


default search action
26th ACISP 2021: Virtual Event
- Joonsang Baek

, Sushmita Ruj
:
Information Security and Privacy - 26th Australasian Conference, ACISP 2021, Virtual Event, December 1-3, 2021, Proceedings. Lecture Notes in Computer Science 13083, Springer 2021, ISBN 978-3-030-90566-8
Cryptographic Foundations
- Sabyasachi Dutta

, Reihaneh Safavi-Naini:
Leakage Resilient Cheating Detectable Secret Sharing Schemes. 3-23 - Tapas Pal

, Ratna Dutta:
Chosen Ciphertext Secure Functional Encryption from Constrained Witness PRF. 24-45 - Behzad Abdolmaleki, Daniel Slamanig

:
Updatable Trapdoor SPHFs: Modular Construction of Updatable Zero-Knowledge Arguments and More. 46-67 - Steven D. Galbraith, Trey Li:

Small Superset and Big Subset Obfuscation. 68-87
Symmetric Primitives
- Fukang Liu, Takanori Isobe, Willi Meier, Zhonghao Yang

:
Algebraic Attacks on Round-Reduced Keccak. 91-110 - Muhammad ElSheikh

, Amr M. Youssef:
On MILP-Based Automatic Search for Bit-Based Division Property for Ciphers with (Large) Linear Layers. 111-131 - Xiaodan Li, Wenling Wu:

Constructions of Iterative Near-MDS Matrices with the Lowest XOR Count. 132-150 - Yanhong Fan, Weijia Wang

, Zhihu Li, Zhenyu Lu, Siu-Ming Yiu, Meiqin Wang:
Forced Independent Optimized Implementation of 4-Bit S-Box. 151-170 - Jin Hoki, Takanori Isobe, Ryoma Ito

, Fukang Liu, Kosei Sakamoto:
Distinguishing and Key Recovery Attacks on the Reduced-Round SNOW-V. 171-190
Encryption
- Xueqiao Liu

, Kai He
, Guomin Yang
, Willy Susilo
, Joseph Tonien
, Qiong Huang
:
Broadcast Authenticated Encryption with Keyword Search. 193-213 - Olivier Blazy, Sayantan Mukherjee

, Huyen Nguyen, Duong Hieu Phan
, Damien Stehlé:
An Anonymous Trace-and-Revoke Broadcast Encryption Scheme. 214-233 - Takanori Isobe, Ryoma Ito

:
Security Analysis of End-to-End Encryption for Zoom Meetings. 234-253 - Tapas Pal

, Ratna Dutta:
CCA Secure Attribute-Hiding Inner Product Encryption from Minimal Assumption. 254-274
Privacy
- Thomas Haines, Johannes Müller

:
Optimal Randomized Partial Checking for Decryption Mix Nets. 277-292 - Thomas Haines, Johannes Müller

:
A Novel Proof of Shuffle: Exponentially Secure Cut-and-Choose. 293-308 - Hikaru Tsuchida

, Takashi Nishide:
Private Decision Tree Evaluation with Constant Rounds via (Only) Fair SS-4PC. 309-329 - Geoffroy Couteau, A. W. Roscoe, Peter Y. A. Ryan:

Partially-Fair Computation from Timed-Release Encryption and Oblivious Transfer. 330-349
Blockchain - Protocols and Foundations
- Yannan Li

, Willy Susilo
, Guomin Yang
, Tran Viet Xuan Phuong
, Yong Yu
, Dongxi Liu:
Concise Mercurial Subvector Commitments: Definitions and Constructions. 353-371 - Yizhong Liu, Jianwei Liu

, Yiming Hei, Yu Xia, Qianhong Wu:
A Secure Cross-Shard View-Change Protocol for Sharding Blockchains. 372-390 - The Anh Ta, Thanh Xuan Khuc, Tuong Ngoc Nguyen, Huy Quoc Le, Dung Hoang Duong, Willy Susilo

, Kazuhide Fukushima
, Shinsaku Kiyomoto:
Efficient Unique Ring Signature for Blockchain Privacy Protection. 391-407 - Zongyang Zhang, Tong Li, Zhuo Wang, Jianwei Liu:

Redactable Transactions in Consortium Blockchain: Controlled by Multi-authority CP-ABE. 408-429
Blockchain - Analysis and Attack
- Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Dongxi Liu:

Transparency or Anonymity Leak: Monero Mining Pools Data Publication. 433-450 - Wei-Yang Chiu

, Weizhi Meng
:
Mind the Scraps: Attacking Blockchain Based on Selfdestruct. 451-469
Machine Learning for Privacy
- Minfeng Qi

, Ziyuan Wang, Fan Wu, Rob Hanson, Shiping Chen
, Yang Xiang
, Liming Zhu:
A Blockchain-Enabled Federated Learning Model for Privacy Preservation: System Design. 473-489 - Jikun Chen, Ruoyu Deng, Hongbin Chen, Na Ruan, Yao Liu, Chao Liu, Chunhua Su:

ALRS: An Adversarial Noise Based Privacy-Preserving Data Sharing Mechanism. 490-509 - Carlo Brunetta, Georgia Tsaloli, Bei Liang, Gustavo Banegas

, Aikaterini Mitrokotsa
:
Non-interactive, Secure Verifiable Aggregation for Decentralized, Privacy-Preserving Learning. 510-528
Machine Learning - Analysis and Attack
- Wei Zong

, Yang-Wai Chow
, Willy Susilo
:
Towards Visualizing and Detecting Audio Adversarial Examples for Automatic Speech Recognition. 531-549 - Liuqiao Chen, Hu Wang, Benjamin Zi Hao Zhao, Minhui Xue

, Haifeng Qian:
Oriole: Thwarting Privacy Against Trustworthy Deep Learning Models. 550-568
Post Quantum Cryptography - Encryption
- Priyanka Dutta

, Willy Susilo
, Dung Hoang Duong, Partha Sarathi Roy
:
Puncturable Identity-Based Encryption from Lattices. 571-589 - Chao Liu, Anyu Wang

, Zhongxiang Zheng:
Optimizing Bootstrapping and Evaluating Large FHE Gates in the LWE-Based GSW-FHE. 590-609 - Jing Pan, Xiaofeng Chen, Fangguo Zhang

, Willy Susilo
:
Forward-Secure Group Encryptions from Lattices. 610-629 - Xavier Boyen, Ernest Foo

, Qinyi Li:
Anonymous Lattice Identity-Based Encryption with Traceable Identities. 630-649
Post Quantum Cryptography - Authentication
- Jung Hee Cheon, Dongwoo Kim

, Duhyeong Kim, Joohee Lee
, Junbum Shin, Yongsoo Song:
Lattice-Based Secure Biometric Authentication for Hamming Distance. 653-672 - Handong Cui

, Tsz Hon Yuen
:
A Trustless GQ Multi-signature Scheme with Identifiable Abort. 673-693 - Mahmoud Yehia, Riham AlTawy, T. Aaron Gulliver:

Verifiable Obtained Random Subsets for Improving SPHINCS+. 694-714

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














