Conferences in DBLP
Serge Vaudenay RFID Privacy Based on Public-Key Cryptography. [Citation Graph (0, 0)][DBLP ] ICISC, 2006, pp:1-6 [Conf ] Palash Sarkar Generic Attacks on Symmetric Ciphers. [Citation Graph (0, 0)][DBLP ] ICISC, 2006, pp:7- [Conf ] Florian Mendel , Norbert Pramstaller , Christian Rechberger Improved Collision Attack on the Hash Function Proposed at PKC'98. [Citation Graph (0, 0)][DBLP ] ICISC, 2006, pp:8-21 [Conf ] Vladimir Shpilrain Hashing with Polynomials. [Citation Graph (0, 0)][DBLP ] ICISC, 2006, pp:22-28 [Conf ] Kazuhiro Suzuki , Dongvu Tonien , Kaoru Kurosawa , Koji Toyota Birthday Paradox for Multi-collisions. [Citation Graph (0, 0)][DBLP ] ICISC, 2006, pp:29-40 [Conf ] Ku-Young Chang , Ju-Sung Kang , Mun-Kyu Lee , Hangrok Lee , Dowon Hong New Variant of the Self-Shrinking Generator and Its Cryptographic Properties. [Citation Graph (0, 0)][DBLP ] ICISC, 2006, pp:41-50 [Conf ] Bon Wook Koo , Hwan Seok Jang , Jung Hwan Song On Constructing of a 32 ×32 Binary Matrix as a Diffusion Layer for a 256-Bit Block Cipher. [Citation Graph (0, 0)][DBLP ] ICISC, 2006, pp:51-64 [Conf ] Xian-Mo Zhang , Josef Pieprzyk , Yuliang Zheng On Algebraic Immunity and Annihilators. [Citation Graph (0, 0)][DBLP ] ICISC, 2006, pp:65-80 [Conf ] Bonseok Koo , Dongwook Lee , Gwonho Ryu , TaeJoo Chang , Sangjin Lee High-Speed RSA Crypto-processor with Radix-4 Modular Multiplication and Chinese Remainder Theorem. [Citation Graph (0, 0)][DBLP ] ICISC, 2006, pp:81-93 [Conf ] Hidehiro Katou , Feng Wang , Yasuyuki Nogami , Yoshitaka Morikawa A High-Speed Square Root Algorithm in Extension Fields. [Citation Graph (0, 0)][DBLP ] ICISC, 2006, pp:94-106 [Conf ] Sangwoon Yang , Jinsub Park , Younggap You The Smallest ARIA Module with 16-Bit Architecture. [Citation Graph (0, 0)][DBLP ] ICISC, 2006, pp:107-117 [Conf ] Willi Geiselmann , Fabian Januszewski , Hubert Köpfer , Jan Pelzl , Rainer Steinwandt A Simpler Sieving Device: Combining ECM and TWIRL. [Citation Graph (0, 0)][DBLP ] ICISC, 2006, pp:118-135 [Conf ] Zonghua Zhang , Pin-Han Ho , Xiaodong Lin , Hong Shen Janus: A Two-Sided Analytical Model for Multi-Stage Coordinated Attacks. [Citation Graph (0, 0)][DBLP ] ICISC, 2006, pp:136-154 [Conf ] Junsheng Chang , Huaimin Wang , Gang Yin A Time-Frame Based Trust Model for P2P Systems. [Citation Graph (0, 0)][DBLP ] ICISC, 2006, pp:155-165 [Conf ] Hong Zhang , Yeping He , Zhiguo Shi Spatial Context in Role-Based Access Control. [Citation Graph (0, 0)][DBLP ] ICISC, 2006, pp:166-178 [Conf ] Jongoh Choi , Si-Ho Cha , JooSeok Song An Efficient Scheme for Detecting Malicious Nodes in Mobile Ad Hoc Networks. [Citation Graph (0, 0)][DBLP ] ICISC, 2006, pp:179-193 [Conf ] Divyan M. Konidala , Kwangjo Kim Mobile RFID Applications and Security Challenges. [Citation Graph (0, 0)][DBLP ] ICISC, 2006, pp:194-205 [Conf ] Yoon-Ho Choi , Jong-Ho Park , Sang-Kon Kim , Seung-Woo Seo , Yu Kang , Jin Gi Choe , Ho-Kun Moon , Myung-Soo Rhee An Efficient Forensic Evidence Collection Scheme of Host Infringement at the Occurrence Time. [Citation Graph (0, 0)][DBLP ] ICISC, 2006, pp:206-221 [Conf ] Chen-Yin Liao , Jen-Wei Yeh , Ming-Seng Kao A Copy Protection Technique Using Multi-level Error Coding. [Citation Graph (0, 0)][DBLP ] ICISC, 2006, pp:222-232 [Conf ] Heeyoul Kim , Younho Lee , Byungchun Chung , Hyunsoo Yoon , Jaewon Lee , KyungIm Jung Digital Rights Management with Right Delegation for Home Networks. [Citation Graph (0, 0)][DBLP ] ICISC, 2006, pp:233-245 [Conf ] Kang Ryoung Park , Min Cheol Whang , Joa Sang Lim , Yongjoo Cho Fake Iris Detection Based on Multiple Wavelet Filters and Hierarchical SVM. [Citation Graph (0, 0)][DBLP ] ICISC, 2006, pp:246-256 [Conf ] Daniel Joscák , Jirí Tuma Multi-block Collisions in Hash Functions Based on 3C and 3C+ Enhancements of the Merkle-Damgård Construction. [Citation Graph (0, 0)][DBLP ] ICISC, 2006, pp:257-266 [Conf ] Frédéric Muller , Thomas Peyrin Cryptanalysis of T-Function-Based Hash Functions. [Citation Graph (0, 0)][DBLP ] ICISC, 2006, pp:267-285 [Conf ] Hong-Su Cho , Sangwoo Park , Soo Hak Sung , Aaram Yun Collision Search Attack for 53-Step HAS-160. [Citation Graph (0, 0)][DBLP ] ICISC, 2006, pp:286-295 [Conf ] Kun Peng , Juan Manuel González Nieto , Yvo Desmedt , Ed Dawson Klein Bottle Routing: An Alternative to Onion Routing and Mix Network. [Citation Graph (0, 0)][DBLP ] ICISC, 2006, pp:296-309 [Conf ] Sanjit Chatterjee , Palash Sarkar New Constructions of Constant Size Ciphertext HIBE Without Random Oracle. [Citation Graph (0, 0)][DBLP ] ICISC, 2006, pp:310-327 [Conf ] Younho Lee , Heeyoul Kim , Yongsu Park , Hyunsoo Yoon A New Proxy Signature Scheme Providing Self-delegation. [Citation Graph (0, 0)][DBLP ] ICISC, 2006, pp:328-342 [Conf ] Marek Klonowski , Anna Lauks Extended Sanitizable Signatures. [Citation Graph (0, 0)][DBLP ] ICISC, 2006, pp:343-355 [Conf ]