The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "ICISC"( http://dblp.L3S.de/Venues/ICISC )

URL (DBLP): http://dblp.uni-trier.de/db/conf/icisc

Publication years (Num. hits)
1998 (19) 1999 (21) 2000 (21) 2001 (34) 2002 (37) 2003 (34) 2004 (36) 2005 (35) 2006 (30) 2007 (29) 2008 (26) 2009 (26) 2010 (29) 2011 (33) 2012 (37) 2013 (32) 2014 (27) 2015 (24) 2016 (19) 2017 (21) 2018 (23) 2019 (19) 2020 (16) 2021 (24) 2022 (25) 2023 (1)
Publication types (Num. hits)
inproceedings(653) proceedings(25)
Venues (Conferences, Journals, ...)
ICISC(678)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 441 occurrences of 289 keywords

Results
Found 678 publication records. Showing 678 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Fault infective CRT, Fault tolerance, Cryptography, Fault detection, Side channel attack, Factorization, Chinese remainder theorem (CRT), Residue number system, Physical cryptanalysis, Hardware fault cryptanalysis
1Johannes Buchmann 0001, Kouichi Sakurai, Tsuyoshi Takagi An IND-CCA2 Public-Key Cryptosystem with Fast Decryption. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF NICE cryptosystem, fast decryption, Public-key cryptosystem, Chosen ciphertext attack, factoring algorithm
1Jinho Kim, Kwangjo Kim, Chulsoo Lee An Efficient and Provably Secure Threshold Blind Signature. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Dongho Won (eds.) Information Security and Cryptology - ICISC 2000, Third International Conference, Seoul, Korea, December 8-9, 2000, Proceedings Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Stelvio Cimato Design of an Authentication Protocol for Gsm Javacards. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Javacard, E-commerce and M- commerce security, Authentication protocol
1Beomsik Song, Huaxiong Wang, Jennifer Seberry A New Cryptanalytic Method Using the Distribution Characteristics of Substitution Distances. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Substitution-Permutation(SP) Networks, Subtitution Distance, Cryptanalysis, Rijndael
1Dae Hyun Yum, Pil Joong Lee New Signcryption Schemes Based on KCDSA. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Square-multiply exponentiation, Cryptography, Side channel attack, Exponentiation, Timing attack, Power analysis attack, Physical cryptanalysis, Hardware fault cryptanalysis
1Sabine Leveiller, Joseph Boutros, Philippe Guillot, Gilles Zémor Cryptanalysis of Nonlinear Filter Generators with {0, 1}-Metric Viterbi Decoding. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Boolean functions, stream ciphers, Fourier transform, Viterbi algorithm, filter generator
1Nicolás González-Deleito, Olivier Markowitch An Optimistic Multi-party Fair Exchange Protocol with Reduced Trust Requirements. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Dug-Hwan Choi, Seungbok Choi, Dongho Won Improvement of Probabilistic Public Key Cryptosystems Using Discrete Logarithm. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1David Pointcheval Practical Security in Public-Key Cryptography. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Hyejoung Yoo, Kwangsoo Lee, Sangjin Lee 0002, Jongin Lim 0001 Off-Line Authentication Using Watermarks. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF off-line authentication, PS distortion, PSP distortion, e-commerce
1Richard Au, Mark Looi, Paul Ashley, Loo Tang Seet Secure Authorisation Agent for Cross-Domain Access Control in a Mobile Computing Environment. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Yang-Seo Choi, Dong-il Seo, Sung Won Sohn A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Seonhee Lee, Seokhie Hong, Sangjin Lee 0002, Jongin Lim 0001, Seonhee Yoon Truncated Differential Cryptanalysis of Camellia. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
1Jaechul Sung, Sangjin Lee 0002, Jong In Lim 0001, Wonil Lee, Okyeon Yi Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation. Search on Bibsonomy ICISC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Pseudorandom Function Family, Symmetric Encryption Schemes, Modes of Operation, Concrete Security
1Chanjoo Chung, Seungbok Choi, Youngchul Choi, Dongho Won Efficient Anonymous Fingerprinting of Electronic Information with Improved Automatic Identification of Redistributors. Search on Bibsonomy ICISC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Yi Mu 0001, Vijay Varadharajan An Internet Anonymous Auction Scheme. Search on Bibsonomy ICISC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Byoungcheon Lee, Kwangjo Kim Secure Matchmaking Protocol. Search on Bibsonomy ICISC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF proving the equality or inequality of two discrete logarithms, finding collisions without decryption, public commitment, matchmaking, secure multiparty computation, proof of knowledge
