|
Conferences in DBLP
- David Pointcheval
Practical Security in Public-Key Cryptography. [Citation Graph (0, 0)][DBLP] ICISC, 2001, pp:1-17 [Conf]
- Beomsik Song, Huaxiong Wang, Jennifer Seberry
A New Cryptanalytic Method Using the Distribution Characteristics of Substitution Distances. [Citation Graph (0, 0)][DBLP] ICISC, 2001, pp:18-31 [Conf]
- Seonhee Lee, Seokhie Hong, Sangjin Lee, Jongin Lim, Seonhee Yoon
Truncated Differential Cryptanalysis of Camellia. [Citation Graph (0, 0)][DBLP] ICISC, 2001, pp:32-38 [Conf]
- Jung Hee Cheon, MunJu Kim, Kwangjo Kim, Jung-Yeun Lee, SungWoo Kang
Improved Impossible Differential Cryptanalysis of Rijndael and Crypton. [Citation Graph (0, 0)][DBLP] ICISC, 2001, pp:39-49 [Conf]
- Sabine Leveiller, Joseph Boutros, Philippe Guillot, Gilles Zémor
Cryptanalysis of Nonlinear Filter Generators with {0, 1}-Metric Viterbi Decoding. [Citation Graph (0, 0)][DBLP] ICISC, 2001, pp:50- [Conf]
- Johannes Buchmann, Kouichi Sakurai, Tsuyoshi Takagi
An IND-CCA2 Public-Key Cryptosystem with Fast Decryption. [Citation Graph (0, 0)][DBLP] ICISC, 2001, pp:51-71 [Conf]
- Dug-Hwan Choi, Seungbok Choi, Dongho Won
Improvement of Probabilistic Public Key Cryptosystems Using Discrete Logarithm. [Citation Graph (0, 0)][DBLP] ICISC, 2001, pp:72-80 [Conf]
- Mototsugu Nishioka, Hisayoshi Satoh, Kouichi Sakurai
Design and Analysis of Fast Provably Secure Public-Key Cryptosystems Based on a Modular Squaring. [Citation Graph (0, 0)][DBLP] ICISC, 2001, pp:81-102 [Conf]
- Jaechul Sung, Sangjin Lee, Jong In Lim, Wonil Lee, Okyeon Yi
Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation. [Citation Graph (0, 0)][DBLP] ICISC, 2001, pp:103-113 [Conf]
- Christopher Krügel, Thomas Toth, Clemens Kerer
Decentralized Event Correlation for Intrusion Detection. [Citation Graph (0, 0)][DBLP] ICISC, 2001, pp:114-131 [Conf]
- Vorapranee Khu-smith, Chris J. Mitchell
Enhancing the Security of Cookies. [Citation Graph (0, 0)][DBLP] ICISC, 2001, pp:132-145 [Conf]
- Yang-Seo Choi, Dong-il Seo, Sung Won Sohn
A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation. [Citation Graph (0, 0)][DBLP] ICISC, 2001, pp:146-159 [Conf]
- Hartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang
Efficient Revocation Schemes for Secure Multicast. [Citation Graph (0, 0)][DBLP] ICISC, 2001, pp:160-177 [Conf]
- Gérard D. Cohen, Simon Litsyn, Gilles Zémor
Binary Codes for Collusion-Secure Fingerprinting. [Citation Graph (0, 0)][DBLP] ICISC, 2001, pp:178-185 [Conf]
- Jaroslaw Pastuszak, Darek Michalek, Josef Pieprzyk
Copyright Protection of Object-Oriented Software. [Citation Graph (0, 0)][DBLP] ICISC, 2001, pp:186-199 [Conf]
- Hyejoung Yoo, Kwangsoo Lee, Sangjin Lee, Jongin Lim
Off-Line Authentication Using Watermarks. [Citation Graph (0, 0)][DBLP] ICISC, 2001, pp:200-213 [Conf]
- Soichi Furuya
Slide Attacks with a Known-Plaintext Cryptanalysis. [Citation Graph (0, 0)][DBLP] ICISC, 2001, pp:214-225 [Conf]
- Josef Pieprzyk, Xian-Mo Zhang
Constructions of Cheating Immune Secret Sharing. [Citation Graph (0, 0)][DBLP] ICISC, 2001, pp:226-243 [Conf]
- Clemente Galdi, Pino Persiano
Private Computation with Shared Randomness over Broadcast Channel. [Citation Graph (0, 0)][DBLP] ICISC, 2001, pp:244-257 [Conf]
- Nicolás González-Deleito, Olivier Markowitch
An Optimistic Multi-party Fair Exchange Protocol with Reduced Trust Requirements. [Citation Graph (0, 0)][DBLP] ICISC, 2001, pp:258-267 [Conf]
- Supakorn Kungpisdan, Yongyuth Permpoontanalarp
Practical Reasoning about Accountability in Electronic Commerce Protocols. [Citation Graph (0, 0)][DBLP] ICISC, 2001, pp:268-284 [Conf]
- Ron Steinfeld, Laurence Bull, Yuliang Zheng
Content Extraction Signatures. [Citation Graph (0, 0)][DBLP] ICISC, 2001, pp:285-304 [Conf]
- Dae Hyun Yum, Pil Joong Lee
New Signcryption Schemes Based on KCDSA. [Citation Graph (0, 0)][DBLP] ICISC, 2001, pp:305-317 [Conf]
- Jinho Kim, Kwangjo Kim, Chulsoo Lee
An Efficient and Provably Secure Threshold Blind Signature. [Citation Graph (0, 0)][DBLP] ICISC, 2001, pp:318-327 [Conf]
- Kei Kawauchi, Hiroshi Minato, Atsuko Miyaji, Mitsuru Tada
A Multi-signature Scheme with Signers' Intentions Secure against Active Attacks. [Citation Graph (0, 0)][DBLP] ICISC, 2001, pp:328-340 [Conf]
- André Weimerskirch, Gilles Thonet
A Distributed Light-Weight Authentication Model for Ad-hoc Networks. [Citation Graph (0, 0)][DBLP] ICISC, 2001, pp:341-354 [Conf]
- Stelvio Cimato
Design of an Authentication Protocol for Gsm Javacards. [Citation Graph (0, 0)][DBLP] ICISC, 2001, pp:355-368 [Conf]
- Richard Au, Mark Looi, Paul Ashley, Loo Tang Seet
Secure Authorisation Agent for Cross-Domain Access Control in a Mobile Computing Environment. [Citation Graph (0, 0)][DBLP] ICISC, 2001, pp:369-381 [Conf]
- Joan Mir, Joan Borrell
Protecting General Flexible Itineraries of Mobile Agents. [Citation Graph (0, 0)][DBLP] ICISC, 2001, pp:382-396 [Conf]
- Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon
RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis. [Citation Graph (0, 0)][DBLP] ICISC, 2001, pp:397-413 [Conf]
- Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon
A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack. [Citation Graph (0, 0)][DBLP] ICISC, 2001, pp:414-427 [Conf]
- Katsuyuki Okeya, Kunihiko Miyazaki, Kouichi Sakurai
A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks. [Citation Graph (0, 0)][DBLP] ICISC, 2001, pp:428-439 [Conf]
- Kouichi Itoh, Masahiko Takenaka, Naoya Torii
DPA Countermeasure Based on the "Masking Method". [Citation Graph (0, 0)][DBLP] ICISC, 2001, pp:440-456 [Conf]
|