The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ICISC"( http://dblp.L3S.de/Venues/ICISC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/icisc

Publication years (Num. hits)
1998 (19) 1999 (21) 2000 (21) 2001 (34) 2002 (37) 2003 (34) 2004 (36) 2005 (35) 2006 (30) 2007 (29) 2008 (26) 2009 (26) 2010 (29) 2011 (33) 2012 (37) 2013 (32) 2014 (27) 2015 (24) 2016 (19) 2017 (21) 2018 (23) 2019 (19) 2020 (16) 2021 (24) 2022 (25) 2023 (1)
Publication types (Num. hits)
inproceedings(653) proceedings(25)
Venues (Conferences, Journals, ...)
ICISC(678)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 441 occurrences of 289 keywords

Results
Found 678 publication records. Showing 678 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Kyung Hyune Rhee, DaeHun Nyang (eds.) Information Security and Cryptology - ICISC 2010 - 13th International Conference, Seoul, Korea, December 1-3, 2010, Revised Selected Papers Search on Bibsonomy ICISC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Ivica Nikolic, Josef Pieprzyk, Przemyslaw Sokolowski, Ron Steinfeld Known and Chosen Key Differential Distinguishers for Block Ciphers. Search on Bibsonomy ICISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Junko Takahashi, Toshinori Fukunaga, Kazuo Sakiyama Fault Analysis on Stream Cipher MUGI. Search on Bibsonomy ICISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Zhi Wang 0014, Renquan Cheng, Debin Gao Revisiting Address Space Randomization. Search on Bibsonomy ICISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Mohamed Karroumi Protecting White-Box AES with Dual Ciphers. Search on Bibsonomy ICISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Alexandre Venelli Analysis of Nonparametric Estimation Methods for Mutual Information Analysis. Search on Bibsonomy ICISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Vasilis Pappas, Brian M. Bowen, Angelos D. Keromytis Evaluation of a Spyware Detection System Using Thin Client Computing. Search on Bibsonomy ICISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Kangkook Jee, Stelios Sidiroglou-Douskos, Angelos Stavrou, Angelos D. Keromytis An Adversarial Evaluation of Network Signaling and Control Mechanisms. Search on Bibsonomy ICISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yu Sasaki, Florian Mendel, Kazumaro Aoki Preimage Attacks against PKC98-Hash and HAS-V. Search on Bibsonomy ICISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Qichun Wang, Thomas Johansson 0001 On Equivalence Classes of Boolean Functions. Search on Bibsonomy ICISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Soe Yu Maw Secure Personalized Recommendation System for Mobile User. Search on Bibsonomy ICISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Takeshi Koshiba, Shinya Sawada Public Discussion Must Be Back and Forth in Secure Message Transmission. Search on Bibsonomy ICISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Dong Hoon Lee 0001, Seokhie Hong (eds.) Information, Security and Cryptology - ICISC 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers Search on Bibsonomy ICISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yi Lu 0002, Yvo Desmedt Bias Analysis of a Certain Problem with Applications to E0 and Shannon Cipher. Search on Bibsonomy ICISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Lingling Xu, Fangguo Zhang Oblivious Transfer with Complex Attribute-Based Access Control. Search on Bibsonomy ICISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Zhifang Zhang, Mulan Liu Unconditionally Secure Rational Secret Sharing in Standard Communication Networks. Search on Bibsonomy ICISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Haihua Gu, Dawu Gu, WenLu Xie Efficient Pairing Computation on Elliptic Curves in Hessian Form. Search on Bibsonomy ICISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Ambarish Karole, Nitesh Saxena, Nicolas Christin A Comparative Usability Evaluation of Traditional Password Managers. Search on Bibsonomy ICISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Sébastien Canard, Iwen Coisel, Giacomo de Meulenaer, Olivier Pereira Group Signatures are Suitable for Constrained Devices. Search on Bibsonomy ICISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Timo Kasper, Ingo von Maurich, David F. Oswald, Christof Paar Chameleon: A Versatile Emulator for Contactless Smartcards. Search on Bibsonomy ICISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Shoichi Hirose, Kota Ideguchi, Hidenori Kuwakado, Toru Owada, Bart Preneel, Hirotaka Yoshida A Lightweight 256-Bit Hash Function for Hardware and Low-End Devices: Lesamnta-LW. Search on Bibsonomy ICISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Michael Weiner, Erik Tews, Benedikt Heinz, Johann Heyszl FPGA Implementation of an Improved Attack against the DECT Standard Cipher. Search on Bibsonomy ICISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Xianmeng Meng Cryptanalysis of RSA with Small Prime Combination. Search on Bibsonomy ICISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Yu Chen 0003, Liqun Chen 