researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
[-]
OR
AND
NOT
1
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
Filter by Tag
[+]
OR
AND
NOT
1
algebra
C++
Meta-Environment
access control
analysis
context-aware
data-flow
design
e-science
meta-model
meta-objects
mobile
open-source
protocol
role-based access control
rule-based
security
source-to-source
systematic-approach
testing
Filter by Author
[+]
OR
AND
NOT
1
Atsuko Miyaji
Colin Boyd
Ed Dawson
Feng Bao
Guomin Yang
Hongjun Wu
Huaxiong Wang
Josef Pieprzyk
Joseph K. Liu
Kaoru Kurosawa
Keisuke Tanaka
Man Ho Au
Noboru Kunihiro
Qianhong Wu
Reihaneh Safavi-Naini
Robert H. Deng
Tsuyoshi Takagi
Vijay Varadharajan
Willy Susilo
Yi Mu
Filter by Top terms
[+]
OR
AND
NOT
1
acisp
analysis
attack
attacks
conference
cryptanalysis
efficient
encryption
identity
information
key
new
privacy
public
scheme
schemes
secure
security
signature
using
ACISP (acisp)
Editions
Publications
Viewing Publication 1 - 100 from 1054
2023
CSI-SharK: CSI-FiSh with Sharing-friendly Keys
Shahla Atapoor
,
Karim Baghery
,
Daniele Cozzo
,
Robi Pedersen
.
acisp 2023
:
471-502
[doi]
Key Recovery Attacks on Grain-Like Keystream Generators with Key Injection
Matthew Beighton
,
Harry Bartlett
,
Leonie Simpson
,
Kenneth Koon-Ho Wong
.
acisp 2023
:
89-108
[doi]
Reconsidering Generic Composition: The Modes A10, A11 and A12 are Insecure
Francesco Berti
.
acisp 2023
:
157-176
[doi]
Modular Design of KEM-Based Authenticated Key Exchange
Colin Boyd
,
Bor de Kock
,
Lise Millerjord
.
acisp 2023
:
553-579
[doi]
A New Correlation Cube Attack Based on Division Property
Cheng Che
,
Tian Tian
.
acisp 2023
:
53-71
[doi]
Quantum Algorithm for Finding Impossible Differentials and Zero-Correlation Linear Hulls of Symmetric Ciphers
Huiqin Chen
,
Yongqiang Li 0001
,
Parhat Abla
,
Zhiran Li
,
Lin Jiao
,
Mingsheng Wang
.
acisp 2023
:
431-451
[doi]
Adaptively Secure Identity-Based Encryption from Middle-Product Learning with Errors
Jingjing Fan
,
Xingye Lu
,
Man Ho Au
.
acisp 2023
:
320-340
[doi]
Improved Differential Cryptanalysis on SPECK Using Plaintext Structures
Zhuohui Feng
,
Ye Luo
,
Chao Wang
,
Qianqian Yang 0003
,
Zhiquan Liu
,
Ling Song 0001
.
acisp 2023
:
3-24
[doi]
Tightly Secure Lattice Identity-Based Signature in the Quantum Random Oracle Model
Ernest Foo
,
Qinyi Li
.
acisp 2023
:
381-402
[doi]
Compact Password Authenticated Key Exchange from Group Actions
Ren Ishibashi
,
Kazuki Yoneyama
.
acisp 2023
:
220-247
[doi]
Homomorphic Signatures for Subset and Superset Mixed Predicates and Its Applications
Masahito Ishizaka
,
Kazuhide Fukushima
.
acisp 2023
:
291-319
[doi]
BinAlign: Alignment Padding Based Compiler Provenance Recovery
Maliha Ismail
,
Yan Lin 0003
,
DongGyun Han
,
Debin Gao
.
acisp 2023
:
609-629
[doi]
Identity-Based Encryption from Lattices Using Approximate Trapdoors
Malika Izabachène
,
Lucas Prabel
,
Adeline Roux-Langlois
.
