|
Conferences in DBLP
- Jonathan Katz
Binary Tree Encryption: Constructions and Applications. [Citation Graph (0, 0)][DBLP] ICISC, 2003, pp:1-11 [Conf]
- Joseph K. Liu, Victor K. Wei, Duncan S. Wong
A Separable Threshold Ring Signature Scheme. [Citation Graph (0, 0)][DBLP] ICISC, 2003, pp:12-26 [Conf]
- Guilin Wang
On the Security of a Group Signature Scheme with Forward Security. [Citation Graph (0, 0)][DBLP] ICISC, 2003, pp:27-39 [Conf]
- Shahrokh Saeednia, Steve Kremer, Olivier Markowitch
An Efficient Strong Designated Verifier Signature Scheme. [Citation Graph (0, 0)][DBLP] ICISC, 2003, pp:40-54 [Conf]
- Peeter Laud, Ricardo Corin
Sound Computational Interpretation of Formal Encryption with Composed Keys. [Citation Graph (0, 0)][DBLP] ICISC, 2003, pp:55-66 [Conf]
- Tetsu Iwata, Kaoru Kurosawa
On the Security of a New Variant of OMAC. [Citation Graph (0, 0)][DBLP] ICISC, 2003, pp:67-78 [Conf]
- Wen Ping Ma, Moon Ho Lee
New Methods to Construct Cheating Immune Functions. [Citation Graph (0, 0)][DBLP] ICISC, 2003, pp:79-86 [Conf]
- Shoichi Hirose
Yet Another Definition of Weak Collision Resistance and Its Analysis. [Citation Graph (0, 0)][DBLP] ICISC, 2003, pp:87-96 [Conf]
- YoungJu Choie, Eunjeong Lee
Implementation of Tate Pairing on Hyperelliptic Curves of Genus 2. [Citation Graph (0, 0)][DBLP] ICISC, 2003, pp:97-111 [Conf]
- Tae-Jun Park, Mun-Kyu Lee, E-yong Kim, Kunsoo Park
A General Expansion Method Using Efficient Endomorphisms. [Citation Graph (0, 0)][DBLP] ICISC, 2003, pp:112-126 [Conf]
- Seon Ok Lee, Seok Won Jung, Chang Han Kim, Janghong Yoon, Jae-Young Koh, Daeho Kim
Design of Bit Parallel Multiplier with Lower Time Complexity. [Citation Graph (0, 0)][DBLP] ICISC, 2003, pp:127-139 [Conf]
- Joong Chul Yoon, Seok Won Jung, Sungwoo Lee
Architecture for an Elliptic Curve Scalar Multiplication Resistant to Some Side-Channel Attacks. [Citation Graph (0, 0)][DBLP] ICISC, 2003, pp:139-151 [Conf]
- Tae-Jun Park, Mun-Kyu Lee, Kunsoo Park
Efficient Scalar Multiplication in Hyperelliptic Curves Using A New Frobenius Expansion. [Citation Graph (0, 0)][DBLP] ICISC, 2003, pp:152-165 [Conf]
- Muxiang Zhang
Adaptive Protocol for Entity Authentication and Key Agreement in Mobile Networks. [Citation Graph (0, 0)][DBLP] ICISC, 2003, pp:166-183 [Conf]
- Wook Shin, Dong-Ik Lee, Hyoung-Chun Kim, Jung-Min Kang, Jin-Seok Lee
Extended Role Based Access Control and Procedural Restrictions. [Citation Graph (0, 0)][DBLP] ICISC, 2003, pp:184-196 [Conf]
- Yuan Zhang, Moon-Jung Chung, Hyun Kim
Layer-Based Access Control Model in the Manufacturing Infrastructure and Design Automation System. [Citation Graph (0, 0)][DBLP] ICISC, 2003, pp:197-214 [Conf]
- Changjie Wang, Ho-fung Leung, Yumin Wang
Secure Double Auction Protocols with Full Privacy Protection. [Citation Graph (0, 0)][DBLP] ICISC, 2003, pp:215-229 [Conf]
