Conferences in DBLP
Shaoquan Jiang , Guang Gong Multi-service Oriented Broadcast Encryption. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:1-11 [Conf ] Tomoyuki Asano Secure and Insecure Modifications of the Subset Difference Broadcast Encryption Scheme. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:12-23 [Conf ] Vu Dong Tô , Reihaneh Safavi-Naini Linear Code Implies Public-Key Traitor Tracing with Revocation. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:24-35 [Conf ] Chong Hee Kim , Yong Ho Hwang , Pil Joong Lee TTS without Revocation Capability Secure Against CCA2. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:36-49 [Conf ] Yan-Cheng Chang Single Database Private Information Retrieval with Logarithmic Communication. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:50-61 [Conf ] Goichiro Hanaoka , Hideki Imai , Jörn Müller-Quade , Anderson C. A. Nascimento , Akira Otsuka , Andreas Winter Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:62-73 [Conf ] Gildas Avoine , Serge Vaudenay Optimistic Fair Exchange Based on Publicly Verifiable Secret Sharing. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:74-85 [Conf ] Marcus Peinado , Yuqun Chen , Paul England , John Manferdelli NGSCB: A Trusted Open System. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:86-97 [Conf ] Jorge Nakahara Jr. , Bart Preneel , Joos Vandewalle The Biryukov-Demirci Attack on Reduced-Round Versions of IDEA and MESH Ciphers. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:98-109 [Conf ] YongSup Shin , Jongsung Kim , Guil Kim , Seokhie Hong , Sangjin Lee Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:110-122 [Conf ] Jongsung Kim , Guil Kim , Seokhie Hong , Sangjin Lee , Dowon Hong The Related-Key Rectangle Attack - Application to SHACAL-1. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:123-136 [Conf ] Youngdai Ko , Changhoon Lee , Seokhie Hong , Sangjin Lee Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:137-148 [Conf ] Michael J. Jacobson Jr. The Security of Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:149-156 [Conf ] Feng Bao Analysis of a Conference Scheme Under Active and Passive Attacks. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:157-163 [Conf ] Zhiguo Wan , Shuhong Wang Cryptanalysis of Two Password-Authenticated Key Exchange Protocols. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:164-175 [Conf ] Feng Bao , Guilin Wang , Jianying Zhou , Huafei Zhu Analysis and Improvement of Micali's Fair Contract Signing Protocol. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:176-187 [Conf ] Serge Vaudenay Digital Signature Schemes with Domain Parameters: Yet Another Parameter Issue in ECDSA. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:188-199 [Conf ] Dae Hyun Yum , Pil Joong Lee Generic Construction of Certificateless Signature. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:200-211 [Conf ] Wonil Lee , Mridul Nandi , Palash Sarkar , Donghoon Chang , Sangjin Lee , Kouichi Sakurai Pseudorandomness of SPN-Type Transformations. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:212-223 [Conf ] Tetsu Iwata , Kaoru Kurosawa How to Re-use Round Function in Super-Pseudorandom Permutation. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:224-235 [Conf ] Kaoru Kurosawa , Toshihiko Matsuo How to Remove MAC from DHIES. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:236-247 [Conf ] Bruno Crispo , Bogdan C. Popescu , Andrew S. Tanenbaum Symmetric Key Authentication Services Revisited. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:248-261 [Conf ] Brian King , Ben Rubin Improvements to the Point Halving Algorithm. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:262-276 [Conf ] Bo-Yin Yang , Jiun-Ming Chen Theoretical Analysis of XL over Small Fields. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:277-288 [Conf ] Chae Hoon Lim A New Method for Securing Elliptic Scalar Multiplication Against Side-Channel Attacks. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:289-300 [Conf ] Ming Yao , Matthew Henricksen , Greg Maitland , Ernest Foo , Ed Dawson A Mobile Agent System Providing Offer Privacy. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:301-312 [Conf ] Willy Susilo , Fangguo Zhang , Yi Mu Identity-Based Strong Designated Verifier Signature Schemes. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:313-324 [Conf ] Joseph K. Liu , Victor K. Wei , Duncan S. Wong Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract). [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:325-335 [Conf ] Toru Nakanishi , Yuji Sugiyama A Group Signature Scheme with Efficient Membership Revocation for Reasonable Groups. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:336-347 [Conf ] Zhenjie Huang , Yumin Wang Convertible Nominative Signatures. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:348-357 [Conf ] Yiu Shing Terry Tin , Harikrishna Vasanta , Colin Boyd , Juan Manuel González Nieto Protocols with Security Proofs for Mobile Applications. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:358-369 [Conf ] Steven D. Galbraith , Herbie J. Hopkins , Igor Shparlinski Secure Bilinear Diffie-Hellman Bits. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:370-378 [Conf ] SungJun Min , Go Yamamoto , Kwangjo Kim Weak Property of Malleability in NTRUSign. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:379-390 [Conf ] Arjen K. Lenstra , Tim Voss Information Security Risk Assessment, Aggregation, and Mitigation. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:391-401 [Conf ] Chun Ruan , Vijay Varadharajan A Weighted Graph Approach to Authorization Delegation and Conflict Resolution. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:402-413 [Conf ] Xi-Bin Zhao , Kwok-Yan Lam , Siu Leung Chung , Ming Gu , Jia-Guang Sun Authorization Mechanisms for Virtual Organizations in Distributed Computing Systems. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:414-426 [Conf ] Luke McAven , Reihaneh Safavi-Naini , Moti Yung Unconditionally Secure Encryption Under Strong Attacks. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:427-439 [Conf ] Erik Anderson , Cheryl L. Beaver , Timothy Draelos , Richard Schroeppel , Mark Torgerson ManTiCore: Encryption with Joint Cipher-State Authentication. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:440-453 [Conf ] Dong-Guk Han , Jongin Lim , Kouichi Sakurai On Security of XTR Public Key Cryptosystems Against Side Channel Attacks. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:454-465 [Conf ] Katsuyuki Okeya , Tsuyoshi Takagi , Camille Vuillaume On the Exact Flexibility of the Flexible Countermeasure Against Side Channel Attacks. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:466-477 [Conf ] Christophe Giraud , Erik Woodward Knudsen Fault Attacks on Signature Schemes. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:478-491 [Conf ]