0002 The Twin Bilinear Diffie-Hellman Inversion Problem and Applications. Search on Bibsonomy ICISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Jörn-Marc Schmidt, Marcel Medwed Fault Attacks on the Montgomery Powering Ladder. Search on Bibsonomy ICISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Youssef Souissi, Maxime Nassar, Sylvain Guilley, Jean-Luc Danger, Florent Flament First Principal Components Analysis: A New Side Channel Distinguisher. Search on Bibsonomy ICISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Christian L. F. Corniaux, Hossein Ghodosi Scalar Product-Based Distributed Oblivious Transfer. Search on Bibsonomy ICISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Basel Alomair, Radha Poovendran $\mathcal{E}$ -MACs: Towards More Secure and More Efficient Constructions of Secure Channels. Search on Bibsonomy ICISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Mohammad Reza Sohizadeh Abyaneh Passive Cryptanalysis of the UnConditionally Secure Authentication Protocol for RFID Systems. Search on Bibsonomy ICISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Bonwook Koo, Deukjo Hong, Daesung Kwon Related-Key Attack on the Full HIGHT. Search on Bibsonomy ICISC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Nikita Borisov, Marek Klonowski, Miroslaw Kutylowski, Anna Lauks-Dutka Attacking and Repairing the Improved ModOnions Protocol. Search on Bibsonomy ICISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mark Manulis, Koutarou Suzuki, Berkant Ustaoglu Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange. Search on Bibsonomy ICISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Kwangsun Ko, Hyun-Su Jang, Byuong Woon Park, Young Ik Eom Analysis of the Propagation Pattern of a Worm with Random Scanning Strategy Based on Usage Rate of Network Bandwidth. Search on Bibsonomy ICISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Qingsong Ye, Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang Efficient Fuzzy Matching and Intersection on Private Datasets. Search on Bibsonomy ICISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Deukjo Hong, Bonwook Koo, Yu Sasaki Improved Preimage Attack for 68-Step HAS-160. Search on Bibsonomy ICISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Georg Lippold, Colin Boyd, Juan Manuel González Nieto Efficient Certificateless KEM in the Standard Model. Search on Bibsonomy ICISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Abdulhadi Shoufan, Falko Strenzke, H. Gregor Molter, Marc Stöttinger A Timing Attack against Patterson Algorithm in the McEliece PKC. Search on Bibsonomy ICISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Shuang Wu 0004, Dengguo Feng, Wenling Wu Practical Rebound Attack on 12-Round Cheetah-256. Search on Bibsonomy ICISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Ahmad-Reza Sadeghi, Thomas Schneider 0003, Immo Wehrenberg Efficient Privacy-Preserving Face Recognition. Search on Bibsonomy ICISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Pil Joong Lee, Jung Hee Cheon (eds.) Information Security and Cryptology - ICISC 2008, 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers Search on Bibsonomy ICISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Deukjo Hong, Bonwook Koo, Woo-Hwan Kim, Daesung Kwon Preimage Attacks on Reduced Steps of ARIRANG and PKC98-Hash. Search on Bibsonomy ICISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Aivo Jürgenson, Jan Willemson Serial Model for Attack Tree Computations. Search on Bibsonomy ICISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto, Mark Manulis Generic One Round Group Key Exchange in the Standard Model. Search on Bibsonomy ICISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Eric Brier, David Naccache, Mehdi Tibouchi Factoring Unbalanced Moduli with Known Bits. Search on Bibsonomy ICISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Jeremy Erickson, Jintai Ding, Chris Christensen Algebraic Cryptanalysis of SMS4: Gröbner Basis Attack and SAT Attack Compared. Search on Bibsonomy ICISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Siyuan Qiao, Wei Wang 0035, Keting Jia Distinguishing Attack on Secret Prefix MAC Instantiated with Reduced SHA-1. Search on Bibsonomy ICISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Mohamed Saied Emam Mohamed, Daniel Cabarcas, Jintai Ding, Johannes Buchmann 0001, Stanislav Bulygin MXL3: An Efficient Algorithm for Computing Gröbner Bases of Zero-Dimensional Ideals. Search on Bibsonomy ICISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Axel Poschmann, Matthew J. B. Robshaw, Frank Vater, Christof Paar Lightweight Cryptography and RFID: Tackling the Hidden Overheads. Search on Bibsonomy ICISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Yumi Sakemi, Shoichi Takeuchi, Yasuyuki Nogami, Yoshitaka Morikawa Accelerating Twisted Ate Pairing with Frobenius Map, Small Scalar Multiplication, and Multi-pairing. Search on Bibsonomy ICISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Joo Yeon Cho, Miia Hermelin Improved Linear Cryptanalysis