Conferences in DBLP
Serge Lefranc , David Naccache Cut-&-Paste Attacks with JAVA. [Citation Graph (0, 0)][DBLP ] ICISC, 2002, pp:1-15 [Conf ] Ik Rae Jeong , Hee Yun Jeong , Hyun Sook Rhee , Dong Hoon Lee , Jong In Lim Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption. [Citation Graph (0, 0)][DBLP ] ICISC, 2002, pp:16-34 [Conf ] Jun-Bum Shin , Kwangsu Lee , Kyungah Shim New DSA-Verifiable Signcryption Schemes. [Citation Graph (0, 0)][DBLP ] ICISC, 2002, pp:35-47 [Conf ] Yuh-Dauh Lyuu , Ming-Luen Wu Convertible Group Undeniable Signatures. [Citation Graph (0, 0)][DBLP ] ICISC, 2002, pp:48-61 [Conf ] Willy Susilo , Reihaneh Safavi-Naini An Efficient Fail-Stop Signature Scheme Based on Factorization. [Citation Graph (0, 0)][DBLP ] ICISC, 2002, pp:62-74 [Conf ] Guilin Wang On the Security of the Li-Hwang-Lee-Tsai Threshold Group Signature Scheme. [Citation Graph (0, 0)][DBLP ] ICISC, 2002, pp:75-89 [Conf ] Hyungjong Kim System Specification Based Network Modeling for Survivability Testing Simulation. [Citation Graph (0, 0)][DBLP ] ICISC, 2002, pp:90-106 [Conf ] Hai Jin , Jianhua Sun , Hao Chen , Zongfen Han A Risk-Sensitive Intrusion Detection Model. [Citation Graph (0, 0)][DBLP ] ICISC, 2002, pp:107-117 [Conf ] Nils Maltesson , David Naccache , Elena Trichina , Christophe Tymen Applet Verification Strategiesfor RAM-Constrained Devices. [Citation Graph (0, 0)][DBLP ] ICISC, 2002, pp:118-137 [Conf ] Raphael Chung-Wei Phan , Soichi Furuya Sliding Properties of the DES Key Schedule and Potential Extensions to the Slide Attacks. [Citation Graph (0, 0)][DBLP ] ICISC, 2002, pp:138-148 [Conf ] Beomsik Song , Jennifer Seberry Consistent Differential Patterns of Rijndael. [Citation Graph (0, 0)][DBLP ] ICISC, 2002, pp:149-163 [Conf ] Lu Xiao , Howard M. Heys Hardware Design and Analysisof Block Cipher Components. [Citation Graph (0, 0)][DBLP ] ICISC, 2002, pp:164-181 [Conf ] Nicolas Courtois Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt. [Citation Graph (0, 0)][DBLP ] ICISC, 2002, pp:182-199 [Conf ] Erik Zenner On the Efficiency of theClock Control Guessing Attack. [Citation Graph (0, 0)][DBLP ] ICISC, 2002, pp:200-212 [Conf ] Se Ah Choi , Kyeongcheol Yang Balanced Shrinking Generators. [Citation Graph (0, 0)][DBLP ] ICISC, 2002, pp:213-225 [Conf ] Tetsu Iwata , Kaoru Kurosawa On the Universal Hash Functionsin Luby-Rackoff Cipher. [Citation Graph (0, 0)][DBLP ] ICISC, 2002, pp:226-236 [Conf ] Keith M. Martin , Josef Pieprzyk , Reihaneh Safavi-Naini , Huaxiong Wang , Peter R. Wild Threshold MACs. [Citation Graph (0, 0)][DBLP ] ICISC, 2002, pp:237-252 [Conf ] Josef Pieprzyk , Xian-Mo Zhang Ideal Threshold Schemes from MDS Codes. [Citation Graph (0, 0)][DBLP ] ICISC, 2002, pp:253-263 [Conf ] Tae-Jun Park , Mun-Kyu Lee , Kunsoo Park New Frobenius Expansions for Elliptic Curves with