researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
Links
Filter by Year
[-]
OR
AND
NOT
1
1996
1997
1998
1999
2000
2001
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
2022
2023
2024
2025
Filter by Tag
[+]
OR
AND
NOT
1
algebra
C++
Meta-Environment
access control
analysis
context-aware
data-flow
design
e-science
meta-model
meta-objects
mobile
open-source
protocol
role-based access control
rule-based
security
source-to-source
systematic-approach
testing
Filter by Author
[+]
OR
AND
NOT
1
Atsuko Miyaji
Colin Boyd
Ed Dawson
Feng Bao
Fuchun Guo
Guomin Yang
Huaxiong Wang
Josef Pieprzyk
Joseph K. Liu
Kaoru Kurosawa
Keisuke Tanaka
Man Ho Au
Noboru Kunihiro
Qianhong Wu
Reihaneh Safavi-Naini
Robert H. Deng
Tsuyoshi Takagi
Vijay Varadharajan
Willy Susilo
Yi Mu
Filter by Top terms
[+]
OR
AND
NOT
1
acisp
analysis
attack
attacks
conference
cryptanalysis
efficient
encryption
identity
information
key
new
privacy
public
scheme
schemes
secure
security
signature
using
ACISP (acisp)
Editions
Publications
Viewing Publication 1 - 100 from 1191
2025
FlexiADKG: A Flexible Asynchronous Distributed Key Generation Protocol with Constant Round Complexity
Yang Yang 0062
,
Bingyu Li
,
Zhenyang Ding
,
Qianhong Wu
,
Bo Qin
,
Qin Wang 0008
.
acisp 2025
:
269-288
[doi]
MG-Det: Deepfake Detection with Multi-granularity
Ahmed Asiri
,
Luoyu Chen
,
Zhiyi Tian
,
Xiaoyu Ding
,
Shui Yu 0001
.
acisp 2025
:
227-244
[doi]
LPIA: Label Preference Inference Attack Against Federated Graph Learning
Jiaxue Bai
,
Lu Shi
,
Yang Liu
,
Weizhe Zhang
.
acisp 2025
:
245-264
[doi]
Cryptanalysis of Fruit-F: Exploiting Key-Derivation Weaknesses and Initialization Vulnerabilities
Subhadeep Banik
,
Hailun Yan
.
acisp 2025
:
23-37
[doi]
Code-Based Fully Dynamic Accountable Ring Signatures and Group Signatures Using the Helper Methodology
Rishiraj Bhattacharyya
,
Sreehari Kollath
,
Christophe Petit 0001
.
acisp 2025
:
84-103
[doi]
Efficient Multi-instance Vector Commitment and Application to Post-quantum Signatures
Dung Bui
.
acisp 2025
:
23-41
[doi]
Faster VOLEitH Signatures from All-But-One Vector Commitment and Half-Tree
Dung Bui
,
Kelong Cong
,
Cyprien Delpech de Saint Guilhem
.
acisp 2025
:
205-223
[doi]
Guaranteed Termination Asynchronous Complete Secret Sharing with Lower Communication and Optimal Resilience
Ying Cai
,
Chengyi Qin
,
Mingqiang Wang
.
acisp 2025
:
297-318
[doi]
Refined Error Management for Gate Bootstrapping
Chunling Chen
,
Xianhui Lu
,
Binwu Xiang
,
Bowen Huang
,
Ruida Wang
,
Yijian Liu
.
acisp 2025
:
252-274
[doi]
DeGain: Detecting GAN-Based Data Inversion in Collaborative Deep Learning
Zhenzhu Chen
,
Yansong Gao 0001
,
Anmin Fu
,
Fanjian Zeng
,
Boyu Kuang
,
Robert H. Deng
.
acisp 2025
:
167-185
[doi]
Indifferentiability Separations in Ideal Public Key Encryption: Explicit vs. Implicit Rejection
Yao Cheng
,
Xianhui Lu
,
Ziyi Li
,
Yongjian Yin
.
acisp 2025
:
140-160
[doi]
Ideal Transformations for Public Key Encryption
Yao Cheng
,
Xianhui Lu
,
Ziyi Li
.
acisp 2025
:
119-139
[doi]
Improved Differential Meet-in-the-Middle Cryptanalysis on SIMON and Piccolo
Weiqing Deng
,
Jianing Zhang
,
Haoyang Wang
.