of SOSEMANUK. Search on Bibsonomy ICISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Amir Moradi 0001, Thomas Eisenbarth 0001, Axel Poschmann, Christof Paar Power Analysis of Single-Rail Storage Elements as Used in MDPL. Search on Bibsonomy ICISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Helger Lipmaa First CPIR Protocol with Data-Dependent Computation. Search on Bibsonomy ICISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Tord Ingolf Reistad, Tomas Toft Linear, Constant-Rounds Bit-Decomposition. Search on Bibsonomy ICISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Madeline González Muñiz, Rainer Steinwandt Cryptanalysis of a Message Recognition Protocol by Mashatan and Stinson. Search on Bibsonomy ICISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Alessandro Sorniotti, Refik Molva Secret Handshakes with Revocation Support. Search on Bibsonomy ICISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Johann Großschädl, Elisabeth Oswald, Dan Page, Michael Tunstall Side-Channel Analysis of Cryptographic Software via Early-Terminating Multiplications. Search on Bibsonomy ICISC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Miyuki Uno, Mikio Kano Visual Secret Sharing Schemes with Cyclic Access Structure for Many Images. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Ahmad-Reza Sadeghi, Thomas Schneider 0003 Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF universal circuits, secure evaluation of private functions, private data classification, neural networks, privacy
1Kun Peng, Feng Bao 0001 Efficient Vote Validity Check in Homomorphic Electronic Voting. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Kwangsu Lee, Jung Yeon Hwang, Dong Hoon Lee 0001 Non-interactive Identity-Based DNF Signature Scheme and Its Extensions. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Signer Anonymity, Identity-Based Signature, Disjunctive Normal Form, Access Structure
1Kazuhiro Haramura, Maki Yoshida, Toru Fujiwara Anonymous Fingerprinting for Predelivery of Contents. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Liting Zhang, Wenling Wu, Peng Wang 0009 Extended Models for Message Authentication. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Provable Security, Side Channel Attack, Security Model, Message Authentication
1Enes Pasalic Almost Fully Optimized Infinite Classes of Boolean Functions Resistant to (Fast) Algebraic Cryptanalysis. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Fast Algebraic attacks, Algebraic Attack Resistant, High Degree Product, Boolean function, Stream ciphers, Algebraic Immunity, Annihilators
1Kan Yasuda A Single-Key Domain Extender for Privacy-Preserving MACs and PRFs. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF imbalanced cipher block chaining, iCBC, MAC, privacy-preserving, message authentication code, domain extension
1Soojin Cho, Manpyo Hong Proving a Shuffle Using Representations of the Symmetric Group. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Chong Hee Kim, Gildas Avoine, François Koeune, François-Xavier Standaert, Olivier Pereira The Swiss-Knife RFID Distance Bounding Protocol. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Yukiyasu Tsunoo, Teruo Saito, Maki Shigeri, Takeshi Kawabata Higher Order Differential Attacks on Reduced-Round MISTY1. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF CRYPTREC, higher order differential attack, MISTY1, block cipher, NESSIE
1Yu Sasaki, Kazumaro Aoki A Preimage Attack for 52-Step HAS-160. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF HAS-160, splice-and-cut, hash function, preimage, one-way, local collision
1Jihye Kim, Gene Tsudik Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Sascha Müller 0003, Stefan Katzenbeisser 0001, Claudia Eckert 0001 Distributed Attribute-Based Encryption. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Takahiro Matsuda 0002, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF IND-CCA security, NM-sID-CPA security, public key encryption, identity-based encryption, non-malleability
1Joo Yeon Cho, Miia Hermelin, Kaisa Nyberg A New Technique for Multidimensional Linear Cryptanalysis with Applications on Reduced Round Serpent. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Multidimensional Linear Approximation, Block Ciphers, Linear Cryptanalysis, Serpent
1Santanu Sarkar 0001, Subhamoy Maitra Improved Partial Key Exposure Attacks on RSA by Guessing a Few Bits of One of the Prime Factors. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cryptanalysis, RSA, Side Channel Attacks, Lattice, Factorization, LLL Algorithm, Weak Keys
1Ivan Damgård, Jesper Buus Nielsen, Claudio Orlandi Essentially Optimal Universally Composable Oblivious Transfer. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Oblivious Transfer, Universally Composable Security
1Jafar Haadi Jafarian, Ali Noorollahi Ravari, Morteza Amini, Rasool Jalili Protecting Location Privacy through a Graph-Based Location Representation and a Robust Obfuscation Technique. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Obfuscation Techniques, Reliability, Distributed Architecture, Location Privacy, Middleware Architecture
