The SCEAS System
Navigation Menu

Conferences in DBLP

Information Security and Cryptology (ICISC) (icisc)
2003 (conf/icisc/2003)

  1. Jonathan Katz
    Binary Tree Encryption: Constructions and Applications. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:1-11 [Conf]
  2. Joseph K. Liu, Victor K. Wei, Duncan S. Wong
    A Separable Threshold Ring Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:12-26 [Conf]
  3. Guilin Wang
    On the Security of a Group Signature Scheme with Forward Security. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:27-39 [Conf]
  4. Shahrokh Saeednia, Steve Kremer, Olivier Markowitch
    An Efficient Strong Designated Verifier Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:40-54 [Conf]
  5. Peeter Laud, Ricardo Corin
    Sound Computational Interpretation of Formal Encryption with Composed Keys. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:55-66 [Conf]
  6. Tetsu Iwata, Kaoru Kurosawa
    On the Security of a New Variant of OMAC. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:67-78 [Conf]
  7. Wen Ping Ma, Moon Ho Lee
    New Methods to Construct Cheating Immune Functions. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:79-86 [Conf]
  8. Shoichi Hirose
    Yet Another Definition of Weak Collision Resistance and Its Analysis. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:87-96 [Conf]
  9. YoungJu Choie, Eunjeong Lee
    Implementation of Tate Pairing on Hyperelliptic Curves of Genus 2. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:97-111 [Conf]
  10. Tae-Jun Park, Mun-Kyu Lee, E-yong Kim, Kunsoo Park
    A General Expansion Method Using Efficient Endomorphisms. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:112-126 [Conf]
  11. Seon Ok Lee, Seok Won Jung, Chang Han Kim, Janghong Yoon, Jae-Young Koh, Daeho Kim
    Design of Bit Parallel Multiplier with Lower Time Complexity. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:127-139 [Conf]
  12. Joong Chul Yoon, Seok Won Jung, Sungwoo Lee
    Architecture for an Elliptic Curve Scalar Multiplication Resistant to Some Side-Channel Attacks. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:139-151 [Conf]
  13. Tae-Jun Park, Mun-Kyu Lee, Kunsoo Park
    Efficient Scalar Multiplication in Hyperelliptic Curves Using A New Frobenius Expansion. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:152-165 [Conf]
  14. Muxiang Zhang
    Adaptive Protocol for Entity Authentication and Key Agreement in Mobile Networks. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:166-183 [Conf]
  15. Wook Shin, Dong-Ik Lee, Hyoung-Chun Kim, Jung-Min Kang, Jin-Seok Lee
    Extended Role Based Access Control and Procedural Restrictions. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:184-196 [Conf]
  16. Yuan Zhang, Moon-Jung Chung, Hyun Kim
    Layer-Based Access Control Model in the Manufacturing Infrastructure and Design Automation System. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:197-214 [Conf]
  17. Changjie Wang, Ho-fung Leung, Yumin Wang
    Secure Double Auction Protocols with Full Privacy Protection. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:215-229 [Conf]
  18. Toru Nakanishi, Daisuke Yamamoto, Yuji Sugiyama
    Sealed-Bid Auctions with Efficient Bids. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:230-244 [Conf]
  19. Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, Seungjae Yoo
    Providing Receipt-Freeness in Mixnet-Based Voting Protocols. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:245-258 [Conf]
  20. Xiaofeng Chen, Byoungcheon Lee, Kwangjo Kim
    Receipt-Free Electronic Auction Schemes Using Homomorphic Encryption. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:259-273 [Conf]
  21. Ginger Myles, Christian S. Collberg
    Software Watermarking Through Register Allocation: Implementation, Analysis, and Attacks. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:274-293 [Conf]
  22. Limin Gu, Jiwu Huang, Zewen Chen
    Analysis of the Bounds for Linear Block Codes in Watermark Channel. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:294-304 [Conf]
  23. Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng
    Security Analysis of Some Proxy Signatures. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:305-319 [Conf]
  24. Jiun-Ming Chen, Bo-Yin Yang
    A More Secure and Efficacious TTS Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:320-338 [Conf]
  25. Zewen Chen, Jilin Wang, Yumin Wang, Jiwu Huang, Daren Huang
    An Efficient Revocation Algorithm in Group Signatures. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:339-351 [Conf]
  26. Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui, K. P. Chow
    Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:352-369 [Conf]
  27. Wen Ping Ma, Moon Ho Lee
    Group Oriented Cryptosystems Based on Linear Access Structures. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:370-376 [Conf]
  28. Raylin Tso, Ying Miao, Eiji Okamoto
    A New Algorithm for Searching a Consistent Set of Shares in a Threshold Scheme with Cheaters. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:377-385 [Conf]
  29. Willy Susilo, Yi Mu
    Non-interactive Deniable Ring Authentication. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:386-401 [Conf]
  30. Seokhie Hong, Deukjo Hong, Youngdai Ko, Donghoon Chang, Wonil Lee, Sangjin Lee
    Differential Cryptanalysis of TEA and XTEA. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:402-417 [Conf]
  31. Kevin Chen, Leonie Ruth Simpson, Matthew Henricksen, William Millan, Ed Dawson
    A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:418-431 [Conf]
  32. Daesung Kwon, Jaesung Kim, Sangwoo Park, Soo Hak Sung, Yaekwon Sohn, Jung Hwan Song, Yongjin Yeom, E-Joong Yoon, Sangjin Lee, Jaewon Lee, Seongtaek Chee, Daewan Han, Jin Hong
    New Block Cipher: ARIA. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:432-445 [Conf]
  33. Jongsung Kim, Seokhie Hong, Sangjin Lee, Jung Hwan Song, Hyungjin Yang
    Truncated Differential Attacks on 8-Round CRYPTON. [Citation Graph (0, 0)][DBLP]
    ICISC, 2003, pp:446-456 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002