CFP
![]() | ACISP 2023: 28th Australasian Conference on Information Security and Privacy Queensland University of Technology Brisbane, Australia, July 5-7, 2023 |
Conference website | https://www.qut.edu.au/acisp-2023 |
Submission link | https://easychair.org/conferences/?conf=acisp2023 |
Conference program | https://easychair.org/smart-program/ACISP2023/ |
Submission deadline | February 13, 2023 |
Welcome to ACISP 2023
The 28th Australasian Conference on Information Security and Privacy (ACISP 2023) will be held in Brisbane, Australia on July 5-7, 2023. It will be hosted by Queensland University of Technology.
All the details regarding the fees and payments are available on the ACISP-2023 registration webpage, accessible at:
Conference Organization
General Chair
|
|
Josef Pieprzyk
|
CSIRO/Data61
|
Program Chairs
|
|
Leonie Simpson
|
Queensland University of Technology
|
Mir Ali Rezazadeh Baee | Queensland University of Technology |
Publication Chairs
|
|
Leonie Simpson
|
Queensland University of Technology
|
Mir Ali Rezazadeh Baee | Queensland University of Technology |
Important Dates
Paper Submission
|
(Extended to 13 February 2023, 11:59pm AoE)
|
Notification of Acceptance
|
15 April 2023
|
Camera-ready Copy
|
29 April 2023
|
Conference
|
5-7 July 2023
|
Call for Papers
The 28th Australasian Conference on Information Security and Privacy (ACISP 2023) seeks original papers presenting novel research results on all aspects of information security and privacy. We welcome papers presenting theories, techniques, implementations, applications and practical experiences on a variety of topics.
Topics of interest include, but are not limited to:
-
Access Control
-
Authentication
-
Blockchain technology
-
Cloud security
-
Cryptocurrency
-
Cryptology
-
Cyber-physical systems security
-
Database security
-
Digital forensics
-
IoT security
-
Key management
-
Lightweight security
-
Network security
-
Privacy enhancing technologies
-
Privacy issues in applications
-
Security implementation
-
Security policy
-
Security protocols
-
Software security
-
System security
Instructions for Authors
All ACISP 2023 submissions must be:
- original, unpublished, and not submitted to any other conference or journal for consideration of publication,
- fully anonymous with no author names, affiliations, acknowledgements, or obvious references,
- written in English,
- at most 20 pages in length, including bibliography, and
- sufficiently intelligible and self-contained without appendices, so that PC members can make decisions on relevance to ACISP, originality, significance, technical quality and clarity without being required to read the appendices.
ACISP 2023 proceedings will be published by Springer-Verlag as a volume of the Lecture Notes in Computer Science series. Accepted papers will be limited to 20 pages in LNCS format. Authors should consult Springer’s Instructions for Authors (accessible at Information for Authors page) and use either the LaTeX or the Word templates provided on the authors’ page for the preparation of their papers (with no changes to the style). Please note that submissions must be anonymous for the review stage. Author details will be requested for accepted papers.
Submissions not meeting the submission guidelines risk rejection regardless of their merits.
Authors of accepted papers must guarantee that at least one of the authors will register and attend the conference to present their paper.
Submission Server
Papers should be submitted via EasyChair at https://easychair.org/conferences/?conf=acisp2023
Program Committee Members
Cristina Alcaraz
|
University of Malaga, Spain
|
Elena Andreeva
|
Technische Universität Wien, Austria
|
Man Ho Au
|
University of Hong Kong, Hong Kong
|
Shi Bai
|
Florida Atlantic University, US
|
Harry Bartlett
|
Queensland University of Technology, Australia
|
Lejla Batina
|
Radboud University, Netherlands
|
Rishiraj Bhattacharyya
|
University of Birmingham, UK
|
Colin Boyd