acisp 2023
:
270-290
[doi]
Memory-Efficient Quantum Information Set Decoding Algorithm
Naoto Kimura
,
Atsushi Takayasu
,
Tsuyoshi Takagi
.
acisp 2023
:
452-468
[doi]
A Tightly Secure ID-Based Signature Scheme Under DL Assumption in AGM
Jia-Chng Loh
,
Fuchun Guo
,
Willy Susilo
,
Guomin Yang
.
acisp 2023
:
199-219
[doi]
Reusable, Instant and Private Payment Guarantees for Cryptocurrencies
Akash Madhusudan
,
Mahdi Sedaghat
,
Samarth Tiwari
,
Kelong Cong
,
Bart Preneel
.
acisp 2023
:
580-605
[doi]
Related-Cipher Attacks: Applications to Ballet and ANT
Yongxia Mao
,
Wenling Wu
,
Yafei Zheng
,
Lei Zhang 0186
.
acisp 2023
:
109-123
[doi]
Exploring Formal Methods for Cryptographic Hash Function Implementations
Nicky Mouha
.
acisp 2023
:
177-195
[doi]
Statistically Consistent Broadcast Authenticated Encryption with Keyword Search - Adaptive Security from Standard Assumptions
Sayantan Mukherjee
.
acisp 2023
:
523-552
[doi]
Ghidle: Efficient Large-State Block Ciphers for Post-quantum Security
Motoki Nakahashi
,
Rentaro Shiba
,
Ravi Anand
,
Mostafizar Rahman
,
Kosei Sakamoto
,
Fukang Liu
,
Takanori Isobe 0001
.
acisp 2023
:
403-430
[doi]
Encrypted Network Traffic Classification with Higher Order Graph Neural Network
Zulu Okonkwo
,
Ernest Foo
,
Zhe Hou
,
Qinyi Li
,
Zahra Jadidi
.
acisp 2023
:
630-650
[doi]
Information Security and Privacy - 28th Australasian Conference, ACISP 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings
Leonie Simpson
,
Mir Ali Rezazadeh Baee
, editors,
Volume 13915 of
Lecture Notes in Computer Science
, Springer,
2023.
[doi]
Cryptanalysis of SPEEDY
Jinliang Wang
,
Chao Niu
,
Qun Liu 0006
,
Muzhou Li
,
Bart Preneel
,
Meiqin Wang
.
acisp 2023
:
124-156
[doi]
The Triangle Differential Cryptanalysis
Xiaofeng Xie
,
Tian Tian
.
acisp 2023
:
72-88
[doi]
Linear Cryptanalysis and Its Variants with Fast Fourier Transformation Technique on MPC/FHE/ZK-Friendly $\mathbb {F}_p$-Based Ciphers
Zeyu Xu
,
Shiyao Chen
,
Meiqin Wang
,
Puwen Wei
.
acisp 2023
:
25-52
[doi]
Multi-key Homomorphic Secret Sharing from LWE Without Multi-key HE
Peiying Xu
,
Li-Ping Wang
.
acisp 2023
:
248-269
[doi]
Quantum-Access Security of Hash-Based Signature Schemes
Quan Yuan
,
Mehdi Tibouchi
,
Masayuki Abe
.
acisp 2023
:
343-380
[doi]
Practical Verifiable Random Function with RKA Security
Tsz Hon Yuen
,
Shimin Pan
,
Sheng Huang
,
Xiaoting Zhang
.
acisp 2023
:
503-522
[doi]
2022
Truncated Differential Properties of the Diagonal Set of Inputs for 5-Round AES
Lorenzo Grassi 0001
,
Christian Rechberger
.
acisp 2022
:
24-45
[doi]
Hybrid Dual and Meet-LWE Attack
Lei Bi 0002
,
Xianhui Lu
,
Junjie Luo 0001
,
Kunpeng Wang
.
acisp 2022
:
168-188
[doi]
Structure-Preserving Linearly Homomorphic Signature with Designated Combiner for Subspace
Yumei Li 0003
,
Mingwu Zhang
,
Futai Zhang
.
