LEADER 05163nam 22008895 450 001 9910483330403321 005 20200630180003.0 010 $a3-642-39059-5 024 7 $a10.1007/978-3-642-39059-3 035 $a(CKB)2560000000105689 035 $a(DE-He213)978-3-642-39059-3 035 $a(SSID)ssj0000936549 035 $a(PQKBManifestationID)11542654 035 $a(PQKBTitleCode)TC0000936549 035 $a(PQKBWorkID)10974790 035 $a(PQKB)11607422 035 $a(MiAaPQ)EBC3096819 035 $a(PPN)170493059 035 $a(EXLCZ)992560000000105689 100 $a20130615d2013 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aInformation Security and Privacy$b[electronic resource] $e18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013, Proceedings /$fedited by Colin Boyd, Leonie Simpson 205 $a1st ed. 2013. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2013. 215 $a1 online resource (XII, 437 p. 70 illus.) 225 1 $aSecurity and Cryptology ;$v7959 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-39058-7 320 $aIncludes bibliographical references and author index. 327 $aAnalysing the IOBC authenticated encryption mode -- A Chosen IV Related Key Attack on Grain -- Cryptanalysis of Helix and Phelix Revisited -- Toward Separating the Strong Adaptive Pseudo-Freeness from the Strong RSA Assumption -- Minkowski sum based lattice construction for multivariate simultaneous -- Coppersmith's technique and applications to RSA -- Lattices and security proofs -- Adaptive Precision Floating Point LL -- Better Lattice Constructions for Solving Multivariate Linear Equations Modulo Unknown Divisors -- Key-Dependent Message Chosen-Ciphertext Security of the Cramer-Shoup Cryptosystem -- Black-Box Separations and their Adaptability to the Non-Uniform Model -- Injective Encodings to Elliptic Curves -- Membership Encryption and Its Applications -- Towards Privacy Preserving Mobile Internet Communications -- Count-min sketches for estimating password frequency with Hamming Distance -- Secret sharing -- A rational secret sharing protocol with unconditional security in the synchronous setting -- Secret Sharing Schemes with Conversion Protocol to Achieve Short Share-Size and Extendibility to Multiparty Computation. 330 $aThis book constitutes the refereed conference proceedings of the 18th Australasian Conference on Information Security and Privacy, ACISP 2013, held in Brisbane, Australia, in July 2013. The 28 revised full papers presented were carefully selected from 78 submissions. Conference papers are organized in technical sessions, covering topics of Cryptoanalysis, RSA, Lattices and Security Proofs, Public Key Cryptography, Hashing, Signatures, Passwords, Mobile Security, and Secret Sharing. 410 0$aSecurity and Cryptology ;$v7959 606 $aComputer security 606 $aData encryption (Computer science) 606 $aManagement information systems 606 $aComputer science 606 $aCoding theory 606 $aInformation theory 606 $aApplication software 606 $aE-commerce 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $aComputer Appl. in Administrative Data Processing$3https://scigraph.springernature.com/ontologies/product-market-codes/I2301X 606 $ae-Commerce/e-business$3https://scigraph.springernature.com/ontologies/product-market-codes/I26000 608 $aConference papers and proceedings.$2fast 610 1 $aInformation security 610 1 $aACISP 615 0$aComputer security. 615 0$aData encryption (Computer science). 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aApplication software. 615 0$aE-commerce. 615 14$aSystems and Data Security. 615 24$aCryptology. 615 24$aManagement of Computing and Information Systems. 615 24$aCoding and Information Theory. 615 24$aComputer Appl. in Administrative Data Processing. 615 24$ae-Commerce/e-business. 676 $a005.8 702 $aBoyd$b Colin$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aSimpson$b Leonie$4edt$4http://id.loc.gov/vocabulary/relators/edt 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483330403321 996 $aInformation Security and Privacy$9772014 997 $aUNINA