Conferences in DBLP
David Naccache National Security, Forensics and Mobile Communications. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:1- [Conf ] Shigeo Tsujii Information Security as Interdisciplinary Science Based on Ethics. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:2- [Conf ] Maki Yoshida , Shigeo Mitsunari , Toru Fujiwara A Timed-Release Key Management Scheme for Backward Recovery. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:3-14 [Conf ] André Adelsbach , Ulrich Huber , Ahmad-Reza Sadeghi Property-Based Broadcast Encryption for Multi-level Security Policies. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:15-31 [Conf ] Felix Brandt Efficient Cryptographic Protocol Design Based on Distributed El Gamal Encryption. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:32-47 [Conf ] Woong-Sik Kim , Weon-Hee Yoo , Jang-Hyun Park , Bok-Ki Kim An Enhanced Estimation Algorithm for Reconstructing Fingerprint Strip Image. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:48-55 [Conf ] Junbeom Hur , Younho Lee , Seong-Min Hong , Hyunsoo Yoon Trust Management for Resilient Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:56-68 [Conf ] Vipul Goyal , Abhishek Jain 0002 , Jean-Jacques Quisquater Improvements to Mitchell's Remote User Authentication Protocol. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:69-80 [Conf ] Shaoquan Jiang , Guang Gong Efficient Authenticators with Application to Key Exchange. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:81-91 [Conf ] Jacques Patarin , Audrey Montreuil Benes and Butterfly Schemes Revisited. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:92-116 [Conf ] Sung-Ming Yen , Lee-Chun Ko , Sang-Jae Moon , JaeCheol Ha Relative Doubling Attack Against Montgomery Ladder. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:117-128 [Conf ] Yusuke Naito , Yu Sasaki , Noboru Kunihiro , Kazuo Ohta Improved Collision Attack on MD4 with Probability Almost 1. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:129-145 [Conf ] Aaram Yun , Soo Hak Sung , Sangwoo Park , Donghoon Chang , Seokhie Hong , Hong-Su Cho Finding Collision on 45-Step HAS-160. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:146-155 [Conf ] David Molnar , Matt Piotrowski , David Schultz , David Wagner The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:156-168 [Conf ] Chang-da Wang , Shiguang Ju The Dilemma of Covert Channels Searching. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:169-174 [Conf ] Young-Gab Kim , Taek Lee , Hoh Peter In , Yoon Jung Chung , In-Jung Kim , Doo-Kwon Baik A Probabilistic Approach to Estimate the Damage Propagation of Cyber Attacks. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:175-185 [Conf ] Sjouke Mauw , Martijn Oostdijk Foundations of Attack Trees. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:186-198 [Conf ] Nicolas Courtois , Louis Goubin An Algebraic Masking Method to Protect AES Against Power Attacks. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:199-209 [Conf ] Josef Pieprzyk , Xian-Mo Zhang , Jovan Dj. Golic Characterisations of Extended Resiliency and Extended Immunity of S-Boxes. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:210-228 [Conf ] Wenling Wu , Wentao Zhang , Dengguo Feng Integral Cryptanalysis of Reduced FOX Block Cipher. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:229-241 [Conf ] Kazuhiko Minematsu , Yukiyasu Tsunoo Hybrid Symmetric Encryption Using Known-Plaintext Attack-Secure Components. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:242-260 [Conf ] Nicolas Courtois Cryptanalysis of Sfinks. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:261-269 [Conf ] Bin Zhang , Hongjun Wu , Dengguo Feng , Hong Wang Weaknesses of COSvd (2, 128) Stream Cipher. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:270-283 [Conf ] Kazuhiko Minematsu , Yukiyasu Tsunoo Expanding Weak PRF with Small Key Size. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:284-298 [Conf ] Jacques Patarin On Linear Systems of Equations with Distinct Variables and Small Block Size. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:299-321 [Conf ] Emmanuel López-Trejo , Francisco Rodríguez-Henríquez , Arturo Díaz-Pérez An FPGA Implementation of CCM Mode Using AES. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:322-334 [Conf ] Soonhak Kwon , Taekyoung Kwon , Young-Ho Park New Architecture for Multiplication in GF (2m ) and Comparisons with Normal and Polynomial Basis Multipliers for Elliptic Curve Cryptography. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:335-351 [Conf ] Duhyun Bae , Gwanyeon Kim , Jiho Kim , Sehyun Park , Ohyoung Song An Efficient Design of CCMP for Robust Security Network. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:352-361 [Conf ] Gisle Grimen , Christian Mönch , Roger Midtstraum Software-Based Copy Protection for Temporal Media During Dissemination and Playback. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:362-377 [Conf ] Grace C.-W. Ting Ambiguity Attacks on the Ganic-Eskicioglu Robust DWT-SVD Image Watermarking Scheme. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:378-388 [Conf ] Joseph K. Liu , Patrick P. Tsang , Duncan S. Wong , Robert W. Zhu Universal Custodian-Hiding Verifiable Encryption for Discrete Logarithms. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:389-409 [Conf ] Qianhong Wu , Fangguo Zhang , Willy Susilo , Yi Mu An Efficient Static Blind Ring Signature Scheme. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:410-423 [Conf ] Sanjit Chatterjee , Palash Sarkar Trading Time for Space: Towards an Efficient IBE Scheme with Short(er) Public Parameters in the Standard Model. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:424-440 [Conf ] Duc-Liem Vo , Kwangjo Kim Yet Another Forward Secure Signature from Bilinear Pairings. [Citation Graph (0, 0)][DBLP ] ICISC, 2005, pp:441-455 [Conf ]