The SCEAS System
Navigation Menu

Conferences in DBLP

Information Security and Cryptology (ICISC) (icisc)
2007 (conf/icisc/2007)

  1. Willi Geiselmann, Rainer Steinwandt
    Cryptanalysis of a Hash Function Proposed at ICISC 2006. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:1-10 [Conf]
  2. Jiqiang Lu
    Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:11-26 [Conf]
  3. Antoine Scemama
    A Cryptanalysis of the Double-Round Quadratic Cryptosystem. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:27-36 [Conf]
  4. Jangseong Kim, Zeen Kim, Kwangjo Kim
    A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:37-48 [Conf]
  5. Jinwei Hu, Ruixuan Li, Zhengding Lu
    Establishing RBAC-Based Secure Interoperability in Decentralized Multi-domain Environments. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:49-63 [Conf]
  6. Li Jiang, Lingdi Ping, Xuezeng Pan
    Handling Dynamic Information Release. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:64-76 [Conf]
  7. Baudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater
    Improving the Time Complexity of Matsui's Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:77-88 [Conf]
  8. Alexander Maximov
    On Large Distributions for Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:89-101 [Conf]
  9. Basel Alomair, Loukas Lazos, Radha Poovendran
    Passive Attacks on a Class of Authentication Protocols for RFID. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:102-115 [Conf]
  10. Chuan-Wen Loe, Khoongming Khoo
    Side Channel Attacks on Irregularly Decimated Generators. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:116-130 [Conf]
  11. Ruo Ando, Youki Kadobayashi, Youichi Shinoda
    Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:131-143 [Conf]
  12. Jesus Molina, Xavier Chorin, Michel Cukier
    Filesystem Activity Following a SSH Compromise: An Empirical Study of File Sequences. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:144-155 [Conf]
  13. Yan Wen, Huaimin Wang
    A Secure Virtual Execution Environment for Untrusted Code. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:156-167 [Conf]
  14. Changlong Jin, Hakil Kim, Stephen J. Elliott
    Liveness Detection of Fingerprint Based on Band-Selective Fourier Spectrum. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:168-179 [Conf]
  15. Palash Sarkar
    Improving Upon the TET Mode of Operation. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:180-192 [Conf]
  16. Somitra Kumar Sanadhya, Palash Sarkar
    New Local Collisions for the SHA-2 Hash Family. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:193-205 [Conf]
  17. Hongbo Yu, Xiaoyun Wang
    Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:206-226 [Conf]
  18. Haina Zhang, Xiaoyun Wang
    Differential Cryptanalysis of T-Function Based Stream Cipher TSC-4. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:227-238 [Conf]
  19. Wentao Zhang, Wenling Wu, Dengguo Feng
    New Results on Impossible Differential Cryptanalysis of Reduced AES. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:239-250 [Conf]
  20. Marcel Fernandez, Josep Cotrina Navau, Miguel Soriano, Neus Domingo
    A Note About the Traceability Properties of Linear Codes. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:251-258 [Conf]
  21. Amir Moradi, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani
    Power Analysis Attacks on MDPL and DRSL Implementations. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:259-272 [Conf]
  22. Chong Hee Kim, Jong Hoon Shin, Jean-Jacques Quisquater, Pil Joong Lee
    Safe-Error Attack on SPA-FA Resistant Exponentiations Using a HW Modular Multiplier. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:273-281 [Conf]
  23. Atsuko Miyaji
    Generalized MMM-Algorithm Secure Against SPA, DPA, and RPA. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:282-296 [Conf]
  24. Aya Comuta, Mitsuru Kawazoe, Tetsuya Takahashi
    Pairing-Friendly Elliptic Curves with Small Security Loss by Cheon's Algorithm. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:297-308 [Conf]
  25. Jean-Philippe Aumasson, Willi Meier
    Analysis of Multivariate Hash Functions. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:309-323 [Conf]
  26. Florian Mendel, Vincent Rijmen
    Colliding Message Pair for 53-Step HAS-160. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:324-334 [Conf]
  27. Florian Mendel, Vincent Rijmen
    Weaknesses in the HAS-V Compression Function. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:335-345 [Conf]
  28. Raphael C.-W. Phan, Serge Vaudenay
    Security-Preserving Asymmetric Protocol Encapsulation. [Citation Graph (0, 0)][DBLP]
    ICISC, 2007, pp:346-366 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002