Conferences in DBLP
Serge Vaudenay On Probable Security for Conventional Cryptography. [Citation Graph (0, 0)][DBLP ] ICISC, 1999, pp:1-16 [Conf ] Miia Hermelin , Kaisa Nyberg Correlation Properties of the Bluetooth Combiner Generator. [Citation Graph (0, 0)][DBLP ] ICISC, 1999, pp:17-29 [Conf ] DaeHun Nyang , JooSeok Song Preventing Double-Spent Coins from Revealing User's Whole Secret. [Citation Graph (0, 0)][DBLP ] ICISC, 1999, pp:30-37 [Conf ] Ju-Sung Kang , Choonsik Park , Sangjin Lee , Jong In Lim On the Optimal Diffusion Layers with Practical Security against Differential and Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP ] ICISC, 1999, pp:38-52 [Conf ] William D. Banks , Frances Griffin , Daniel Lieman , Igor Shparlinski Non-linear Complexity of the Naor-Reingold Pseudo-random Function. [Citation Graph (0, 0)][DBLP ] ICISC, 1999, pp:53-59 [Conf ] Yuliang Zheng , Xian-Mo Zhang Relationships between Bent Functions and Complementary Plateaued Functions. [Citation Graph (0, 0)][DBLP ] ICISC, 1999, pp:60-75 [Conf ] Takeshi Koshiba A Technique for Boosting the Security of Cryptographic Systems with One-Way Hash Functions. [Citation Graph (0, 0)][DBLP ] ICISC, 1999, pp:76-81 [Conf ] Yasuyuki Sakai Over Fp vs. over F2n and on Pentium vs. on Alpha in Software Implementation of Hyperelliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP ] ICISC, 1999, pp:82-101 [Conf ] Chae Hoon Lim , Hyo Sun Hwang Speeding Up Elliptic Scalar Multiplication with Precomputation. [Citation Graph (0, 0)][DBLP ] ICISC, 1999, pp:102-119 [Conf ] Chandana Gamage , Jussipekka Leiwo , Yuliang Zheng Why Hierarchical Key Distribution Is Appropriate for Multicast Networks. [Citation Graph (0, 0)][DBLP ] ICISC, 1999, pp:120-131 [Conf ] Kapali Viswanathan , Colin Boyd , Ed Dawson Secure Selection Protocols. [Citation Graph (0, 0)][DBLP ] ICISC, 1999, pp:132-146 [Conf ] Hyoungkyu Lee , Dongho Won , Kiwook Sohn , Hyoungkyu Yang Efficient 3-Pass Password-Based Key Exchange Protocol with Low Computational Cost for Client. [Citation Graph (0, 0)][DBLP ] ICISC, 1999, pp:147-155 [Conf ] Kook-Heui Lee , Sang-Jae Moon , Won-Young Jeong , Tae-Geun Kim A 2-Pass Authentication and Key Agreement Protocol for Mobile Communications. [Citation Graph (0, 0)][DBLP ] ICISC, 1999, pp:156-168 [Conf ] Josef Pieprzyk , Eiji Okamoto Verfiable Secret Sharing and Time Capsules. [Citation Graph (0, 0)][DBLP ] ICISC, 1999, pp:169-183 [Conf ] Reihaneh Safavi-Naini , Huaxiong Wang , Kwok-Yan Lam A New Approach to Robust Threshold RSA Signature Schemes. [Citation Graph (0, 0)][DBLP ] ICISC, 1999, pp:184-196 [Conf ] Shingo Miyazaki , Kouichi Sakurai , Moti Yung On Threshold RSA-Signing with no Dealer. [Citation Graph (0, 0)][DBLP ] ICISC, 1999, pp:197-207 [Conf ] Ho-Sun Yoon , Heung-Youl Youm A New Approach to Efficient Verifiable Secret Sharing for Threshold KCDSA Signature. [Citation Graph (0, 0)][DBLP ] ICISC, 1999, pp:208-220 [Conf ] Tetsuya Tamura , Kouichi Sakurai , Tsutomu Matsumoto A Hardware-Oriented Algorithm for Computing in Jacobians and Its Implementation for Hyperelliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP ] ICISC, 1999, pp:221-235 [Conf ] Jussipekka Leiwo , Christoph Hänle , Philip Homburg , Chandana Gamage , Andrew S. Tanenbaum A Security Design for a Wide-Area Distributed System. [Citation Graph (0, 0)][DBLP ] ICISC, 1999, pp:236-256 [Conf ] Pascal Paillier , Moti Yung Self-Escrowed Public-Key Infrastructures. [Citation Graph (0, 0)][DBLP ] ICISC, 1999, pp:257-268 [Conf ] Moonseog Seo , Kwangjo Kim Electronic Funds Transfer Protocol Using Domain-Verifiable Signcryption Scheme. [Citation Graph (0, 0)][DBLP ] ICISC, 1999, pp:269-277 [Conf ]