|
Showing 1 - 3 of
3 matches in All Departments
|
Selected Areas in Cryptography - 16th International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers (Paperback, 2009 ed.)
Michael J. Jacobson, Vincent Rijmen, Rei Safavi-Naini
|
R1,655
Discovery Miles 16 550
|
Ships in 10 - 15 working days
|
The 16th Workshop on Selected Areas in Cryptography (SAC 2009) was
held at the University of Calgary,in Calgary, Alberta, Canada,
during August 13-14, 2009. There were 74 participants from 19
countries. Previous workshops in this series were held at Queens
University in Kingston (1994, 1996, 1998, 1999, and 2005), Carleton
University in Ottawa (1995, 1997, and 2003), University of - terloo
(2000 and 2004), Fields Institute in Toronto (2001), Memorial
University of Newfoundland in St. Johns (2002), Concordia
University in Montreal (2006), University of Ottawa (2007), and
Mount Allison University in Sackville (2008). The themes for SAC
2009 were: 1. Design and analysis of symmetric key primitives and
cryptosystems, incl- ing block and stream ciphers, hash functions,
and MAC algorithms 2. E?cient implementations of symmetric and
public key algorithms 3. Mathematical and algorithmic aspects of
applied cryptology 4. Privacy enhancing cryptographic systems This
included the traditional themes (the ?rst three) together with a
special theme for 2009 workshop (fourth theme).
The refereed proceedings of the 8th Australasian Conference on Information Security and Privacy, ACISP 2003, held in Wollongong, Australia, in July 2003. The 42 revised full papers presented together with 3 invited contributions were carefully reviewed and selected from 158 submissions. The papers are organized in topical sections on privacy and anonymity, elliptic curve cryptography, cryptanalysis, mobile and network security, digital signatures, cryptosystems, key management, and theory and hash functions.
|
Information Security and Privacy - 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings (Paperback)
Josef Pieprzyk, Rei Safavi-Naini, Jennifer Seberry
|
R1,727
Discovery Miles 17 270
|
Ships in 10 - 15 working days
|
The4thAustralasianConferenceonInformationSecurityandPrivacywasheld
attheUniversityofWollongong, Australia. Theconferencewassponsoredby
theCentreforComputerSecurityResearch, UniversityofWollongong,
andthe AustralianComputerSociety.
Theaimoftheconferencewastobringtogether peopleworkingindi
erentareasofcomputer, communication, andinformation
securityfromuniversities, industry, andgovernmentinstitutions.
Theconference
gavetheparticipantsanopportunitytodiscussthelatestdevelopmentsinthe
quicklygrowingareaofinformationsecurityandprivacy.
Theprogramcommitteeaccepted26papersfrom53submitted. Fromthose
accepted, thirteen papers were from Australia, two each from
Belgium and China, andoneeachfromAustria, Belarus, France, India,
Japan, Korea, Sin- pore, theUSA, andYugoslavia.
Conferencesessionscoveredthefollowingtopics:
accesscontrolandsecuritymodels, networksecurity, Booleanfunctions,
group communication, cryptanalysis, keymanagementsystems,
electroniccommerce, signatureschemes, RSAcryptosystems,
andoddsandends. We would like to thank the members of the program
committee who -
nerouslyspenttheirtimereadingandevaluatingthepapers.
