The SCEAS System
Navigation Menu

Conferences in DBLP

Information Security and Cryptology (ICISC) (icisc)
1999 (conf/icisc/1999)

  1. Serge Vaudenay
    On Probable Security for Conventional Cryptography. [Citation Graph (0, 0)][DBLP]
    ICISC, 1999, pp:1-16 [Conf]
  2. Miia Hermelin, Kaisa Nyberg
    Correlation Properties of the Bluetooth Combiner Generator. [Citation Graph (0, 0)][DBLP]
    ICISC, 1999, pp:17-29 [Conf]
  3. DaeHun Nyang, JooSeok Song
    Preventing Double-Spent Coins from Revealing User's Whole Secret. [Citation Graph (0, 0)][DBLP]
    ICISC, 1999, pp:30-37 [Conf]
  4. Ju-Sung Kang, Choonsik Park, Sangjin Lee, Jong In Lim
    On the Optimal Diffusion Layers with Practical Security against Differential and Linear Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    ICISC, 1999, pp:38-52 [Conf]
  5. William D. Banks, Frances Griffin, Daniel Lieman, Igor Shparlinski
    Non-linear Complexity of the Naor-Reingold Pseudo-random Function. [Citation Graph (0, 0)][DBLP]
    ICISC, 1999, pp:53-59 [Conf]
  6. Yuliang Zheng, Xian-Mo Zhang
    Relationships between Bent Functions and Complementary Plateaued Functions. [Citation Graph (0, 0)][DBLP]
    ICISC, 1999, pp:60-75 [Conf]
  7. Takeshi Koshiba
    A Technique for Boosting the Security of Cryptographic Systems with One-Way Hash Functions. [Citation Graph (0, 0)][DBLP]
    ICISC, 1999, pp:76-81 [Conf]
  8. Yasuyuki Sakai
    Over Fp vs. over F2n and on Pentium vs. on Alpha in Software Implementation of Hyperelliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP]
    ICISC, 1999, pp:82-101 [Conf]
  9. Chae Hoon Lim, Hyo Sun Hwang
    Speeding Up Elliptic Scalar Multiplication with Precomputation. [Citation Graph (0, 0)][DBLP]
    ICISC, 1999, pp:102-119 [Conf]
  10. Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng
    Why Hierarchical Key Distribution Is Appropriate for Multicast Networks. [Citation Graph (0, 0)][DBLP]
    ICISC, 1999, pp:120-131 [Conf]
  11. Kapali Viswanathan, Colin Boyd, Ed Dawson
    Secure Selection Protocols. [Citation Graph (0, 0)][DBLP]
    ICISC, 1999, pp:132-146 [Conf]
  12. Hyoungkyu Lee, Dongho Won, Kiwook Sohn, Hyoungkyu Yang
    Efficient 3-Pass Password-Based Key Exchange Protocol with Low Computational Cost for Client. [Citation Graph (0, 0)][DBLP]
    ICISC, 1999, pp:147-155 [Conf]
  13. Kook-Heui Lee, Sang-Jae Moon, Won-Young Jeong, Tae-Geun Kim
    A 2-Pass Authentication and Key Agreement Protocol for Mobile Communications. [Citation Graph (0, 0)][DBLP]
    ICISC, 1999, pp:156-168 [Conf]
  14. Josef Pieprzyk, Eiji Okamoto
    Verfiable Secret Sharing and Time Capsules. [Citation Graph (0, 0)][DBLP]
    ICISC, 1999, pp:169-183 [Conf]
  15. Reihaneh Safavi-Naini, Huaxiong Wang, Kwok-Yan Lam
    A New Approach to Robust Threshold RSA Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ICISC, 1999, pp:184-196 [Conf]
  16. Shingo Miyazaki, Kouichi Sakurai, Moti Yung
    On Threshold RSA-Signing with no Dealer. [Citation Graph (0, 0)][DBLP]
    ICISC, 1999, pp:197-207 [Conf]
  17. Ho-Sun Yoon, Heung-Youl Youm
    A New Approach to Efficient Verifiable Secret Sharing for Threshold KCDSA Signature. [Citation Graph (0, 0)][DBLP]
    ICISC, 1999, pp:208-220 [Conf]
  18. Tetsuya Tamura, Kouichi Sakurai, Tsutomu Matsumoto
    A Hardware-Oriented Algorithm for Computing in Jacobians and Its Implementation for Hyperelliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP]
    ICISC, 1999, pp:221-235 [Conf]
  19. Jussipekka Leiwo, Christoph Hänle, Philip Homburg, Chandana Gamage, Andrew S. Tanenbaum
    A Security Design for a Wide-Area Distributed System. [Citation Graph (0, 0)][DBLP]
    ICISC, 1999, pp:236-256 [Conf]
  20. Pascal Paillier, Moti Yung
    Self-Escrowed Public-Key Infrastructures. [Citation Graph (0, 0)][DBLP]
    ICISC, 1999, pp:257-268 [Conf]
  21. Moonseog Seo, Kwangjo Kim
    Electronic Funds Transfer Protocol Using Domain-Verifiable Signcryption Scheme. [Citation Graph (0, 0)][DBLP]
    ICISC, 1999, pp:269-277 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002