acisp 2022
:
229-243
[doi]
Fast Skinny-128 SIMD Implementations for Sequential Modes of Operation
Alexandre Adomnicai
,
Kazuhiko Minematsu
,
Maki Shigeri
.
acisp 2022
:
125-144
[doi]
Fiat-Shamir Signatures Based on Module-NTRU
Shi Bai
,
Austin Beard
,
Floyd Johnson
,
Sulani K. B. Vidhanalage
,
Tran Ngo
.
acisp 2022
:
289-308
[doi]
Implementing Grover Oracle for Lightweight Block Ciphers Under Depth Constraints
Subodh Bijwe
,
Amit Kumar Chauhan
,
Somitra Kumar Sanadhya
.
acisp 2022
:
85-105
[doi]
Handle the Traces: Revisiting the Attack on ECDSA with EHNP
Jinzheng Cao
,
Yanbin Pan
,
Qingfeng Cheng
,
Xinghua Li 0001
.
acisp 2022
:
147-167
[doi]
On Security of Fuzzy Commitment Scheme for Biometric Authentication
Donghoon Chang
,
Surabhi Garg
,
Munawar Hasan
,
Sweta Mishra
.
acisp 2022
:
399-419
[doi]
DeChain: A Blockchain Framework Enhancing Decentralization via Sharding
Shenwei Chen
,
Zhen Liu
,
Yu Long
,
Dawu Gu
.
acisp 2022
:
469-488
[doi]
An Injectivity Analysis of Crystals-Kyber and Implications on Quantum Security
Xiaohui Ding
,
Muhammed F. Esgin
,
Amin Sakzad
,
Ron Steinfeld
.
acisp 2022
:
332-351
[doi]
Verifiable Decryption in the Head
Kristian Gjøsteen
,
Thomas Haines
,
Johannes Müller 0001
,
Peter B. Rønne
,
Tjerand Silde
.
acisp 2022
:
355-374
[doi]
Cryptanalysis and Repair of a Gabidulin Code Based Cryptosystem from ACISP 2018
Wenshuo Guo
,
Fangwei Fu
.
acisp 2022
:
189-205
[doi]
Key Structures: Improved Related-Key Boomerang Attack Against the Full AES-256
Jian Guo
,
Ling Song
,
Haoyang Wang 0010
.
acisp 2022
:
3-23
[doi]
TIDE: A Novel Approach to Constructing Timed-Release Encryption
Angelique Faye Loe
,
Liam Medley
,
Christian O'Connell
,
Elizabeth A. Quaglia
.
acisp 2022
:
244-264
[doi]
Chosen Ciphertext Secure Keyed Two-Level Homomorphic Encryption
Yusaku Maeda
,
Koji Nuida
.
acisp 2022
:
209-228
[doi]
Improved Division Property for Ciphers with Complex Linear Layers
Yongxia Mao
,
Wenling Wu
,
Bolin Wang
,
Li Zhang
.
acisp 2022
:
106-124
[doi]
Garrison: A Novel Watchtower Scheme for Bitcoin
Arash Mirzaei
,
Amin Sakzad
,
Jiangshan Yu
,
Ron Steinfeld
.
acisp 2022
:
489-508
[doi]
PNB-Focused Differential Cryptanalysis of ChaCha Stream Cipher
Shotaro Miyashita
,
Ryoma Ito 0001
,
Atsuko Miyaji
.
acisp 2022
:
46-66
[doi]
Information Security and Privacy - 27th Australasian Conference, ACISP 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings
Khoa Nguyen
,
Guomin Yang
,
Fuchun Guo
,
Willy Susilo
, editors,
Volume 13494 of
Lecture Notes in Computer Science
, Springer,
2022.
