Conferences in DBLP
Mihir Bellare , Phillip Rogaway Minimizing the use of random oracles in authenticated encryption schemes. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:1-16 [Conf ] Giovanni Di Crescenzo , Kouichi Sakurai , Moti Yung Zero-knowledge proofs of decision power: new protocols and optimal round-complexity. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:17-27 [Conf ] Takeshi Koshiba Computational learning theoretic cryptanalysis of language theoretic cryptosystems. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:28-38 [Conf ] Yun Bai , Vijay Varadharajan A language for specifying sequences of authorization transformations and its applications. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:39-49 [Conf ] Hung-Min Sun , Bor-Liang Chen On the decomposition constructions for perfect secret sharing schemes. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:50-60 [Conf ] Ingrid Biehl , Susanne Wetzel Traceable visual cryptography. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:61-71 [Conf ] Hossein Ghodosi , Josef Pieprzyk , Reihaneh Safavi-Naini Remarks on the multiple assignment secret sharing scheme. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:72-80 [Conf ] Chris Charnes , Keith M. Martin , Josef Pieprzyk , Reihaneh Safavi-Naini Secret sharing in hierarchical groups. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:81-86 [Conf ] Tuomas Aura , Pekka Nikander Stateless connections. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:87-97 [Conf ] Rakman Choi , Jung-Chan Na , Kwonil Lee , Eunmi Kim , Wooyong Han Design of a security platform for CORBA based application. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:98-108 [Conf ] Antonio Lioy , Fabio Maino , Marco Mezzalama Secure document management and distribution in an open network environment. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:109-117 [Conf ] Satoshi Obana , Kaoru Kurosawa A2 -code = Affine resolvable = BIBD. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:118-129 [Conf ] Keith M. Martin , Reihaneh Safavi-Naini Multisender authentication systems with unconditional security. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:130-143 [Conf ] Kenichi Hayashi , Eiji Okamoto , Masahiro Mambo Proposal of user identification scheme using mouse. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:144-148 [Conf ] William Millan , Andrew Clark , Ed Dawson An effective genetic algorithm for finding highly nonlinear Boolean Functions. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:149-158 [Conf ] Xian-Mo Zhang , Yuliang Zheng , Hideki Imai Duality of Boolean functions and its cryptographic significance. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:159-169 [Conf ] Ed Dawson , Chuan-Kun Wu Construction of correlation immune Boolean functions. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:170-180 [Conf ] Miodrag J. Mihaljevic An improved key stream generator based on the programmable cellular automata. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:181-191 [Conf ] Audun Jøsang A Trust policy framework. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:192-202 [Conf ] LiWu Chang , Ira S. Moskowitz Critical analysis of security in voice hiding techniques. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:203-216 [Conf ] Sangjoon Park , Sangwoo Park , Kwangjo Kim , Dongho Won Two efficient RSA multisignature schemes. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:217-222 [Conf ] Seungjoo Kim , Sangjoon Park , Dongho Won Proxy signatures, Revisited. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:223-232 [Conf ] John Kelsey , Bruce Schneier , David Wagner Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:233-246 [Conf ] Feng Zhu , Bao-An Guo A multiplication-addition structure against differential attack. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:247-257 [Conf ] Yasuyoshi Kaneko , Shiho Moriai , Kazuo Ohta On strict estimation method of provable security against differential and linear cryptanalysis. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:258-268 [Conf ] Takeshi Shimoyama , Seiichi Amada , Shiho Moriai Improved fast software implementation of block ciphers. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:269-273 [Conf ] Mohssen Alabbadi Security comments on the Hwang-Chen algebraic-code cryptosystem. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:274-281 [Conf ] Atsuko Miyaji , Takatoshi Ono , Henri Cohen Efficient elliptic curve exponentiation. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:282-291 [Conf ] Jinhui Chao , Nori Matsuda , Shigeo Tsujii Efficient construction of secure hyperelliptic discrete logarithm problems. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:292-301 [Conf ] Daniel Bleichenbacher , Marc Joye , Jean-Jacques Quisquater A new and optimal chosen-message attack on RSA-type cryptosystems. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:302-313 [Conf ] Yasuyuki Sakai , Kouichi Sakurai , Hirokazu Ishizuka On weak RSA-keys produced from Pretty Good Privacy. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:314-324 [Conf ] Kazukuni Kobara , Hideki Imai Self-synchronized message randomization methods for subliminal channels. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:325-334 [Conf ] Mark Chapman , George I. Davida Hiding the Hidden: A software system for concealing ciphertext as innocuous text. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:335-345 [Conf ] Colin Boyd Digital signature and public key cryptosystems in a prime order subgroup of Zn * . [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:346-355 [Conf ] Jacques Patarin , Louis Goubin Trapdoor one-way permutations and multivariate polynominals. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:356-368 [Conf ] Jacques Patarin , Louis Goubin Asymmetric cryptography with S-Boxes. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:369-380 [Conf ] Paul Camion , Hervé Chabanne On the powerline system. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:381-385 [Conf ] Jacques Traoré Making unfair a "fair" blind signature scheme. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:386-397 [Conf ] Colin Boyd Enforcing traceability in software. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:398-408 [Conf ] Wenbo Mao Publicly verifiable partial key escrow. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:409-413 [Conf ] Hajime Watanabe , Tadao Kasami A secure code for recipient watermarking against conspiracy attacks by all users. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:414-423 [Conf ] James W. Gray III , Kin Fai Epsilon Ip Protocols for issuing public-key certificates over the Internet. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:424-434 [Conf ] André Postma , Thijs Krol , Egbert Molenkamp Distributed cryptographic function application protocols. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:435-439 [Conf ] Wakaha Ogata , Kaoru Kurosawa , Kazue Sako , Kazunori Takatani Fault tolerant anonymous channel. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:440-444 [Conf ] Josep Domingo-Ferrer , Ricardo X. Sanchez del Castillo An implementable scheme for secure delegation of computing and data. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:445-451 [Conf ] Jacobus E. van der Merwe , Sebastiaan H. von Solms Electronic commerce with secure intelligent trade agent. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:452-462 [Conf ] Holger Peterson , Guillaume Poupard Efficient scalable fair cash with off-line extortion prevention. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:463-477 [Conf ] Liqun Chen , Chris J. Mitchell An anonymous and undeniable payment scheme. [Citation Graph (0, 0)][DBLP ] ICICS, 1997, pp:478-482 [Conf ]