acisp 2025
:
78-97
[doi]
Breaking the Shield: Novel Fault Attacks on CRYSTALS-Dilithium
Dixiao Du
,
Yuejun Liu
,
Yiwen Gao 0001
,
Jingdian Ming
,
Hao Yuan
,
Yongbin Zhou
.
acisp 2025
:
42-63
[doi]
RAGLeak: Membership Inference Attacks on RAG-Based Large Language Models
Kaiyue Feng
,
Guangsheng Zhang 0004
,
Huan Tian
,
Heng Xu
,
Yanjun Zhang
,
Tianqing Zhu
,
Ming Ding 0001
,
Bo Liu 0001
.
acisp 2025
:
147-166
[doi]
SoK: A Deep Dive Into Anti-money Laundering Techniques for Blockchain Cryptocurrencies
Qishuang Fu
,
Joseph K. Liu
,
Shirui Pan
,
Tsz Hon Yuen
.
acisp 2025
:
310-330
[doi]
Advanced Temporal Graph Embedding for Detecting Fraudulent Transactions on Complex Blockchain Transactional Networks
Jianbin Gao
,
Badjie Ansu
,
Qi Xia
,
Patrick Mukala
,
Hu Xia
,
Grace Mupoyi Ntuala
.
acisp 2025
:
331-350
[doi]
Anonymous Credentials with Credential Redaction and Its Application to SSI-Based Plug&Charge for Shared Vehicles
Kyosuke Hatsugai
,
Kyoichi Asano
,
Yuki Sawai
,
Yohei Watanabe 0001
,
Mitsugu Iwamoto
.
acisp 2025
:
42-62
[doi]
Strong Federated Authentication With Password-Based Credential Against Identity Server Corruption
Changsong Jiang
,
Chunxiang Xu
,
Guomin Yang
,
Li Duan
,
Jing Wang 0036
.
acisp 2025
:
22-41
[doi]
Three-Round (Robust) Threshold ECDSA from Threshold CL Encryption
Bowen Jiang
,
GuoFeng Tang
,
Haiyang Xue
.
acisp 2025
:
224-244
[doi]
Identifying the Truth of Global Model: A Generic Solution to Defend Against Byzantine and Backdoor Attacks in Federated Learning
Sheldon C. Ebron Jr.
,
Meiying Zhang
,
Kan Yang 0001
.
acisp 2025
:
127-146
[doi]
Strengthening Key Scheduling of AES-256 with Minimal Software Modifications
Shoma Kawakami
,
Kazuma Taka
,
Atsushi Tanaka
,
Tatsuya Ishikawa
,
Takanori Isobe 0001
.
acisp 2025
:
98-115
[doi]
Get Rid of Templates: A Chosen-Ciphertext Attack on ML-KEM with a DPA-Based Self-comparison Oracle
Zhenzhi Lai
,
Udaya Parampalli
.
acisp 2025
:
187-207
[doi]
TEAKEX: TESLA-Authenticated Group Key Exchange
Qinyi Li
,
Lise Millerjord
,
Colin Boyd
.
acisp 2025
:
289-309
[doi]
Exploring Key-Recovery-Friendly Differential Distinguishers for SM4 and Their Performance in Differential Attacks
Bingqing Li
,
Ling Sun
.
acisp 2025
:
38-57
[doi]
KD-IBMRKE-PPFL: A Privacy-Preserving Federated Learning Framework Integrating Knowledge Distillation and Identity-Based Multi-receiver Key Encapsulation
Yuan Li
,
Changji Wang
,
Shiwen Hu
.
acisp 2025
:
105-123
[doi]
Sentence Embedding Generation Method for Differential Privacy Protection
Yangyang Liu
,
Wanqi Wang
,
Jingyu Hua
.
acisp 2025
:
84-104
[doi]
Shortest Printable Shellcode Encoding Algorithm Based on Dynamic Bitwidth Selection
Guoan Liu
,
Jian Lin
,
Weiyu Dong
,
Jiaan Liu
,
Tieming Liu
.
acisp 2025
:
447-458
[doi]
Compact Lifting for NTT-Unfriendly Modulus
Ying Liu
,
Xianhui Lu
,
Yu Zhang
,
Ruida Wang
,
Ziyao Liu
,
Kunpeng Wang
.
