- SHACAL-1. 9th
Australasian Conference on
Information Security and
Privacy (
ACISP 2004). Sydney: Springer-Verlag. pp. 123–136.
Jongsung Kim;
Dukjae Moon;...
-
Jacob (2019), "Lattice
RingCT v2.0 with
Multiple Input and
Output Wallets",
ACISP 2019,
retrieved 2024-10-18 "Meet
North Korea and Lana Del Rey's new favorite...
-
Information Security and Privacy.
Lecture Notes in
Computer Science. Vol. 6812.
ACISP 2011. pp. 61–74. doi:10.1007/978-3-642-22497-3_5. ISBN 978-3-642-22496-6...
-
published in: "Information
Security and Privacy:
Second Australasian Conference,
ACISP '97, Sydney, NSW, Australia, July 7-9, 1997 Proceedings". p. 159-160....
- Mads Jurik: A Length-Flexible
Threshold Cryptosystem with Applications.
ACISP 2003: 350-364 Ivan Damgård, Mads Jurik: A Generalisation, a Simplification...
- of the 8th
Australasian Conference on
Information Security and
Privacy (
ACISP'03),
Lecture Notes in
Computer Science, vol. 2727, Springer, pp. 297–311...
- (eds.).
Information Security and Privacy: 9th
Australasian Conference,
ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings.
Lecture Notes in...
- "Cryptanalysis of
Polynomial Authentication and
Signature Scheme" (PDF).
ACISP 2000. LNCS. Vol. 1841. Springer. pp. 278–288. Ducas, Léo; Nguyen, Phong...
- and Bart Preneel,
Solving Systems of
Differential Equations of Addition,
ACISP 2005. Full
version Souradyuti Paul and Bart Preneel, Near
Optimal Algorithms...
-
System Technical Manual (PDF). DEC. June 1981. p. 4-3. EK-11024-TM-001. KE44-
ACISP User's
Guide (PDF). DEC. 1981. EK-KE44A-UG-002. pdp11
processor handbook...