The SCEAS System
Navigation Menu

Conferences in DBLP

Information Security and Cryptology (ICISC) (icisc)
2001 (conf/icisc/2001)

  1. David Pointcheval
    Practical Security in Public-Key Cryptography. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:1-17 [Conf]
  2. Beomsik Song, Huaxiong Wang, Jennifer Seberry
    A New Cryptanalytic Method Using the Distribution Characteristics of Substitution Distances. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:18-31 [Conf]
  3. Seonhee Lee, Seokhie Hong, Sangjin Lee, Jongin Lim, Seonhee Yoon
    Truncated Differential Cryptanalysis of Camellia. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:32-38 [Conf]
  4. Jung Hee Cheon, MunJu Kim, Kwangjo Kim, Jung-Yeun Lee, SungWoo Kang
    Improved Impossible Differential Cryptanalysis of Rijndael and Crypton. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:39-49 [Conf]
  5. Sabine Leveiller, Joseph Boutros, Philippe Guillot, Gilles Zémor
    Cryptanalysis of Nonlinear Filter Generators with {0, 1}-Metric Viterbi Decoding. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:50- [Conf]
  6. Johannes Buchmann, Kouichi Sakurai, Tsuyoshi Takagi
    An IND-CCA2 Public-Key Cryptosystem with Fast Decryption. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:51-71 [Conf]
  7. Dug-Hwan Choi, Seungbok Choi, Dongho Won
    Improvement of Probabilistic Public Key Cryptosystems Using Discrete Logarithm. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:72-80 [Conf]
  8. Mototsugu Nishioka, Hisayoshi Satoh, Kouichi Sakurai
    Design and Analysis of Fast Provably Secure Public-Key Cryptosystems Based on a Modular Squaring. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:81-102 [Conf]
  9. Jaechul Sung, Sangjin Lee, Jong In Lim, Wonil Lee, Okyeon Yi
    Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:103-113 [Conf]
  10. Christopher Krügel, Thomas Toth, Clemens Kerer
    Decentralized Event Correlation for Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:114-131 [Conf]
  11. Vorapranee Khu-smith, Chris J. Mitchell
    Enhancing the Security of Cookies. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:132-145 [Conf]
  12. Yang-Seo Choi, Dong-il Seo, Sung Won Sohn
    A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:146-159 [Conf]
  13. Hartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang
    Efficient Revocation Schemes for Secure Multicast. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:160-177 [Conf]
  14. Gérard D. Cohen, Simon Litsyn, Gilles Zémor
    Binary Codes for Collusion-Secure Fingerprinting. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:178-185 [Conf]
  15. Jaroslaw Pastuszak, Darek Michalek, Josef Pieprzyk
    Copyright Protection of Object-Oriented Software. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:186-199 [Conf]
  16. Hyejoung Yoo, Kwangsoo Lee, Sangjin Lee, Jongin Lim
    Off-Line Authentication Using Watermarks. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:200-213 [Conf]
  17. Soichi Furuya
    Slide Attacks with a Known-Plaintext Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:214-225 [Conf]
  18. Josef Pieprzyk, Xian-Mo Zhang
    Constructions of Cheating Immune Secret Sharing. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:226-243 [Conf]
  19. Clemente Galdi, Pino Persiano
    Private Computation with Shared Randomness over Broadcast Channel. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:244-257 [Conf]
  20. Nicolás González-Deleito, Olivier Markowitch
    An Optimistic Multi-party Fair Exchange Protocol with Reduced Trust Requirements. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:258-267 [Conf]
  21. Supakorn Kungpisdan, Yongyuth Permpoontanalarp
    Practical Reasoning about Accountability in Electronic Commerce Protocols. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:268-284 [Conf]
  22. Ron Steinfeld, Laurence Bull, Yuliang Zheng
    Content Extraction Signatures. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:285-304 [Conf]
  23. Dae Hyun Yum, Pil Joong Lee
    New Signcryption Schemes Based on KCDSA. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:305-317 [Conf]
  24. Jinho Kim, Kwangjo Kim, Chulsoo Lee
    An Efficient and Provably Secure Threshold Blind Signature. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:318-327 [Conf]
  25. Kei Kawauchi, Hiroshi Minato, Atsuko Miyaji, Mitsuru Tada
    A Multi-signature Scheme with Signers' Intentions Secure against Active Attacks. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:328-340 [Conf]
  26. André Weimerskirch, Gilles Thonet
    A Distributed Light-Weight Authentication Model for Ad-hoc Networks. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:341-354 [Conf]
  27. Stelvio Cimato
    Design of an Authentication Protocol for Gsm Javacards. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:355-368 [Conf]
  28. Richard Au, Mark Looi, Paul Ashley, Loo Tang Seet
    Secure Authorisation Agent for Cross-Domain Access Control in a Mobile Computing Environment. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:369-381 [Conf]
  29. Joan Mir, Joan Borrell
    Protecting General Flexible Itineraries of Mobile Agents. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:382-396 [Conf]
  30. Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon
    RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:397-413 [Conf]
  31. Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon
    A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:414-427 [Conf]
  32. Katsuyuki Okeya, Kunihiko Miyazaki, Kouichi Sakurai
    A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:428-439 [Conf]
  33. Kouichi Itoh, Masahiko Takenaka, Naoya Torii
    DPA Countermeasure Based on the "Masking Method". [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:440-456 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002