acisp 2025
:
277-296
[doi]
Fiat-Shamir with Rejection and Rotation
Xianhui Lu
,
Yongjian Yin
,
Dingding Jia
,
Jingnan He
,
Yamin Liu
,
Yijian Liu
,
Hongbo Liu
.
acisp 2025
:
145-165
[doi]
Ransomware Encryption Detection: Adaptive File System Analysis Against Evasive Encryption Tactics
Arash Mahboubi
,
Hamed Aboutorab
,
Seyit Camtepe
,
Hang Thanh Bui
,
Khanh Luong
,
Keyvan Ansari
,
Shenlu Wang
,
Bazara I. A. Barry
.
acisp 2025
:
399-414
[doi]
Mitigating the Unprivileged User Namespaces Based Privilege Escalation Attacks with Linux Capabilities
Jingzi Meng
,
Yuewu Wang
,
Lingguang Lei
,
Chunjing Kou
,
Peng Wang
,
Huawei Lu
.
acisp 2025
:
329-347
[doi]
PPSCCC: Privacy-Preserving Scalable Cross-Chain Communication Among Multiple Blockchains Based on Parent-Child Blockchain
Hideaki Miyaji
,
Noriaki Kamiyama
.
acisp 2025
:
372-392
[doi]
Efficient Revocable Identity-Based Encryption from Middle-Product LWE
Takumi Nishimura
,
Atsushi Takayasu
.
acisp 2025
:
64-83
[doi]
Forgery Attacks on SipHash
Kosuke Sasaki
,
Rikuto Kurahara
,
Kosei Sakamoto
,
Takanori Isobe 0001
.
acisp 2025
:
3-22
[doi]
Partial Key Exposure Attacks on UOV and Its Variants
Yuki Seto
,
Hiroki Furue
,
Atsushi Takayasu
.
acisp 2025
:
104-123
[doi]
EAPIR: Efficient and Authenticated Private Information Retrieval with Fast Server Processing
Hua Shen
,
Xinjie Li
,
Zhen Fan
,
Ge Wu
,
Mingwu Zhang
.
acisp 2025
:
391-398
[doi]
Solving Generalized Approximate Divisor Multiples Problems
Naoki Shimoe
,
Noboru Kunihiro
.
acisp 2025
:
319-339
[doi]
Comparing and Improving Frequency Estimation Perturbation Mechanisms Under Local Differential Privacy
She Sun
,
Jiafei Wu
,
Jian Yang
,
Li Zhou
,
Huiwen Wu
.
acisp 2025
:
3-21
[doi]
Information Security and Privacy - 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025, Proceedings, Part II
Willy Susilo
,
Josef Pieprzyk
, editors,
Volume 15659 of
Lecture Notes in Computer Science
, Springer,
2025.
[doi]
Information Security and Privacy - 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025, Proceedings, Part III
Willy Susilo
,
Josef Pieprzyk
, editors,
Volume 15660 of
Lecture Notes in Computer Science
, Springer,
2025.
[doi]
Information Security and Privacy - 30th Australasian Conference, ACISP 2025, Wollongong, NSW, Australia, July 14-16, 2025, Proceedings, Part I
Willy Susilo
,
Josef Pieprzyk
, editors,
Volume 15658 of
Lecture Notes in Computer Science
, Springer,
2025.
[doi]
High-Precision Homomorphic Modular Reduction for CKKS Bootstrapping
Zejiu Tan
,
Junping Wan
,
Zoe L. Jiang
,
Jingjing Fan
,
Man Ho Au
,
Siu-Ming Yiu
.
acisp 2025
:
232-251
[doi]
Lattice Attack with EHNP: Key Recovery from Two ECDSA Signatures and Breaking the Information-Theoretic Limit
Tianyou Tang
,
Shuqin Fan
.
acisp 2025
:
245-266
[doi]
sfGlitter: A Fully Adaptive and Tightly Secure Threshold Signature
Shaolong Tang
,
Peng Jiang 0007
,
Liehuang Zhu
.
acisp 2025
:
184-204
[doi]
Walnut: A Generic Framework with Enhanced Scalability for BFT Protocols
Lei Tian
,
Chenke Wang
,
Yu Long 0001
,
Xian Xu 0001
,
Mingchao Wan
,
Chunmiao Li
,
Shifeng Sun 0001
,
Dawu Gu
.
acisp 2025
:
351-371
[doi]
Unbounded Multi-hop Proxy Re-encryption with HRA Security: An LWE-Based Optimization
Xiaohan Wan
,
Yang Wang
,
Haiyang Xue
,
Mingqiang Wang
.