[doi]
Multi-signatures for ECDSA and Its Applications in Blockchain
Shimin Pan
,
Kwan Yin Chan
,
Handong Cui
,
Tsz Hon Yuen
.
acisp 2022
:
265-285
[doi]
Speeding-Up Parallel Computation of Large Smooth-Degree Isogeny Using Precedence-Constrained Scheduling
Kittiphon Phalakarn
,
Vorapong Suppakitpaisarn
,
M. Anwar Hasan
.
acisp 2022
:
309-331
[doi]
SoK: Decentralized Randomness Beacon Protocols
Mayank Raikwar
,
Danilo Gligoroski
.
acisp 2022
:
420-446
[doi]
CCOM: Cost-Efficient and Collusion-Resistant Oracle Mechanism for Smart Contracts
Xiaofei Wu
,
Hao Wang 0007
,
Chunpeng Ge
,
Lu Zhou
,
Qiong Huang
,
Lanju Kong
,
LiZhen Cui
,
Zhe Liu
.
acisp 2022
:
449-468
[doi]
Resumable Zero-Knowledge for Circuits from Symmetric Key Primitives
Handong Zhang
,
Puwen Wei
,
Haiyang Xue
,
Yi Deng
,
Jinsong Li
,
Wei Wang
,
Guoxiao Liu
.
acisp 2022
:
375-398
[doi]
Improved Differential Attack on Round-Reduced LEA
Yuhan Zhang
,
Wenling Wu
,
Lei Zhang
.
acisp 2022
:
67-84
[doi]
Shoot Before You Escape: Dynamic Behavior Monitor of Bitcoin Users via Bi-Temporal Network Analytics
Chen Zhao
,
Jianing Ding
,
Zhenzhen Li
,
Zhen Li 0011
,
Gang Xiong 0001
,
Gaopeng Gou
.
acisp 2022
:
509-528
[doi]
2021
Security Analysis of End-to-End Encryption for Zoom Meetings
Takanori Isobe 0001
,
Ryoma Ito 0001
.
acisp 2021
:
234-253
[doi]
Updatable Trapdoor SPHFs: Modular Construction of Updatable Zero-Knowledge Arguments and More
Behzad Abdolmaleki
,
Daniel Slamanig
.
acisp 2021
:
46-67
[doi]
Information Security and Privacy - 26th Australasian Conference, ACISP 2021, Virtual Event, December 1-3, 2021, Proceedings
Joonsang Baek
,
Sushmita Ruj
, editors,
Volume 13083 of
Lecture Notes in Computer Science
, Springer,
2021.
[doi]
An Anonymous Trace-and-Revoke Broadcast Encryption Scheme
Olivier Blazy
,
Sayantan Mukherjee
,
Huyen Nguyen
,
Duong Hieu Phan
,
Damien Stehlé
.
acisp 2021
:
214-233
[doi]
Anonymous Lattice Identity-Based Encryption with Traceable Identities
Xavier Boyen
,
Ernest Foo
,
Qinyi Li
.
acisp 2021
:
630-649
[doi]
Non-interactive, Secure Verifiable Aggregation for Decentralized, Privacy-Preserving Learning
Carlo Brunetta
,
Georgia Tsaloli
,
Bei Liang
,
Gustavo Banegas
,
Aikaterini Mitrokotsa
.
acisp 2021
:
510-528
[doi]
Oriole: Thwarting Privacy Against Trustworthy Deep Learning Models
Liuqiao Chen
,
Hu Wang
,
Benjamin Zi Hao Zhao
,
Minhui Xue
,
Haifeng Qian
.
acisp 2021
:
550-568
[doi]
ALRS: An Adversarial Noise Based Privacy-Preserving Data Sharing Mechanism
Jikun Chen
,
Ruoyu Deng
,
Hongbin Chen
,
Na Ruan
,
Yao Liu
,
Chao Liu
,
Chunhua Su
.
acisp 2021
:
490-509
[doi]
Lattice-Based Secure Biometric Authentication for Hamming Distance
Jung Hee Cheon
,
Dongwoo Kim 0003
,
Duhyeong Kim
,
Joohee Lee
,
Junbum Shin
,
Yongsoo Song
.
acisp 2021
:
653-672
[doi]
Mind the Scraps: Attacking Blockchain Based on Selfdestruct
Wei-Yang Chiu
,
Weizhi Meng 0001
.
