Skip to main content
  • Conference proceedings
  • © 2022

Information Security and Privacy

27th Australasian Conference, ACISP 2022, Wollongong, NSW, Australia, November 28–30, 2022, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 13494)

Conference series link(s): ACISP: Australasian Conference on Information Security and Privacy

Conference proceedings info: ACISP 2022.

Buy it now

Buying options

eBook USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (25 papers)

  1. Front Matter

    Pages i-xix
  2. Symmetric-Key Cryptography

    1. Front Matter

      Pages 1-1
    2. PNB-Focused Differential Cryptanalysis of ChaCha Stream Cipher

      • Shotaro Miyashita, Ryoma Ito, Atsuko Miyaji
      Pages 46-66
    3. Improved Differential Attack on Round-Reduced LEA

      • Yuhan Zhang, Wenling Wu, Lei Zhang
      Pages 67-84
    4. Implementing Grover Oracle for Lightweight Block Ciphers Under Depth Constraints

      • Subodh Bijwe, Amit Kumar Chauhan, Somitra Kumar Sanadhya
      Pages 85-105
    5. Improved Division Property for Ciphers with Complex Linear Layers

      • Yongxia Mao, Wenling Wu, Bolin Wang, Li Zhang
      Pages 106-124
    6. Fast Skinny-128 SIMD Implementations for Sequential Modes of Operation

      • Alexandre Adomnicai, Kazuhiko Minematsu, Maki Shigeri
      Pages 125-144
  3. Public-Key Cryptanalysis

    1. Front Matter

      Pages 145-145
    2. Handle the Traces: Revisiting the Attack on ECDSA with EHNP

      • Jinzheng Cao, Yanbin Pan, Qingfeng Cheng, Xinghua Li
      Pages 147-167
    3. Hybrid Dual and Meet-LWE Attack

      • Lei Bi, Xianhui Lu, Junjie Luo, Kunpeng Wang
      Pages 168-188
  4. Public-Key Cryptography

    1. Front Matter

      Pages 207-207
    2. TIDE: A Novel Approach to Constructing Timed-Release Encryption

      • Angelique Faye Loe, Liam Medley, Christian O’Connell, Elizabeth A. Quaglia
      Pages 244-264
    3. Multi-signatures for ECDSA and Its Applications in Blockchain

      • Shimin Pan, Kwan Yin Chan, Handong Cui, Tsz Hon Yuen
      Pages 265-285
  5. Post-quantum Cryptography

    1. Front Matter

      Pages 287-287
    2. Fiat-Shamir Signatures Based on Module-NTRU

      • Shi Bai, Austin Beard, Floyd Johnson, Sulani K. B. Vidhanalage, Tran Ngo
      Pages 289-308

Other Volumes

  1. Information Security and Privacy

About this book

This book constitutes the refereed proceedings of the 27th Australasian Conference on Information Security and Privacy, ACISP 2022, held in Wollongong, NSW, Australia, in November 2022.The 25 full papers presented were carefully revised and selected from 62 submissions. The papers present and discuss all aspects of information security and privacy as well as machine learning for privacy and much more.

Editors and Affiliations

  • University of Wollongong, Wollongong, Australia

    Khoa Nguyen, Guomin Yang, Fuchun Guo, Willy Susilo

Bibliographic Information

Buy it now

Buying options

eBook USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access