acisp 2025
:
124-144
[doi]
Accountability for Server Misbehavior in Homomorphic Secret Sharing
Xinzhou Wang
,
Shifeng Sun 0001
,
Dawu Gu
,
Yuan Luo 0003
.
acisp 2025
:
211-231
[doi]
Inner Product Masked Integral Distinguishers and Integral Sets over Large Finite Fields - Applications to MiMC, CIMINION and Chaghri
Weizhe Wang
,
Deng Tang
,
Haoyang Wang
.
acisp 2025
:
58-77
[doi]
Amoeba: More Flexible RLWE-Based KEM
Qingfeng Wang
,
Li-Ping Wang
.
acisp 2025
:
166-186
[doi]
DARA: Enhancing Vulnerability Alignment via Adaptive Reconstruction and Dual-Level Attention
Lihua Wang
,
Jiaojiao Jiang
,
Salil S. Kanhere
,
Jiamou Sun
,
Sanjay K. Jha
,
Zhenchang Xing
.
acisp 2025
:
265-284
[doi]
DPFedSub: A Differentially Private Federated Learning with Randomized Subspace Descend
Huiwen Wu
,
Chuan Ma
,
Xueran Li
,
Deyi Zhang
,
Xiaohan Li
,
She Sun
.
acisp 2025
:
207-226
[doi]
Receiver-Initiated Updatable Public Key Encryption: Construction, Security and Application
Jiahao Xuan
.
acisp 2025
:
415-428
[doi]
Compressed Sigma Protocols: New Model and Aggregation Techniques
Yuxi Xue
,
Tianyu Zheng
,
Shang Gao 0006
,
Bin Xiao 0001
,
Man Ho Au
.
acisp 2025
:
163-183
[doi]
Direction-Oriented Smooth Sensitivity and Its Application to Genomic Statistical Analysis
Akito Yamamoto
,
Tetsuo Shibuya
.
acisp 2025
:
63-83
[doi]
SoK: From Systematization to Best Practices in Fuzz Driver Generation
Qian Yan
,
Minhuan Huang
,
Huayang Cao
,
Shuaibing Lu
.
acisp 2025
:
348-368
[doi]
FRFL: Fair and Robust Federated Learning Incentive Model Based on Game Theory
Haocheng Ye
,
Lu Zhou
,
Hao Wang
,
Chunpeng Ge 0001
.
acisp 2025
:
186-206
[doi]
Facial Authentication Security Evaluation Against Deepfake Attacks in Mobile Apps
Chuer Yu
,
Siyi Xia
,
Haoyu Wang
,
Xia Liu
,
Zonghui Wang
,
Lirong Fu
,
Zhiyuan Wan
,
Yandong Gao
,
Yang Xiang
,
Wenzhi Chen
.
acisp 2025
:
369-388
[doi]
Understanding the Robustness of Machine-Unlearning Models
Guanqin Zhang
,
Feng Xu
,
H. M. N. Dilum Bandara
,
Shiping Chen 0001
,
Yulei Sui
.
acisp 2025
:
307-326
[doi]
Towards Quantum Security of Hirose Compression Function and Romulus-H
Shaoxuan Zhang
,
Chun Guo 0002
,
Meiqin Wang
.
acisp 2025
:
3-22
[doi]
Bridging Clone Detection and Industrial Compliance: A Practical Pipeline for Enterprise Codebases
Xiaowei Zhang
,
Shigang Liu
,
Jun Zhang
,
Yang Xiang
.
acisp 2025
:
461-479
[doi]
Zeroth-Order Federated Private Tuning for Pretrained Large Language Models
Xiaoyu Zhang
,
Yong Lin
,
Meixia Miao
,
Jian Lou
,
Jin Li
,
Xiaofeng Chen
.
acisp 2025
:
285-306
[doi]
Robust and Privacy-Preserving Dynamic Average Consensus with Individual Weight
Yuanyuan Zhang
,
Yu Liu
,
Yahui Wang
,
Tianqing Zhu
,
Mingwu Zhang
.
acisp 2025
:
429-437
[doi]
Improving RSA Cryptanalysis: Combining Continued Fractions and Coppersmith's Techniques
Mengce Zheng
,
Yansong Feng 0001
,
Abderrahmane Nitaj
,
Yanbin Pan
.