acisp 2021
:
451-469
[doi]
Partially-Fair Computation from Timed-Release Encryption and Oblivious Transfer
Geoffroy Couteau
,
A. W. Roscoe 0001
,
Peter Y. A. Ryan
.
acisp 2021
:
330-349
[doi]
A Trustless GQ Multi-signature Scheme with Identifiable Abort
Handong Cui
,
Tsz Hon Yuen
.
acisp 2021
:
673-693
[doi]
Leakage Resilient Cheating Detectable Secret Sharing Schemes
Sabyasachi Dutta
,
Reihaneh Safavi-Naini
.
acisp 2021
:
3-23
[doi]
Puncturable Identity-Based Encryption from Lattices
Priyanka Dutta
,
Willy Susilo
,
Dung Hoang Duong
,
Partha Sarathi Roy 0001
.
acisp 2021
:
571-589
[doi]
On MILP-Based Automatic Search for Bit-Based Division Property for Ciphers with (Large) Linear Layers
Muhammad ElSheikh
,
Amr M. Youssef
.
acisp 2021
:
111-131
[doi]
Forced Independent Optimized Implementation of 4-Bit S-Box
Yanhong Fan
,
Weijia Wang
,
Zhihu Li
,
Zhenyu Lu
,
Siu-Ming Yiu
,
Meiqin Wang
.
acisp 2021
:
151-170
[doi]
Small Superset and Big Subset Obfuscation
Steven D. Galbraith
,
Trey Li
.
acisp 2021
:
68-87
[doi]
A Novel Proof of Shuffle: Exponentially Secure Cut-and-Choose
Thomas Haines
,
Johannes Müller 0001
.
acisp 2021
:
293-308
[doi]
Optimal Randomized Partial Checking for Decryption Mix Nets
Thomas Haines
,
Johannes Müller 0001
.
acisp 2021
:
277-292
[doi]
Distinguishing and Key Recovery Attacks on the Reduced-Round SNOW-V
Jin Hoki
,
Takanori Isobe 0001
,
Ryoma Ito 0001
,
Fukang Liu
,
Kosei Sakamoto
.
acisp 2021
:
171-190
[doi]
Constructions of Iterative Near-MDS Matrices with the Lowest XOR Count
Xiaodan Li
,
Wenling Wu
.
acisp 2021
:
132-150
[doi]
Concise Mercurial Subvector Commitments: Definitions and Constructions
Yannan Li
,
Willy Susilo
,
Guomin Yang
,
Tran Viet Xuan Phuong
,
Yong Yu 0002
,
Dongxi Liu
.
acisp 2021
:
353-371
[doi]
Algebraic Attacks on Round-Reduced Keccak
Fukang Liu
,
Takanori Isobe 0001
,
Willi Meier
,
Zhonghao Yang
.
acisp 2021
:
91-110
[doi]
A Secure Cross-Shard View-Change Protocol for Sharding Blockchains
Yizhong Liu
,
Jianwei Liu 0001
,
Yiming Hei
,
Yu Xia
,
Qianhong Wu
.
acisp 2021
:
372-390
[doi]
Optimizing Bootstrapping and Evaluating Large FHE Gates in the LWE-Based GSW-FHE
Chao Liu
,
Anyu Wang 0003
,
Zhongxiang Zheng
.
acisp 2021
:
590-609
[doi]
Broadcast Authenticated Encryption with Keyword Search
Xueqiao Liu
,
Kai He
,
Guomin Yang
,
Willy Susilo
,
Joseph Tonien
,
Qiong Huang
.
acisp 2021
:
193-213
[doi]
Chosen Ciphertext Secure Functional Encryption from Constrained Witness PRF
Tapas Pal
,
Ratna Dutta
.
acisp 2021
:
24-45
[doi]
CCA Secure Attribute-Hiding Inner Product Encryption from Minimal Assumption
Tapas Pal
,
Ratna Dutta
.
acisp 2021
:
254-274
[doi]
Forward-Secure Group Encryptions from Lattices
Jing Pan
,
Xiaofeng Chen 0001
,
Fangguo Zhang
,
Willy Susilo
.
