The SCEAS System
Navigation Menu

Conferences in DBLP

Information Security and Cryptology (ICISC) (icisc)
2006 (conf/icisc/2006)

  1. Serge Vaudenay
    RFID Privacy Based on Public-Key Cryptography. [Citation Graph (0, 0)][DBLP]
    ICISC, 2006, pp:1-6 [Conf]
  2. Palash Sarkar
    Generic Attacks on Symmetric Ciphers. [Citation Graph (0, 0)][DBLP]
    ICISC, 2006, pp:7- [Conf]
  3. Florian Mendel, Norbert Pramstaller, Christian Rechberger
    Improved Collision Attack on the Hash Function Proposed at PKC'98. [Citation Graph (0, 0)][DBLP]
    ICISC, 2006, pp:8-21 [Conf]
  4. Vladimir Shpilrain
    Hashing with Polynomials. [Citation Graph (0, 0)][DBLP]
    ICISC, 2006, pp:22-28 [Conf]
  5. Kazuhiro Suzuki, Dongvu Tonien, Kaoru Kurosawa, Koji Toyota
    Birthday Paradox for Multi-collisions. [Citation Graph (0, 0)][DBLP]
    ICISC, 2006, pp:29-40 [Conf]
  6. Ku-Young Chang, Ju-Sung Kang, Mun-Kyu Lee, Hangrok Lee, Dowon Hong
    New Variant of the Self-Shrinking Generator and Its Cryptographic Properties. [Citation Graph (0, 0)][DBLP]
    ICISC, 2006, pp:41-50 [Conf]
  7. Bon Wook Koo, Hwan Seok Jang, Jung Hwan Song
    On Constructing of a 32 ×32 Binary Matrix as a Diffusion Layer for a 256-Bit Block Cipher. [Citation Graph (0, 0)][DBLP]
    ICISC, 2006, pp:51-64 [Conf]
  8. Xian-Mo Zhang, Josef Pieprzyk, Yuliang Zheng
    On Algebraic Immunity and Annihilators. [Citation Graph (0, 0)][DBLP]
    ICISC, 2006, pp:65-80 [Conf]
  9. Bonseok Koo, Dongwook Lee, Gwonho Ryu, TaeJoo Chang, Sangjin Lee
    High-Speed RSA Crypto-processor with Radix-4 Modular Multiplication and Chinese Remainder Theorem. [Citation Graph (0, 0)][DBLP]
    ICISC, 2006, pp:81-93 [Conf]
  10. Hidehiro Katou, Feng Wang, Yasuyuki Nogami, Yoshitaka Morikawa
    A High-Speed Square Root Algorithm in Extension Fields. [Citation Graph (0, 0)][DBLP]
    ICISC, 2006, pp:94-106 [Conf]
  11. Sangwoon Yang, Jinsub Park, Younggap You
    The Smallest ARIA Module with 16-Bit Architecture. [Citation Graph (0, 0)][DBLP]
    ICISC, 2006, pp:107-117 [Conf]
  12. Willi Geiselmann, Fabian Januszewski, Hubert Köpfer, Jan Pelzl, Rainer Steinwandt
    A Simpler Sieving Device: Combining ECM and TWIRL. [Citation Graph (0, 0)][DBLP]
    ICISC, 2006, pp:118-135 [Conf]
  13. Zonghua Zhang, Pin-Han Ho, Xiaodong Lin, Hong Shen
    Janus: A Two-Sided Analytical Model for Multi-Stage Coordinated Attacks. [Citation Graph (0, 0)][DBLP]
    ICISC, 2006, pp:136-154 [Conf]
  14. Junsheng Chang, Huaimin Wang, Gang Yin
    A Time-Frame Based Trust Model for P2P Systems. [Citation Graph (0, 0)][DBLP]
    ICISC, 2006, pp:155-165 [Conf]
  15. Hong Zhang, Yeping He, Zhiguo Shi
    Spatial Context in Role-Based Access Control. [Citation Graph (0, 0)][DBLP]
    ICISC, 2006, pp:166-178 [Conf]
  16. Jongoh Choi, Si-Ho Cha, JooSeok Song
    An Efficient Scheme for Detecting Malicious Nodes in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICISC, 2006, pp:179-193 [Conf]
  17. Divyan M. Konidala, Kwangjo Kim
    Mobile RFID Applications and Security Challenges. [Citation Graph (0, 0)][DBLP]
    ICISC, 2006, pp:194-205 [Conf]
  18. Yoon-Ho Choi, Jong-Ho Park, Sang-Kon Kim, Seung-Woo Seo, Yu Kang, Jin Gi Choe, Ho-Kun Moon, Myung-Soo Rhee
    An Efficient Forensic Evidence Collection Scheme of Host Infringement at the Occurrence Time. [Citation Graph (0, 0)][DBLP]
    ICISC, 2006, pp:206-221 [Conf]
  19. Chen-Yin Liao, Jen-Wei Yeh, Ming-Seng Kao
    A Copy Protection Technique Using Multi-level Error Coding. [Citation Graph (0, 0)][DBLP]
    ICISC, 2006, pp:222-232 [Conf]
  20. Heeyoul Kim, Younho Lee, Byungchun Chung, Hyunsoo Yoon, Jaewon Lee, KyungIm Jung
    Digital Rights Management with Right Delegation for Home Networks. [Citation Graph (0, 0)][DBLP]
    ICISC, 2006, pp:233-245 [Conf]
  21. Kang Ryoung Park, Min Cheol Whang, Joa Sang Lim, Yongjoo Cho
    Fake Iris Detection Based on Multiple Wavelet Filters and Hierarchical SVM. [Citation Graph (0, 0)][DBLP]
    ICISC, 2006, pp:246-256 [Conf]
  22. Daniel Joscák, Jirí Tuma
    Multi-block Collisions in Hash Functions Based on 3C and 3C+ Enhancements of the Merkle-Damgård Construction. [Citation Graph (0, 0)][DBLP]
    ICISC, 2006, pp:257-266 [Conf]
  23. Frédéric Muller, Thomas Peyrin
    Cryptanalysis of T-Function-Based Hash Functions. [Citation Graph (0, 0)][DBLP]
    ICISC, 2006, pp:267-285 [Conf]
  24. Hong-Su Cho, Sangwoo Park, Soo Hak Sung, Aaram Yun
    Collision Search Attack for 53-Step HAS-160. [Citation Graph (0, 0)][DBLP]
    ICISC, 2006, pp:286-295 [Conf]
  25. Kun Peng, Juan Manuel González Nieto, Yvo Desmedt, Ed Dawson
    Klein Bottle Routing: An Alternative to Onion Routing and Mix Network. [Citation Graph (0, 0)][DBLP]
    ICISC, 2006, pp:296-309 [Conf]
  26. Sanjit Chatterjee, Palash Sarkar
    New Constructions of Constant Size Ciphertext HIBE Without Random Oracle. [Citation Graph (0, 0)][DBLP]
    ICISC, 2006, pp:310-327 [Conf]
  27. Younho Lee, Heeyoul Kim, Yongsu Park, Hyunsoo Yoon
    A New Proxy Signature Scheme Providing Self-delegation. [Citation Graph (0, 0)][DBLP]
    ICISC, 2006, pp:328-342 [Conf]
  28. Marek Klonowski, Anna Lauks
    Extended Sanitizable Signatures. [Citation Graph (0, 0)][DBLP]
    ICISC, 2006, pp:343-355 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002