会议文集


文集名Information Security and Privacy
会议名30th Australasian Conference on Information Security and Privacy (ACISP 2025)
中译名《第三十届澳大拉西亚信息安全与隐私会议,卷1》
会议日期July 14-16, 2025
会议地点Wollongong, NSW, Australia
出版年2025
馆藏号358610


题名作者出版年
Forgery Attacks on SipHashKosuke Sasaki; Rikuto Kurahara; Kosei Sakamoto; Takanori Isobe2025
Cryptanalysis of Fruit-F: Exploiting Key-Derivation Weaknesses and Initialization VulnerabilitiesSubhadeep Banik; Hailun Yan2025
Exploring Key-Recovery-Friendly Differential Distinguishers for SM4 and Their Performance in Differential AttacksBingqing Li; Ling Sun2025
Inner Product Masked Integral Distinguishers and Integral Sets over Large Finite Fields Applications to MiMC, CIMINION and ChaghriWeizhe Wang; Deng Tang; Haoyang Wang2025
Improved Differential Meet-in-the-Middle Cryptanalysis on SIMON and PiccoloWeiqing Deng; Jianing Zhang; Haoyang Wang2025
Strengthening Key Scheduling of AES-256 with Minimal Software ModificationsShoma Kawakami; Kazuma Taka; Atsushi Tanaka; Tatsuya Ishikawa; Takanori Isobe2025
Ideal Transformations for Public Key EncryptionYao Cheng; Xianhui Lu; Ziyi Li2025
Indifferentiability Separations in Ideal Public Key Encryption: Explicit vs. Implicit RejectionYao Cheng; Xianhui Lu; Ziyi Li; Yongjian Yin2025
Compressed Sigma Protocols: New Model and Aggregation TechniquesYuxi Xue; Tianyu Zheng; Shang Gao; Bin Xiao; Man Ho Au2025
Glitter: A Fully Adaptive and Tightly Secure Threshold SignatureShaolong Tang; Peng Jiang; Liehuang Zhu2025
Faster VOLEitH Signatures from All-But-One Vector Commitment and Half-TreeDung Bui; Kelong Cong; Cyprien Delpech de Saint Guilhem2025
Three-Round (Robust) Threshold ECDSA from Threshold CL EncryptionBowen Jiang; Guofeng Tang; Haiyang Xue2025
Lattice Attack with EHNP: Key Recovery from Two ECDSA Signatures and Breaking the Information-Theoretic LimitTianyou Tang; Shuqin Fan2025
FlexiADKG: A Flexible Asynchronous Distributed Key Generation Protocol with Constant Round ComplexityYang Yang; Bingyu Li; Zhenyang Ding; Qianhong Wu; Bo Qin; Qin Wang2025
TEAKEX: TESLA-Authenticated Group Key ExchangeQinyi Li; Lise Millerjord; Colin Boyd2025
SoK: A Deep Dive Into Anti-money Laundering Techniques for Blockchain CryptocurrenciesQishuang Fu; Joseph K. Liu; Shirui Pan; Tsz Hon Yuen2025
Advanced Temporal Graph Embedding for Detecting Fraudulent Transactions on Complex Blockchain Transactional NetworksJianbin Gao; Ansu Badjie; Qi Xia; Patrick Mukala; Hu Xia; Grace Mupoyi Ntuala2025
Walnut: A Generic Framework with Enhanced Scalability for BFT ProtocolsLei Tian; Chenke Wang; Yu Long; Xian Xu; Mingchao Wan; Chunmiao Li; Shi-Feng Sun; Dawu Gu2025
PPSCCC: Privacy-Preserving Scalable Cross-Chain Communication Among Multiple Blockchains Based on Parent-Child BlockchainHideaki Miyaji; Noriaki Kamiyama2025