|
Norwegian University of Science and Technology, Norway
|
Rongmao Chen
|
National University of Defense Technology, China
|
Chitchanok Chuengsatiansup
|
University of Adelaide, Australia
|
Amy Corman
|
RMIT University, Australia
|
Craig Costello
|
Microsoft Research, US
|
Hui Cui
|
Murdoch University, Australia
|
Edward Dawson
|
Queensland University of Technology, Australia
|
Josep Domingo-Ferrer
|
Universitat Rovira i Virgili, Spain
|
Rafael Dowsley
|
Monash University, Australia
|
Keita Emura
|
National Institute of Information and Communications Technology, Japan
|
Ernest Foo
|
Griffith University, Australia
|
Debin Gao
|
Singapore Management University, Singapore
|
Joanne Hall
|
RMIT University, Australia
|
Jinguang Han
|
Southeast University, China
|
Jingnan He
|
Institute of Information Engineering of Chinese Academy of Sciences, China
|
Swee-Huay Heng
|
Multimedia University, Malaysia
|
Xiaolu Hou
|
Slovak University of Technology, Slovakia
|
Qiong Huang
|
South China Agricultural University, China
|
Malika Izabachène
|
Cosmian, France
|
Zahra Jadidi
|
Griffith University, Australia
|
Angelos Keromytis
|
Georgia Institute of Technology, US
|
Dan Kim
|
University of Queensland, Australia
|
Veronika Kuchta
|
Florida Atlantic University, US
|
Fabien Laguillaumie
|
LIRMM, Université of Montpellier, France
|
Hyung Tae Lee
|
Chung-Ang University, South Korea
|
Yannan Li
|
University of Wollongong, Australia
|
Yingjiu Li
|
University of Oregon, US
|
Shengli Liu
|
Shanghai Jiao Tong University, China
|
Yuhong Liu
|
Santa Clara University, US
|
Rongxing Lu
|
University of New Brunswick, Canada
|
Xianhui Lu
|
Institute of Information Engineering, CAS, China
|
Siqi Ma
|
University of New South Wales, Australia
|
Mitsuru Matsui
|
Mitsubishi Electric, Japan
|
Matthew McKague
|
Queensland University of Technology, Australia
|
Weizhi Meng
|
Technical University of Denmark, Denmark
|
Chris Mitchell
|
Royal Holloway University of London, UK
|
Kirill Morozov
|
University of North Texas, US
|
Khoa Nguyen
|
University of Wollongong, Australia
|
Lei Pan
|
Deakin University, Australia
|
Dimitrios Papadopoulos
|
Hong Kong University of Science and Technology, Hong Kong
|
Udaya Parampalli
|
University of Melbourne, Australia
|
Josef Pieprzyk
|
CSIRO/Data61, Australia
|
Indrakshi Ray
|
Colorado State University, US
|
Adeline Roux-Langlois
|
CNRS, IRISA, France
|
Reihaneh Safavi-Naini
|
University of Calgary, Canada
|
Amin Sakzad
|
Monash University, Australia
|
Pierangela Samarati
|
Università degli Studi di Milano, Italy
|
Luisa Siniscalchi
|
Technical University of Denmark, Denmark
|
Daniel Slamanig
|
Austrian Institute of Technology, Austria
|
Jill Slay
|
University of South Australia, Australia
|
Willy Susilo
|
University of Wollongong, Australia
|
Vanessa Teague
|
Australian National University, Australia
|
Ding Wang
|
Nankai University, China
|
Huaxiong Wang
|
Nanyang Technological University, Singapore
|
Guomin Yang
|
Singapore Management University, Singapore
|
Yuval Yarom
|
University of Adelaide, Australia
|
Xun Yi
|
RMIT University, Australia
|
Quan Yuan | University of Tokyo, Japan |
Tsz Hon Yuen
|
University of Hong Kong, Hong Kong
|
List of Accepted Papers by Topic
Symmetric-Key Cryptography
Improved Differential Cryptanalysis on SPECK Using Plaintext Structures
Zhuohui Feng, Ye Luo, Chao Wang, Qianqian Yang, Zhiquan Liu,and Ling Song
Zhuohui Feng, Ye Luo, Chao Wang, Qianqian Yang, Zhiquan Liu,and Ling Song
Linear Cryptanalysis and Its Variants with Fast Fourier Transformation Technique on MPC/FHE/ZK-Friendly Fp-based Ciphers
Zeyu Xu, Shiyao Chen, Meiqin Wang, and Puwen Wei
Zeyu Xu, Shiyao Chen, Meiqin Wang, and Puwen Wei
A New Correlation Cube Attack Based on Division Property
Cheng Che and Tian Tian
Cheng Che and Tian Tian
The Triangle Differential Cryptanalysis
Xiaofeng Xie and Tian Tian
Xiaofeng Xie and Tian Tian
Key Recovery Attacks on Grain-like Keystream Generators with Key Injection
