- SHACAL-1. 9th
Australasian Conference on
Information Security and
Privacy (
ACISP 2004). Sydney: Springer-Verlag. pp. 123–136.
Jongsung Kim;
Dukjae Moon;...
-
Information Security and Privacy.
Lecture Notes in
Computer Science. Vol. 6812.
ACISP 2011. pp. 61–74. doi:10.1007/978-3-642-22497-3_5. ISBN 978-3-642-22496-6...
-
published in: "Information
Security and Privacy:
Second Australasian Conference,
ACISP '97, Sydney, NSW, Australia, July 7-9, 1997 Proceedings". p. 159-160....
- Mads Jurik: A Length-Flexible
Threshold Cryptosystem with Applications.
ACISP 2003: 350-364 Ivan Damgård, Mads Jurik: A Generalisation, a Simplification...
- and Bart Preneel,
Solving Systems of
Differential Equations of Addition,
ACISP 2005. Full
version Souradyuti Paul and Bart Preneel, Near
Optimal Algorithms...
- Oracle.
Information Security and
Privacy - 20th
Australasian Conference,
ACISP 2015, Brisbane, QLD, Australia, 29 June – 1 July 2015:
Pages 230-247 Suvradip...
- (eds.).
Information Security and Privacy: 9th
Australasian Conference,
ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings.
Lecture Notes in...
- of the 8th
Australasian Conference on
Information Security and
Privacy (
ACISP'03),
Lecture Notes in
Computer Science, vol. 2727, Springer, pp. 297–311...
- "Cryptanalysis of
Polynomial Authentication and
Signature Scheme" (PDF).
ACISP 2000. LNCS. Vol. 1841. Springer. pp. 278–288. Ducas, Léo; Nguyen, Phong...
- SHACAL-1". 9th
Australasian Conference on
Information Security and
Privacy (
ACISP 2004). Sydney: Springer-Verlag. pp. 123–136.
Seokhie Hong;
Jongsung Kim;...