9. ACISP 2004:
Broadcast Encryption and Traitor Tracing
: Secure and Insecure Modifications of the Subset Difference Broadcast Encryption Scheme.
Private Information Retrieval and Oblivious Transfer
Michael J. Jacobson Jr.
: The Security of Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders.
: Analysis of a Conference Scheme Under Active and Passive Attacks.
: Digital Signature Schemes with Domain Parameters: Yet Another Parameter Issue in ECDSA.
Chae Hoon Lim
: A New Method for Securing Elliptic Scalar Multiplication Against Side-Channel Attacks.
Access Control and Authorisation