Wewouldalsolike tothankmembersoftheorganisingcommitteeand,
inparticular, ChrisCh- nes, HosseinGhodosi, MarcGysin,
Tiang-BingXia, Cheng-XinQu, SanYeow Lee, YejingWang, Hua-XiongWang,
Chih-HungLi, WillySusilo, ChintanShah, Je reyHorton,
andGhulamRasoolChaudhryfortheircontinuousandtireless e
ortinorganisingtheconference. Finally,
wewouldliketothanktheauthorsof allthesubmittedpapers,
especiallytheacceptedones, andalltheparticipants
whomadetheconferenceasuccessfulevent. February1999 JosefPieprzyk
ReiSafavi-Naini JenniferSeberry FOURTHAUSTRALASIANCONFERENCE
ONINFORMATIONSECURITY ANDPRIVACY ACISP 99 Sponsoredby
CenterforComputerSecurityResearch UniversityofWollongong, Australia
and AustralianComputerSociety GeneralChair: JenniferSeberry
UniversityofWollongong ProgramCo-Chairs: JosefPieprzyk
UniversityofWollongong ReiSafavi-Naini UniversityofWollongong
ProgramCommittee: ColinBoyd QueenslandUniversityofTechnology,
Australia LawrieBrown AustralianDefenceForceAcademy, Australia
BillCaelli QueenslandUniversityofTechnology, Australia EdDawson
QueenslandUniversityofTechnology, Australia CunshengDing
NationalUniversityofSingapore, Singapore DieterGollmann
MicrosoftResearch, UK YongfeiHan Gemplus, Singapore ThomasHardjono
BayNetworks, US ErlandJonsson ChalmersUniversity, Sweden
SveinKnapskog UniversityofTrondheim, Norway KeithMartin
KatholiekeUniversiteitLeuven, Belgium CathyMeadows
NavalResearchLaboratory, US KaisaNyberg NokiaResearchCenter,
Finland Choon-SikPark
ElectronicsandTelecommunicationResearchInstitute, Korea DingyiPei
AcademiaSinica, China SteveRoberts WithamPtyLtd, Australia
ConferenceOrganization VII GregRose Qualcomm, Australia RaviSandhu
GeorgeMasonUniversity, US Sta ordTavares Queen sUniversity, Canada
VijayVaradharajan WesternSydneyUniversity, Australia YuliangZheng
MonashUniversity, Australia Referees N. Asokan ZhangJiang DingyiPei
YunBai ErlandJonsson JosefPieprzyk SimonBlackburn SveinKnapskog
VincentRijmen ColinBoyd HuLei SteveRoberts LawrieBrown
LeszekMaciaszek GregRose BillCaelli KeithMartin ReiSafavi-Naini
EdDawson CathyMeadows RaviSandhu CunshengDing BillMillan
RajanShankaran GaryGaskell QiMing Sta ordTavares JanuszGetta
Sang-JaeMoon VijayVaradharajan DieterGollmann YiMu Kapaleeswaran
MarcGysin KennyNguyen Viswanathan YongfeiHan KaisaNyberg ChuanWu
ThomasHardjono Choon-SikPark YuliangZheng. TableofContents
BooleanFunctions BooleanFunctionDesignUsingHillClimbingMethods
WilliamMillan, AndrewClark, andEdDawson. . . . . . . . . . . . . .
. . . . . . . . . . . . . . 1
EnumerationofCorrelationImmuneBooleanFunctions
SubhamoyMaitraandPalashSarkar. . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . 12
OntheSymmetricPropertyofHomogeneousBooleanFunctions ChengxinQu,
JenniferSeberry, andJosefPieprzyk. . . . . . . . . . . . . . . . .
. . . . . . . 26 KeyManagement PubliclyVeri
ableKeyEscrowwithLimitedTimeSpan KapaliViswanathan, ColinBoyd,
andEdDawson. . . . . . . . . . . . . . . . . . . . . . . . . 36
AcceleratingKeyEstablishmentProtocolsforMobileCommunication
SeungwonLee, Seong-MinHong, HyunsooYoon, andYookunCho. . . . . . .
. . 51 ConferenceKeyAgreementfromSecretSharing
Chih-HungLiandJosefPieprzyk . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . 64 Cryptanalysis
Onm-PermutationProtectionSchemeAgainstModi cationAttack W. W.
FungandJ. W. Gray, III. . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . 77
InversionAttackandBranching JovanDj. Golic, AndrewClark,
andEdDawson . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Signatures Fail-StopThresholdSignatureSchemesBasedonEllipticCurves
WillySusilo, ReiSafavi-Naini, andJosefPieprzyk. . . . . . . . . . .
. . . . . . . . . . . . 103
DivertibleZero-KnowledgeProofofPolynomialRelationsand
BlindGroupSignature KhanhQuocNguyen, YiMu, andVijayVaradharajan. .
. . . . . . . . . . . . . . . . . . 117
RepudiationofCheatingandNon-repudiationof Zhang
sProxySignatureSchemes HosseinGhodosiandJosefPieprzyk . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129 X
TableofContents RSACryptosystems
OntheSecurityofanRSABasedEncryptionScheme SigunaMul ]ler . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . 135
GeneralisedCyclingAttacksonRSAandStrongRSAPrimes
MarcGysinandJenniferSeberry. . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . 149
RSAAccelerationwithFieldProgrammableGateArrays
AlexanderTiountchikandElenaTrichina. . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . 164 GroupCryptography
ChangingThresholdsintheAbsenceofSecureChannels KeithM. Martin,
JosefPieprzyk, ReiSafavi-Naini, andHuaxiongWang . 177 ASelf-Certi
edGroup-OrientedCryptosystemWithoutaCombiner
ShahrokhSaeedniaandHosseinGhodosi . . . . . . . . . . . . . . . . .
. . .
|
You may like...
Come Boldly
C. S. Lewis
Hardcover
R299
Discovery Miles 2 990
|