acisp 2025
:
438-446
[doi]
2024
Tight Multi-user Security of Ascon and Its Large Key Extension
Bishwajit Chakraborty 0002
,
Chandranan Dhar
,
Mridul Nandi
.
acisp 2024
:
57-76
[doi]
DualRing-PRF: Post-quantum (Linkable) Ring Signatures from Legendre and Power Residue PRFs
Xinyu Zhang 0017
,
Ron Steinfeld
,
Joseph K. Liu
,
Muhammed F. Esgin
,
Dongxi Liu
,
Sushmita Ruj
.
acisp 2024
:
124-143
[doi]
Understanding Privacy in Smart Speakers: A Narrative Review
Abdulrhman Alorini
,
Abdullah Bin Sawad
,
Sultan Alharbi
,
Kiran Ijaz
,
Mukesh Prasad
,
Ahmet Baki Kocaballi
.
acisp 2024
:
143-157
[doi]
Algebraic Cryptanalysis of the HADES Design Strategy: Application to Poseidon and Poseidon2
Tomer Ashur
,
Thomas Buschman
,
Mohammad Mahzoun
.
acisp 2024
:
225-244
[doi]
Automatic Quantum Multi-collision Distinguishers and Rebound Attacks with Triangulation Algorithm
Zhenzhen Bao
,
Jian Guo 0001
,
Shun Li
,
Phuong Pham
.
acisp 2024
:
24-43
[doi]
Hidden $\varDelta $-Fairness: A Novel Notion for Fair Secure Two-Party Computation
Saskia Bayreuther
,
Robin Berger
,
Felix Dörre
,
Jeremias Mechler
,
Jörn Müller-Quade
.
acisp 2024
:
330-349
[doi]
Revisiting Impossible Differential Cryptanalysis and Expanding the Application of MILP in Impossible Differential Attack
Weiwei Cao
.
acisp 2024
:
245-265
[doi]
SynBoost: Robust Text Generation Model via Beam Search and Synonym-Driven Boosting
Depeng Chen
,
Mengdie Xia
,
Jie Cui
.
acisp 2024
:
277-287
[doi]
F-FHEW: High-Precision Approximate Homomorphic Encryption with Batch Bootstrapping
Man Chen
,
Yuyue Chen
,
Rui Zong
,
Zengpeng Li
,
Zoe L. Jiang
.
acisp 2024
:
121-140
[doi]
Subverting Cryptographic Protocols from a Fine-Grained Perspective- A Case Study on 2-Party ECDSA
Jialiu Cheng
,
Yi Wang 0055
,
Rongmao Chen
,
Xinyi Huang 0001
.
acisp 2024
:
370-390
[doi]
Pirates: Anonymous Group Calls over Fully Untrusted Infrastructure
Christoph Coijanovic
,
Akim Stark
,
Daniel Schadt
,
Thorsten Strufe
.
acisp 2024
:
193-212
[doi]
Continuous Version of Non-malleable Codes from Authenticated Encryption
Anit Kumar Ghosal
,
Dipanwita Roychowdhury
.
acisp 2024
:
324-344
[doi]
đisplaystyle sfHERatio: Homomorphic Encryption of Rationals Using Laurent Polynomials
Luke Harmon
,
Gaetan Delavignette
,
Hanes Oliveira
.
acisp 2024
:
180-195
[doi]
Towards Private Multi-operator Network Slicing
Blake Haydon
,
Shangqi Lai
,
Xingliang Yuan
,
Sharif Abuadbba
,
Carsten Rudolph
.
acisp 2024
:
359-379
[doi]
Approximate Methods for the Computation of Step Functions in Homomorphic Encryption
Tairong Huang
,
Shihe Ma
,
Anyu Wang 0001
,
Xiaoyun Wang 0001
.
acisp 2024
:
217-237
[doi]
Pushing the Limit of Vectorized Polynomial Multiplications for NTRU Prime
Vincent Hwang
.
acisp 2024
:
84-102
[doi]
NTRU-Based FHE for Larger Key and Message Space
Robin Jadoul
,
Axel Mertens
,
Jeongeun Park 0001
,
Hilder V. L. Pereira
.
acisp 2024
:
141-160
[doi]
Jumping for Bernstein-Yang Inversion
Li-Jie Jian
,
Ting-Yuan Wang
,
Bo-Yin Yang
,
Ming-Shing Chen
.