Matthew Beighton, Harry Bartlett, Leonie Simpson, and Kenneth Koon-Ho Wong
Matthew Beighton, Harry Bartlett, Leonie Simpson, and Kenneth Koon-Ho Wong
Related-Cipher Attacks: Applications to Ballet and ANT
Yongxia Mao, Wenling Wu, Yafei Zheng, and Lei Zhang
Yongxia Mao, Wenling Wu, Yafei Zheng, and Lei Zhang
Cryptanalysis of SPEEDY
Jinliang Wang, Chao Niu, Qun Liu, Muzhou Li, Bart Preneel, and Meiqin Wang
Jinliang Wang, Chao Niu, Qun Liu, Muzhou Li, Bart Preneel, and Meiqin Wang
Reconsidering Generic Composition: the modes A10, A11 and A12 are insecure
Francesco Berti
Francesco Berti
Exploring Formal Methods for Cryptographic Hash Function Implementations
Nicky Mouha
Nicky Mouha
Public-Key Cryptography
A Tightly Secure ID-Based Signature Scheme under DL Assumption in AGM
Jia-Chng Loh, Fuchun Guo, Willy Susilo, and Guomin Yang
Jia-Chng Loh, Fuchun Guo, Willy Susilo, and Guomin Yang
Compact Password Authenticated Key Exchange from Group Actions
Ren Ishibashi and Kazuki Yoneyama
Ren Ishibashi and Kazuki Yoneyama
Multi-key Homomorphic Secret Sharing from LWE without Multi-key HE
Peiying Xu and Li-Ping Wang
Peiying Xu and Li-Ping Wang
Identity-Based Encryption from Lattices Using Approximate Trapdoors
Malika Izabachene, Lucas Prabel, and Adeline Roux-Langlois
Malika Izabachene, Lucas Prabel, and Adeline Roux-Langlois
Homomorphic Signatures for Subset and Superset Mixed Predicates and Its Applications
Masahito Ishizaka and Kazuhide Fukushima
Masahito Ishizaka and Kazuhide Fukushima
Adaptively Secure Identity-Based Encryption from Middle-Product Learning with Errors
Jingjing Fan, Xingye Lu, and Man Ho Au
Jingjing Fan, Xingye Lu, and Man Ho Au
Post-Quantum Cryptography
Quantum-access Security of Hash-based Signature Schemes
Quan Yuan, Mehdi Tibouchi, and Masayuki Abe
Quan Yuan, Mehdi Tibouchi, and Masayuki Abe
Tightly Secure Lattice Identity-Based Signature in the Quantum Random Oracle Model
Ernest Foo and Qinyi Li
Ernest Foo and Qinyi Li
Ghidle: Ecient Large-State Block Ciphers for Post-Quantum Security
Motoki Nakahashi, Rentaro Shiba, Ravi Anand, Mosta zar Rahman, Kosei Sakamoto, Fukang Liu, and Takanori Isobe
Motoki Nakahashi, Rentaro Shiba, Ravi Anand, Mosta zar Rahman, Kosei Sakamoto, Fukang Liu, and Takanori Isobe
Quantum Algorithm for Finding Impossible Differentials and Zero-Correlation Linear Hulls of Symmetric Ciphers
Huiqin Chen, Yongqiang Li, Parhat Abla, Zhiran Li, Lin Jiao, and Mingsheng Wang
Huiqin Chen, Yongqiang Li, Parhat Abla, Zhiran Li, Lin Jiao, and Mingsheng Wang
Memory-Ecient Quantum Information Set Decoding Algorithm
Naoto Kimura, Atsushi Takayasu, and Tsuyoshi Takagi
Naoto Kimura, Atsushi Takayasu, and Tsuyoshi Takagi
Cryptographic Protocols
CSI-SharK: CSI-FiSh with Sharing-friendly Keys
Shahla Atapoor, Karim Baghery, Daniele Cozzo, and Robi Pedersen
Shahla Atapoor, Karim Baghery, Daniele Cozzo, and Robi Pedersen
Practical Verifiable Random Function with RKA Security
Tsz Hon Yuen, Shimin Pan, Sheng Huang, and Xiaoting Zhang
Tsz Hon Yuen, Shimin Pan, Sheng Huang, and Xiaoting Zhang
Statistically Consistent Broadcast Authenticated Encryption with Keyword Search Adaptive Security from Standard Assumptions
Sayantan Mukherjee
Sayantan Mukherjee
Modular Design of KEM-Based Authenticated Key Exchange
Colin Boyd, Bor de Kock, and Lise Millerjord
Colin Boyd, Bor de Kock, and Lise Millerjord
Reusable, Instant and Private Payment Guarantees for Cryptocurrencies
Akash Madhusudan, Mahdi Sedaghat, Samarth Tiwari, Kelong Cong, and Bart Preneel
Akash Madhusudan, Mahdi Sedaghat, Samarth Tiwari, Kelong Cong, and Bart Preneel
System Security
BinAlign: Alignment Padding based Compiler Provenance Recovery
Maliha Ismail, Yan Lin, DongGyun Han, and Debin Gao
Maliha Ismail, Yan Lin, DongGyun Han, and Debin Gao
Encrypted Network Trac Classification with Higher Order Graph Neural Network
Zulu Okonkwo, Ernest Foo, Zhe Hou, Qinyi Li, and Zahra Jadidi
Zulu Okonkwo, Ernest Foo, Zhe Hou, Qinyi Li, and Zahra Jadidi