- Toru Nakanishi, Daisuke Yamamoto, Yuji Sugiyama
Sealed-Bid Auctions with Efficient Bids. [Citation Graph (0, 0)][DBLP] ICISC, 2003, pp:230-244 [Conf]
- Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, Seungjae Yoo
Providing Receipt-Freeness in Mixnet-Based Voting Protocols. [Citation Graph (0, 0)][DBLP] ICISC, 2003, pp:245-258 [Conf]
- Xiaofeng Chen, Byoungcheon Lee, Kwangjo Kim
Receipt-Free Electronic Auction Schemes Using Homomorphic Encryption. [Citation Graph (0, 0)][DBLP] ICISC, 2003, pp:259-273 [Conf]
- Ginger Myles, Christian S. Collberg
Software Watermarking Through Register Allocation: Implementation, Analysis, and Attacks. [Citation Graph (0, 0)][DBLP] ICISC, 2003, pp:274-293 [Conf]
- Limin Gu, Jiwu Huang, Zewen Chen
Analysis of the Bounds for Linear Block Codes in Watermark Channel. [Citation Graph (0, 0)][DBLP] ICISC, 2003, pp:294-304 [Conf]
- Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng
Security Analysis of Some Proxy Signatures. [Citation Graph (0, 0)][DBLP] ICISC, 2003, pp:305-319 [Conf]
- Jiun-Ming Chen, Bo-Yin Yang
A More Secure and Efficacious TTS Signature Scheme. [Citation Graph (0, 0)][DBLP] ICISC, 2003, pp:320-338 [Conf]
- Zewen Chen, Jilin Wang, Yumin Wang, Jiwu Huang, Daren Huang
An Efficient Revocation Algorithm in Group Signatures. [Citation Graph (0, 0)][DBLP] ICISC, 2003, pp:339-351 [Conf]
- Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui, K. P. Chow
Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity. [Citation Graph (0, 0)][DBLP] ICISC, 2003, pp:352-369 [Conf]
- Wen Ping Ma, Moon Ho Lee
Group Oriented Cryptosystems Based on Linear Access Structures. [Citation Graph (0, 0)][DBLP] ICISC, 2003, pp:370-376 [Conf]
- Raylin Tso, Ying Miao, Eiji Okamoto
A New Algorithm for Searching a Consistent Set of Shares in a Threshold Scheme with Cheaters. [Citation Graph (0, 0)][DBLP] ICISC, 2003, pp:377-385 [Conf]
- Willy Susilo, Yi Mu
Non-interactive Deniable Ring Authentication. [Citation Graph (0, 0)][DBLP] ICISC, 2003, pp:386-401 [Conf]
- Seokhie Hong, Deukjo Hong, Youngdai Ko, Donghoon Chang, Wonil Lee, Sangjin Lee
Differential Cryptanalysis of TEA and XTEA. [Citation Graph (0, 0)][DBLP] ICISC, 2003, pp:402-417 [Conf]
- Kevin Chen, Leonie Ruth Simpson, Matthew Henricksen, William Millan, Ed Dawson
A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher. [Citation Graph (0, 0)][DBLP] ICISC, 2003, pp:418-431 [Conf]
- Daesung Kwon, Jaesung Kim, Sangwoo Park, Soo Hak Sung, Yaekwon Sohn, Jung Hwan Song, Yongjin Yeom, E-Joong Yoon, Sangjin Lee, Jaewon Lee, Seongtaek Chee, Daewan Han, Jin Hong
New Block Cipher: ARIA. [Citation Graph (0, 0)][DBLP] ICISC, 2003, pp:432-445 [Conf]
- Jongsung Kim, Seokhie Hong, Sangjin Lee, Jung Hwan Song, Hyungjin Yang
Truncated Differential Attacks on 8-Round CRYPTON. [Citation Graph (0, 0)][DBLP] ICISC, 2003, pp:446-456 [Conf]
|