Efficient Endomorphisms. [Citation Graph (0, 0)][DBLP ] ICISC, 2002, pp:264-282 [Conf ] Tetsuya Izu , Tsuyoshi Takagi Efficient Computations of the Tate Pairingfor the Large MOV Degrees. [Citation Graph (0, 0)][DBLP ] ICISC, 2002, pp:283-297 [Conf ] Bodo Möller Improved Techniques for Fast Exponentiation. [Citation Graph (0, 0)][DBLP ] ICISC, 2002, pp:298-312 [Conf ] Hyun-Gyu Kim , Hyeong-Cheol Oh Efficient Hardware Multiplicative Inverters. [Citation Graph (0, 0)][DBLP ] ICISC, 2002, pp:313-326 [Conf ] Régis Bevan , Erik Knudsen Ways to Enhance Differential Power Analysis. [Citation Graph (0, 0)][DBLP ] ICISC, 2002, pp:327-342 [Conf ] Stefan Mangard A Simple Power-Analysis (SPA) Attackon Implementations of the AES Key Expansion. [Citation Graph (0, 0)][DBLP ] ICISC, 2002, pp:343-358 [Conf ] Kouichi Sakurai , Tsuyoshi Takagi A Reject Timing Attackon an IND-CCA2 Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP ] ICISC, 2002, pp:359-373 [Conf ] Sung-Ming Yen , Sang-Jae Moon , JaeCheol Ha Hardware Fault Attackon RSA with CRT Revisited. [Citation Graph (0, 0)][DBLP ] ICISC, 2002, pp:374-388 [Conf ] Byoungcheon Lee , Kwangjo Kim Receipt-Free Electronic Voting Scheme with a Tamper-Resistant Randomizer. [Citation Graph (0, 0)][DBLP ] ICISC, 2002, pp:389-406 [Conf ] Kun Peng , Colin Boyd , Ed Dawson , Kapali Viswanathan Non-interactive Auction Schemewith Strong Privacy. [Citation Graph (0, 0)][DBLP ] ICISC, 2002, pp:407-420 [Conf ] Hak Soo Ju , Hyun-Jeong Kim , Dong Hoon Lee , Jong In Lim An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control. [Citation Graph (0, 0)][DBLP ] ICISC, 2002, pp:421-432 [Conf ] Yaron Sella Speeding Up Secure Sessions Establishment on the Internet. [Citation Graph (0, 0)][DBLP ] ICISC, 2002, pp:433-450 [Conf ] Olivier Markowitch , Dieter Gollmann , Steve Kremer On Fairness in Exchange Protocols. [Citation Graph (0, 0)][DBLP ] ICISC, 2002, pp:451-464 [Conf ] Jaeil Lee , Taekyoung Kwon , Sanghoon Song , JooSeok Song A Model for Embedding and Authorizing Digital Signatures in Printed Documents. [Citation Graph (0, 0)][DBLP ] ICISC, 2002, pp:465-477 [Conf ] Hartono Kurnio , Luke McAven , Reihaneh Safavi-Naini , Huaxiong Wang A Dynamic Group Key Distribution Scheme with Flexible User Join. [Citation Graph (0, 0)][DBLP ] ICISC, 2002, pp:478-496 [Conf ] Ju Hee Ki , Hyun-Jeong Kim , Dong Hoon Lee , Chang-Seop Park Efficient Multicast Key Management for Stateless Receivers. [Citation Graph (0, 0)][DBLP ] ICISC, 2002, pp:497-509 [Conf ] Youn-Hee Gil , Daesung Moon , Sung Bum Pan , Yongwha Chung Fingerprint Verification System Involving Smart Card. [Citation Graph (0, 0)][DBLP ] ICISC, 2002, pp:510-524 [Conf ] Choonwoo Ryu , Hakil Kim A Fast Fingerprint Matching Algorithm Using Parzen Density Estimation. [Citation Graph (0, 0)][DBLP ] ICISC, 2002, pp:525-533 [Conf ]