1Svetla Nikova, Vincent Rijmen, Martin Schläffer Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF non-linear functions, Noekeon, DPA, sharing, S-box, masking, glitches
1Ghaith Hammouri, Kahraman D. Akdemir, Berk Sunar Novel PUF-Based Error Detection Methods in Finite State Machines. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF adversarial-faults, state-machines, PUF, Fault-resilience
1François-Xavier Standaert, Benedikt Gierlichs, Ingrid Verbauwhede Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Pairat Thorncharoensri, Willy Susilo, Yi Mu 0001 How to Balance Privacy with Authenticity. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF universal designated verifier signature schemes, one time, non-transferability, privacy, authenticity
1Reo Yoshida, Katsuyuki Takashima Simple Algorithms for Computing a Sequence of 2-Isogenies. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1David Nowak On Formal Verification of Arithmetic-Based Cryptographic Primitives. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF machine formalization, CSPRBG, semantic security, cryptographic primitives
1Bjorn De Sutter, Bertrand Anckaert, Jens Geiregat, Dominique Chanet, Koen De Bosschere Instruction Set Limitation in Support of Software Diversity. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF code fragment matching, diversity, software protection, binary rewriting
1Florian Mendel, Vincent Rijmen Colliding Message Pair for 53-Step HAS-160. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Antoine Scemama A Cryptanalysis of the Double-Round Quadratic Cryptosystem. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Double-Round Quadratic Cryptosystem, 2R Cryptosystem, Multivariable Cryptography
1Marcel Fernandez, Josep Cotrina Navau, Miguel Soriano, Neus Domingo A Note About the Traceability Properties of Linear Codes. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Florian Mendel, Vincent Rijmen Weaknesses in the HAS-V Compression Function. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Somitra Kumar Sanadhya, Palash Sarkar 0001 New Local Collisions for the SHA-2 Hash Family. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Changlong Jin, Hakil Kim, Stephen J. Elliott Liveness Detection of Fingerprint Based on Band-Selective Fourier Spectrum. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Band-selective, Ridge-valley texture, Fingerprint, Liveness detection, Fourier Spectrum
1Basel Alomair, Loukas Lazos, Radha Poovendran Passive Attacks on a Class of Authentication Protocols for RFID. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF passive attack, privacy, authentication, RFID
1Haina Zhang, Xiaoyun Wang 0001 Differential Cryptanalysis of T-Function Based Stream Cipher TSC-4. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF T-function, chosen IV attack, TSC-4, stream cipher, Differential cryptanalysis
1Ruo Ando, Youki Kadobayashi, Yoichi Shinoda Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Asynchronous snapshot, paravirtualized VMM, memory forensics, virtualized interruption, split kernel module
1Alexander Maximov On Large Distributions for Linear Cryptanalysis. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF large distributions, pseudo-linear functions, approximations, Linear cryptanalysis, complexity reduction
1Palash Sarkar 0001 Improving Upon the TET Mode of Operation. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF tweakable encryption, strong pseudo-random permutation, disk encryption, modes of operations
1Kil-Hyun Nam, Gwangsoo Rhee (eds.) Information Security and Cryptology - ICISC 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Jangseong Kim, Zeen Kim, Kwangjo Kim A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Chong Hee Kim, Jong Hoon Shin, Jean-Jacques Quisquater, Pil Joong Lee Safe-Error Attack on SPA-FA Resistant Exponentiations Using a HW Modular Multiplier. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
1Aya Comuta, Mitsuru Kawazoe, Tetsuya Takahashi 0001 Pairing-Friendly Elliptic Curves with Small Security Loss by Cheon's Algorithm. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Elliptic curves, Pairing based cryptosystem
1Amir Moradi 0001, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani Power Analysis Attacks on MDPL and DRSL Implementations. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF DRSL, MDPL, Side-Channel Attacks, DPA, flip-flop
1Wentao Zhang, Wenling Wu, Dengguo Feng New Results on Impossible Differential Cryptanalysis of Reduced AES. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF cryptanalysis, AES, impossible differentials
1Jiqiang Lu Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006. Search on Bibsonomy ICISC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF HIGHT, Block cipher, Related-key attack, Impossible differential cryptanalysis, Rectangle attack
Displaying result #301 - #400 of 678 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license