acisp 2024
:
103-123
[doi]
Differential Distinguishing Attacks on SNOW-V, SNOW-Vi and KCipher-2
Rikuto Kurahara
,
Kosei Sakamoto
,
Yuto Nakano
,
Takanori Isobe 0001
.
acisp 2024
:
77-97
[doi]
A Novel Window τNAF on Koblitz Curves
Xiuxiu Li
,
Wei Yu 0008
,
Kunpeng Wang
.
acisp 2024
:
411-428
[doi]
AlgSAT - A SAT Method for Verification of Differential Trails from an Algebraic Perspective
Huina Li
,
Haochen Zhang
,
Kai Hu
,
Guozhen Liu
,
Weidong Qiu
.
acisp 2024
:
450-471
[doi]
The Offline Quantum Attack Against Modular Addition Variant of Even-Mansour Cipher
Fangzhou Liu
,
Xueqi Zhu
,
Ruozhou Xu
,
Danping Shi
,
Peng Wang 0009
.
acisp 2024
:
3-19
[doi]
FXChain: A Multi-consortium Permissioned Blockchain with Flexible Privacy-Preserving Strategies
Zenan Lou
,
Na Ruan
,
Yuxiang Cai
.
acisp 2024
:
24-43
[doi]
Non-interactive Publicly Verifiable Searchable Encryption with Forward and Backward Privacy
Zhilong Luo
,
Shifeng Sun 0001
,
Zhedong Wang
,
Dawu Gu
.
acisp 2024
:
281-302
[doi]
Deep Dive on Relationship Between Personality and Password Creation
Madeline Moran
,
Arrianna Szymczak
,
Anna Hart
,
Shelia Kennison
,
Eric Chan-Tin
.
acisp 2024
:
393-411
[doi]
SecuPath: A Secure and Privacy-Preserving Multiparty Path Planning Framework in UAV Applications
Yanjun Shen
,
Joseph K. Liu
,
Xingliang Yuan
,
Shifeng Sun 0001
,
Hui Cui 0001
.
acisp 2024
:
213-232
[doi]
Size-Hiding Computation in the Honest-But-Curious Model
Kazumasa Shinagawa
.
acisp 2024
:
311-329
[doi]
Faster Verifications and Smaller Signatures: Trade-Offs for ALTEQ Using Rejections
Arnaud Sipasseuth
.
acisp 2024
:
144-163
[doi]
On the Implications from Updatable Encryption to Public-Key Cryptographic Primitives
Yuichi Tanishita
,
Ryuya Hayashi
,
Ryu Ishii
,
Takahiro Matsuda 0002
,
Kanta Matsuura
.
acisp 2024
:
303-323
[doi]
TFHE Bootstrapping: Faster, Smaller and Time-Space Trade-Offs
Ruida Wang
,
Benqiang Wei
,
Zhihao Li
,
Xianhui Lu
,
Kunpeng Wang
.
acisp 2024
:
196-216
[doi]
Formal Verification of Challenge Flow in EMV 3-D Secure
Kakeru Watanabe
,
Kazuki Yoneyama
.
acisp 2024
:
290-310
[doi]
Hadamard Product Argument from Lagrange-Based Univariate Polynomials
Jie Xie
,
Yuncong Hu
,
Yu Yu
.
acisp 2024
:
472-492
[doi]
MMOOC: A Multimodal Misinformation Dataset for Out-of-Context News Analysis
Qingzheng Xu
,
Heming Du
,
Huiqiang Chen
,
Bo Liu 0001
,
Xin Yu 0002
.
acisp 2024
:
444-459
[doi]
On the Security Bounds for Block Ciphers Without Whitening Key Addition Against Integral Distinguishers
Fanyang Zeng
,
Tian Tian
.
acisp 2024
:
41-56
[doi]
Information Security and Privacy - 29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15-17, 2024, Proceedings, Part III
Tianqing Zhu
,
Yannan Li
, editors,
Volume 14897 of
Lecture Notes in Computer Science
, Springer,
2024.
[doi]
Information Security and Privacy - 29th Australasian Conference, ACISP 2024, Sydney, NSW, Australia, July 15-17, 2024, Proceedings, Part II
Tianqing Zhu
,
Yannan Li
, editors,
Volume 14896 of
Lecture Notes in Computer Science
, Springer,
2024.
[doi]
Sign in
or
sign up
to see more results.