The SCEAS System
Navigation Menu

Conferences in DBLP

Information Security Conference / Workshop (ISC/ISW) (isw)
1997 (conf/isw/1997)

  1. G. R. Blakley, I. Borosh
    A General Theory of Codes, II: Paradigms and Homomorphisms. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:1-31 [Conf]
  2. Takeshi Shimoyama, Shiho Moriai, Toshinobu Kaneko
    Improving the Higher Order Differential Attack and Cryptanalysis of the KN Cipher. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:32-42 [Conf]
  3. Hidema Tanaka, Tomoya Ohishi, Toshinobu Kaneko
    An Optimised Linear Attack on Pseudorandom Generators Using a Non linear Combiner. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:43-54 [Conf]
  4. Bart Preneel
    Cryptanalysis of Message Authentication Codes. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:55-65 [Conf]
  5. R. Balasubramanian, S. V. Nagaraj
    The Least Witness of a Composite Number. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:66-74 [Conf]
  6. Hidenori Kuwadako, Hatsukazu Tanaka
    Fast Algorithm for Finding a Small Root of a Quadratic Modular Equation. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:75-81 [Conf]
  7. Feng Bao, Robert H. Deng, Xiang Gao, Yoshihide Igarashi
    Modified Finite Automata Public Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:82-95 [Conf]
  8. Daisuke Nakamura, Kunikatsu Kobayashi
    Modified ElGamal Cryptosystem. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:96-108 [Conf]
  9. Kazuo Ohta
    Remarks on Blind Decryption. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:109-115 [Conf]
  10. George I. Davida, René Peralta
    High-Speed Cryptography. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:116-120 [Conf]
  11. John Kelsey, Bruce Schneier, Chris Hall, David Wagner
    Secure Applications of Low-Entropy Keys. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:121-134 [Conf]
  12. Yoshiki Sameshima
    A Key Escrow System of the RSA Cryptosystem. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:135-146 [Conf]
  13. Kouichi Sakurai, Yoshinori Yamani, Shingo Miyazaki, Tohru Inoue
    A Key Escrow System with Protecting User's Privacy by Blind Decoding. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:147-157 [Conf]
  14. Yvo Desmedt
    Some Recent Research Aspects of Threshold Cryptography. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:158-173 [Conf]
  15. Akashi Satoh, Y. Kobayashi, H. Niijima, Nobuyuki Ooba, Seiji Munetoh, S. Sone
    A High-Speed Small RSA Encryption LSI with Low Power Dissipation. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:174-187 [Conf]
  16. Constantinos Markantonakis
    The Case for a Secure Multi-Application Smart Card Operating System. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:188-197 [Conf]
  17. Kenji Koyama, Routo Terada
    An Augmented Family of Cryptographic Parity Circuits. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:198-208 [Conf]
  18. Xun Yi, Kwok-Yan Lam, Shi Xin Cheng, Xiao Hu You
    A New Byte-Oriented Block Cipher. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:209-220 [Conf]
  19. Mihir Bellare
    Practice-Oriented Provable-Security. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:221-231 [Conf]
  20. Jussipekka Leiwo, Yuliang Zheng
    A Framework for the Management of Information Security. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:232-245 [Conf]
  21. Jean-Marie Kabasele-Tenday
    Specifying Security in a Composite System. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:246-255 [Conf]
  22. Kan Zhang
    On Rough Sets and Inference Analysis. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:256-265 [Conf]
  23. Tzonelih Hwang, Chih-Hung Wang
    Arbitrated Unconditionally Secure Authentication Scheme with Multi-senders. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:266-272 [Conf]
  24. Seungjoo Kim, Sangjoon Park, Dongho Won
    Group Signatures for Hierarchical Multigroups. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:273-281 [Conf]
  25. Kan Zhang
    Threshold Proxy Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:282-290 [Conf]
  26. Yuliang Zheng
    Signcryption and Its Applications in Efficient Public Key Solutions. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:291-312 [Conf]
  27. Khanh Quoc Nguyen, Yi Mu, Vijay Varadharajan
    A New Digital Cash Scheme Based on Blind Nyberg-Rueppel Digital Signature. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:313-320 [Conf]
  28. Andreas Fuchsberger
    An Incremental Payment Method for Internet Based Streaming Real-Time Media. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:321-327 [Conf]
  29. Shahrokh Saeednia, Reihaneh Safavi-Naini
    A New Identity-Based Key Exchange Protocol Minimizing Computation and Communication. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:328-334 [Conf]
  30. Hisao Sakazaki, Eiji Okamoto, Masahiro Mambo
    The Application of ID-Based Key Distribution Systems to an Elliptic Curve. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:335-344 [Conf]
  31. Kouichi Yamazaki, Masao Osaki, Osamu Hirota
    On Reconciliation of Discrepant Sequences Shared through Quantum Mechanical Channels. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:345-356 [Conf]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002