Information Security and Privacy

17th Australasian Conference, ACISP 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings

  • Willy Susilo
  • Yi Mu
  • Jennifer Seberry

Part of the Lecture Notes in Computer Science book series (LNCS, volume 7372)

Table of contents

  1. Front Matter
  2. Fundamentals

    1. Kaori Tosu, Noboru Kunihiro
      Pages 1-14
    2. Atsushi Fujioka, Mark Manulis, Koutarou Suzuki, Berkant Ustaoğlu
      Pages 15-28
    3. Haruna Higo, Keisuke Tanaka, Akihiro Yamada, Kenji Yasunaga
      Pages 29-42
  3. Cryptanalysis

    1. Yu Sasaki, Sareh Emami, Deukjo Hong, Ashish Kumar
      Pages 87-100
    2. Jiazhe Chen, Leibo Li
      Pages 101-114
    3. Xianmeng Meng, Xuexin Zheng
      Pages 115-123
    4. Jintai Ding, Yanbin Pan, Yingpu Deng
      Pages 124-137
  4. Message Authentication Codes and Hash Functions

    1. Mufeed ALMashrafi, Harry Bartlett, Leonie Simpson, Ed Dawson, Kenneth Koon-Ho Wong
      Pages 138-151
    2. Ewan Fleischmann, Christian Forler, Stefan Lucks, Jakob Wenzel
      Pages 152-165
  5. Public Key Cryptography

    1. K. Preetha Mathew, Sachin Vasant, Sridhar Venkatesan, C. Pandu Rangan
      Pages 166-179
    2. Kirill Morozov, Tsuyoshi Takagi
      Pages 180-193
    3. Jothi Rangasamy, Douglas Stebila, Colin Boyd, Juan Manuel González-Nieto, Lakshmi Kuppusamy
      Pages 194-207
    4. Manh Ha Nguyen, Keisuke Tanaka, Kenji Yasunaga
      Pages 208-222
  6. Digital Signatures

About these proceedings


This book constitutes the refereed proceedings of the 17th Australasian Conference on Information Security and Privacy, ACISP 2012, held in Wollongong, Australia, in July 2012. The 30 revised full papers presented together with 5 short papers were carefully reviewed and selected from 89 submissions. The papers are organized in topical sections on fundamentals; cryptanalysis; message authentication codes and hash functions; public key cryptography; digital signatures; identity-based and attribute-based cryptography; lattice-based cryptography; lightweight cryptography.


RSA attack cipher compression encryption

Editors and affiliations

  • Willy Susilo
    • 1
  • Yi Mu
    • 2
  • Jennifer Seberry
    • 3
  1. 1.School of Computer Science and Software EngineeringUniversity of WollongongWollongongAustralia
  2. 2.School of Computer Science and Software EngineeringUniversity of WollongongWollongongAustralia
  3. 3.School of Computer Science and Software EngineeringUniversity of WollongongWollongongAustralia

Bibliographic information

  • DOI
  • Copyright Information Springer-Verlag Berlin Heidelberg 2012
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-642-31447-6
  • Online ISBN 978-3-642-31448-3
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • About this book
Industry Sectors
Consumer Packaged Goods