ACISP2019 2019 July 3, 2019 to July 5, 2019, Christchurch, New Zealand

Event Page

Tell us about missing data
Title Speakers Summary Topic Types
Lecture Jennifer Seberry N/A
Ciphertext-Delegatable CP-ABE for a Dynamic Credential: A Modular Approach Willy Susilo , Joonsang Baek , Jongkil Kim , Surya Liu N/A
Location Based Encryption Willy Susilo , Tran Phuong , Guomin Liu N/A
Group ID-based Encryption With Equality Test Against Insider Attack Huang , Ling , Ma , Xiang And Li N/A
Improving the security of the DRS scheme with uniformly chosen random noise Arnaud Sipasseuth , Thomas Susilo N/A
A lattice based public key encryption with equality test in standard model Kazuhide Fukushima , Shinsaku Kiyomoto , Dung Hoang Duong , Partha Susilo N/A
Lattice RingCT v2.0 with Multiple Input and Output Wallets Ron Steinfeld , Amin Sakzad , Wilson Alberto Torres , Veronika Kuchta , Joseph Cheng N/A
Fast-to-Finalize Nakamoto-Like Consensus Sherman Chow , Zhiqiang Liu , Shuyang Tang N/A
A Combined Micro-block Chain Truncation Attack on Bitcoin-NG Zongyang Zhang , Ziyu Wang , Jianwei Liu , Yanting Zhang , Jiayuan Yu N/A
Two new module-code-based KEMs with rank metric Li-ping Hu N/A
Adding Distributed Decryption and Key Generation to a Ring-LWE Based CCA Encryption Scheme Yehuda Lindell , Valery Osheter , Michael Kraitsberg , Nigel Alaoui N/A
Strong Post-Compromise Secure Proxy ReEncryption Alex Davidson , Ela Lee , Amit Martin N/A
Offline Witness Encryption from Witness PRF and Randomized Encoding in CRS model Tapas Dutta N/A
Two-Client and Multi-client Functional Encryption for Set Intersection Tim Kamp N/A
Cryptanalysis on CCA2-Secured LRPCKronecker Cryptosystem Terry Tan N/A
Pseudorandom Functions from LWE: RKA Security and Application Shengli Liu , Nan Cui , Yunhua Gu N/A
delta-subgaussian Random Variables in Cryptography Sean Player N/A
Field Extension in Secret-Shared Form and Its Applications to Efficient Secure Computation Takahiro Matsuda , Nuttapong Attrapadung , Ai Ishida , Koki Hamada , Dai Ikarashi , Ryo Kikuchi , Yusuke Schuldt N/A
Efficient Secure Multi-Party Protocols for Decision Tree Classification Atsunori Ichikawa , Wakaha Ogata , Koki Kikuchi N/A
The Wiener Attack on RSA Revisited: A Quest N/a N/A
Dimensionality Reduction and Visualization of Network Intrusion Detection Data Wei Zong , Yang-wai Susilo N/A
DOCSDN: Dynamic and Optimal Configuration of Software-Defined Networks Devon Callahan , Timothy Curry , Benjamin Michel N/A
Witness Encryption with (Weak) Unique Decryption and Message Indistinguishability: Constructions and Applications Bei Liang , Dongxue Pan , Hongda Ni N/A
Speeding Up Scalar Multiplication on Koblitz Curves Using $mu_4$ Coordinates Wei Yu , Weixuan Li , Bao Fan N/A
Constructing Hyperelliptic Covers for Elliptic Curves over Quadratic Extension Fields Bao Li , Xuejun Fan , Song Tian N/A
Risk of Asynchronous Protocol Update: Attacks to Monero Protocols Joseph Liu , Dimaz Ankaa Wijaya , Ron Liu N/A
A Flexible Instant Payment System Based on Blockchain Qianhong Wu , Bo Qin , Lin Zhong , Jan Xie , Joseph Wang N/A
Secure and Compact Elliptic Curve Cryptosystems Yaoan Miyaji N/A
A quantitative study of attribute based correlation in micro-databases and its effects on privacy Debanjan Chakraborty N/A
Automated cash mining attacks on mobile advertising networks Woojoong Ji , Taeyun Kim , Kuyju Kim N/A
A Low Overhead Error Correction Algorithm Using Random Permutation for SRAM PUFs Zongbin Liu , Liang Zheng , Donglei Han , Lingchen Zhang , Churan Peng N/A
Practical Dynamic Taint Tracking for Exploiting Input Sanitization Error in Java Applications Mohammadreza Ashouri N/A
Function-Dependent Commitments from Homomorphic Authenticators Lucas Schabhc<ser , Denis Buchmann N/A
Security against Subversion in Multi-Surveillant Settings Geng Li , Jianwei Zhang N/A
A Novel Semi-Supervised Adaboost Technique Based on Improved Tri-training Dunming Li , Jiewen Shen N/A
Tagging a Malware's Intentions by using Attention-based Sequence-to-Sequence Neural Network Yeali S. Sun , Yi-ting Huang , Yu-yuan Chen , Chih-chun Yang , Shun-wen Chen N/A
Related-Key Boomerang Attacks on GIFT with Automated Trail Search Including BCT Effect Yunwen Sasaki N/A
Fast Chosen-key Distinguish Attacks on Roundreduced AES-192 Chunbo Zhu , Gaoli Zhu N/A
A Highly Secure MAC from Tweakable Blockciphers with Support for Short Tweaks Yusuke Naito N/A
AMOGAP: Defending Against Man-in-the-middle and Offline Guessing Attacks on Passwords Jaryn Shen , Timothy T. Yuen , Kim-kwang Zeng N/A
MineAuth: Mining Behavioural Habits for Continuous Authentication on a Smartphone Li Yang , Xiaojian Pang , Maozhen Ma N/A