|
Conferences in DBLP
- Willi Geiselmann, Rainer Steinwandt
Cryptanalysis of a Hash Function Proposed at ICISC 2006. [Citation Graph (0, 0)][DBLP] ICISC, 2007, pp:1-10 [Conf]
- Jiqiang Lu
Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006. [Citation Graph (0, 0)][DBLP] ICISC, 2007, pp:11-26 [Conf]
- Antoine Scemama
A Cryptanalysis of the Double-Round Quadratic Cryptosystem. [Citation Graph (0, 0)][DBLP] ICISC, 2007, pp:27-36 [Conf]
- Jangseong Kim, Zeen Kim, Kwangjo Kim
A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment. [Citation Graph (0, 0)][DBLP] ICISC, 2007, pp:37-48 [Conf]
- Jinwei Hu, Ruixuan Li, Zhengding Lu
Establishing RBAC-Based Secure Interoperability in Decentralized Multi-domain Environments. [Citation Graph (0, 0)][DBLP] ICISC, 2007, pp:49-63 [Conf]
- Li Jiang, Lingdi Ping, Xuezeng Pan
Handling Dynamic Information Release. [Citation Graph (0, 0)][DBLP] ICISC, 2007, pp:64-76 [Conf]
- Baudoin Collard, François-Xavier Standaert, Jean-Jacques Quisquater
Improving the Time Complexity of Matsui's Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP] ICISC, 2007, pp:77-88 [Conf]
- Alexander Maximov
On Large Distributions for Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP] ICISC, 2007, pp:89-101 [Conf]
- Basel Alomair, Loukas Lazos, Radha Poovendran
Passive Attacks on a Class of Authentication Protocols for RFID. [Citation Graph (0, 0)][DBLP] ICISC, 2007, pp:102-115 [Conf]
- Chuan-Wen Loe, Khoongming Khoo
Side Channel Attacks on Irregularly Decimated Generators. [Citation Graph (0, 0)][DBLP] ICISC, 2007, pp:116-130 [Conf]
- Ruo Ando, Youki Kadobayashi, Youichi Shinoda
Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module. [Citation Graph (0, 0)][DBLP] ICISC, 2007, pp:131-143 [Conf]
- Jesus Molina, Xavier Chorin, Michel Cukier
Filesystem Activity Following a SSH Compromise: An Empirical Study of File Sequences. [Citation Graph (0, 0)][DBLP] ICISC, 2007, pp:144-155 [Conf]
- Yan Wen, Huaimin Wang
A Secure Virtual Execution Environment for Untrusted Code. [Citation Graph (0, 0)][DBLP] ICISC, 2007, pp:156-167 [Conf]
- Changlong Jin, Hakil Kim, Stephen J. Elliott
Liveness Detection of Fingerprint Based on Band-Selective Fourier Spectrum. [Citation Graph (0, 0)][DBLP] ICISC, 2007, pp:168-179 [Conf]
- Palash Sarkar
Improving Upon the TET Mode of Operation. [Citation Graph (0, 0)][DBLP] ICISC, 2007, pp:180-192 [Conf]
- Somitra Kumar Sanadhya, Palash Sarkar
New Local Collisions for the SHA-2 Hash Family. [Citation Graph (0, 0)][DBLP] ICISC, 2007, pp:193-205 [Conf]
- Hongbo Yu, Xiaoyun Wang
Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL. [Citation Graph (0, 0)][DBLP] ICISC, 2007, pp:206-226 [Conf]
- Haina Zhang, Xiaoyun Wang
Differential Cryptanalysis of T-Function Based Stream Cipher TSC-4. [Citation Graph (0, 0)][DBLP] ICISC, 2007, pp:227-238 [Conf]
- Wentao Zhang, Wenling Wu, Dengguo Feng
New Results on Impossible Differential Cryptanalysis of Reduced AES. [Citation Graph (0, 0)][DBLP] ICISC, 2007, pp:239-250 [Conf]
- Marcel Fernandez, Josep Cotrina Navau, Miguel Soriano, Neus Domingo
A Note About the Traceability Properties of Linear Codes. [Citation Graph (0, 0)][DBLP] ICISC, 2007, pp:251-258 [Conf]
- Amir Moradi, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani
Power Analysis Attacks on MDPL and DRSL Implementations. [Citation Graph (0, 0)][DBLP] ICISC, 2007, pp:259-272 [Conf]
- Chong Hee Kim, Jong Hoon Shin, Jean-Jacques Quisquater, Pil Joong Lee
Safe-Error Attack on SPA-FA Resistant Exponentiations Using a HW Modular Multiplier. [Citation Graph (0, 0)][DBLP] ICISC, 2007, pp:273-281 [Conf]
- Atsuko Miyaji
Generalized MMM-Algorithm Secure Against SPA, DPA, and RPA. [Citation Graph (0, 0)][DBLP] ICISC, 2007, pp:282-296 [Conf]
- Aya Comuta, Mitsuru Kawazoe, Tetsuya Takahashi
Pairing-Friendly Elliptic Curves with Small Security Loss by Cheon's Algorithm. [Citation Graph (0, 0)][DBLP] ICISC, 2007, pp:297-308 [Conf]
- Jean-Philippe Aumasson, Willi Meier
Analysis of Multivariate Hash Functions. [Citation Graph (0, 0)][DBLP] ICISC, 2007, pp:309-323 [Conf]
- Florian Mendel, Vincent Rijmen
Colliding Message Pair for 53-Step HAS-160. [Citation Graph (0, 0)][DBLP] ICISC, 2007, pp:324-334 [Conf]
- Florian Mendel, Vincent Rijmen
Weaknesses in the HAS-V Compression Function. [Citation Graph (0, 0)][DBLP] ICISC, 2007, pp:335-345 [Conf]
- Raphael C.-W. Phan, Serge Vaudenay
Security-Preserving Asymmetric Protocol Encapsulation. [Citation Graph (0, 0)][DBLP] ICISC, 2007, pp:346-366 [Conf]
|