acisp 2021
:
610-629
[doi]
A Blockchain-Enabled Federated Learning Model for Privacy Preservation: System Design
Minfeng Qi
,
Ziyuan Wang
,
Fan Wu
,
Rob Hanson
,
Shiping Chen 0001
,
Yang Xiang 0001
,
Liming Zhu
.
acisp 2021
:
473-489
[doi]
Efficient Unique Ring Signature for Blockchain Privacy Protection
Anh The Ta
,
Thanh Xuan Khuc
,
Tuong Ngoc Nguyen
,
Huy Quoc Le
,
Dung Hoang Duong
,
Willy Susilo
,
Kazuhide Fukushima
,
Shinsaku Kiyomoto
.
acisp 2021
:
391-407
[doi]
Private Decision Tree Evaluation with Constant Rounds via (Only) Fair SS-4PC
Hikaru Tsuchida
,
Takashi Nishide
.
acisp 2021
:
309-329
[doi]
Transparency or Anonymity Leak: Monero Mining Pools Data Publication
Dimaz Ankaa Wijaya
,
Joseph K. Liu
,
Ron Steinfeld
,
Dongxi Liu
.
acisp 2021
:
433-450
[doi]
+
Mahmoud Yehia
,
Riham AlTawy
,
T. Aaron Gulliver
.
acisp 2021
:
694-714
[doi]
Redactable Transactions in Consortium Blockchain: Controlled by Multi-authority CP-ABE
Zongyang Zhang
,
Tong Li
,
Zhuo Wang
,
Jianwei Liu 0001
.
acisp 2021
:
408-429
[doi]
Towards Visualizing and Detecting Audio Adversarial Examples for Automatic Speech Recognition
Wei Zong
,
Yang-Wai Chow
,
Willy Susilo
.
acisp 2021
:
531-549
[doi]
2020
Unlinkable Updatable Databases and Oblivious Transfer with Access Control
Aditya Damodaran
,
Alfredo Rial
.
acisp 2020
:
584-604
[doi]
Cloud-Assisted Asynchronous Key Transport with Post-Quantum Security
Gareth T. Davies
,
Herman Galteland
,
Kristian Gjøsteen
,
Yao Jiang
.
acisp 2020
:
82-101
[doi]
Arbitrary-Centered Discrete Gaussian Sampling over the Integers
Yusong Du
,
Baoying Fan
,
Baodian Wei
.
acisp 2020
:
391-407
[doi]
Secure and Compact Elliptic Curve LR Scalar Multiplication
Yaoan Jin
,
Atsuko Miyaji
.
acisp 2020
:
605-618
[doi]
Galaxy: A Family of Stream-Cipher-Based Space-Hard Ciphers
Yuji Koike
,
Kosei Sakamoto
,
Takuya Hayashi
,
Takanori Isobe 0001
.
acisp 2020
:
142-159
[doi]
Efficient Forward-Secure Threshold Public Key Encryption
Rafael Kurek
.
acisp 2020
:
330-349
[doi]
Information Security and Privacy - 25th Australasian Conference, ACISP 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings
Joseph K. Liu
,
Hui Cui
, editors,
Volume 12248 of
Lecture Notes in Computer Science
, Springer,
2020.
[doi]
Recovering CRT-RSA Secret Keys from Noisy Square-and-Multiply Sequences in the Sliding Window Method
Kento Oonishi
,
Noboru Kunihiro
.
acisp 2020
:
642-652
[doi]
Improved Security Proof for the Camenisch-Lysyanskaya Signature-Based Synchronized Aggregate Signature Scheme
Masayuki Tezuka
,
Keisuke Tanaka
.
acisp 2020
:
225-243
[doi]
Automated Search for Block Cipher Differentials: A GPU-Accelerated Branch-and-Bound Algorithm
Wei-Zhu Yeoh
,
Je Sen Teh
,
Jiageng Chen
.
acisp 2020
:
160-179
[doi]
Sign in
or
sign up
to see more results.