign with Weak Hashing Made Secure
  • “Sandwich” Is Indeed Secure: How to Authenticate a Message with Just One Hashing
  • Threshold Anonymous Group Identification and Zero-Knowledge Proof
  • Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions
  • E-Commerce
  • A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users
  • Efficient and Secure Comparison for On-Line Auctions
  • Practical Compact E-Cash
  • Security
  • Use of Dempster-Shafer Theory and Bayesian Inferencing for Fraud Detection in Mobile Communication Networks
  • On Proactive Perfectly Secure Message Transmission.