1Adam L. Young, Moti Yung Hash to the Rescue: Space Minimization for PKI Directories. Search on Bibsonomy ICISC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Steve Babbage, Laurent Frisch On MISTY1 Higher Order Differential Cryptanalysis. Search on Bibsonomy ICISC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Ted Krovetz, Phillip Rogaway Fast Universal Hashing with Small Keys and No Preprocessing: The PolyR Construction. Search on Bibsonomy ICISC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF software-optimized hashing, UMAC, message authentication, Universal hashing
1Takeru Miyazaki An Improved Scheme of the Gennaro-Krawczyk-Rabin Undeniable Signature System Based on RSA. Search on Bibsonomy ICISC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Atsuko Miyaji, Masaki Nakabayashi, Shunzo Takano Characterization of Elliptic Curve Traces under FR-Reduction. Search on Bibsonomy ICISC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF FR-reduction, trace, elliptic curve cryptosystems, number theory
1Koutarou Suzuki, Kunio Kobayashi, Hikaru Morita Efficient Sealed-Bid Auction Using Hash Chain. Search on Bibsonomy ICISC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Ju-Sung Kang, Seongtaek Chee, Choonsik Park A Note on the Higher Order Differential Attack of Block Ciphers with Two-Block Structures. Search on Bibsonomy ICISC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF (probabilistic) higher order differential attack, two-block structure, provable security, LC, DC
1Yuliang Zheng 0001, Xian-Mo Zhang New Results on Correlation Immunity. Search on Bibsonomy ICISC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Absolute Indicator, Stream Ciphers, Nonlinearity, Correlation Immunity, Linear Structures
1Jae Seung Lee, Sang-Choon Kim, Seung Won Sohn A Design of the Security Evaluation System for Decision Support in the Enterprise Network Security Management. Search on Bibsonomy ICISC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Hyun-Jeong Kim, Jong In Lim 0001, Dong Hoon Lee 0001 Efficient and Secure Member Deletion in Group Signature Schemes. Search on Bibsonomy ICISC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1William D. Banks, Daniel Lieman, Igor E. Shparlinski, Van Thuong To Cryptographic Applications of Sparse Polynomials over Finite Rings. Search on Bibsonomy ICISC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Dong Hyeon Cheon, Seokhie Hong, Sangjin Lee 0002, Sung Jae Lee, Kyung Hwan Park, Seonhee Yoon Difference Distribution Attack on DONUT and Improved DONUT. Search on Bibsonomy ICISC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF DONUT, Differential Cryptanalysis(DC), Linear Cryptanalysis(LC), Difference Distribution Attack(DDA), Decorrelation
1Olivier Markowitch, Steve Kremer A Multi-party Optimistic Non-repudiation Protocol. Search on Bibsonomy ICISC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1DongGook Park, Colin Boyd, Ed Dawson Micropayments for Wireless Communications. Search on Bibsonomy ICISC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Jung Hee Cheon, Seongtaek Chee Elliptic Curves and Resilient Functions. Search on Bibsonomy ICISC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Feng Bao 0001, Robert H. Deng, Peirong Feng An Efficient and Practical Scheme for Privacy Protection in the E-Commerce of Digital Goods. Search on Bibsonomy ICISC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Hidema Tanaka, Chikashi Ishii, Toshinobu Kaneko On the Strength of KASUMI without FL Functions against Higher Order Differential Attack. Search on Bibsonomy ICISC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1JooSeok Song (eds.) Information Security and Cryptology - ICISC'99, Second International Conference, Seoul, Korea, December 9-10, 1999, Proceedings Search on Bibsonomy ICISC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
1Chae Hoon Lim, Hyo Sun Hwang Speeding Up Elliptic Scalar Multiplication with Precomputation. Search on Bibsonomy ICISC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Reihaneh Safavi-Naini, Huaxiong Wang, Kwok-Yan Lam A New Approach to Robust Threshold RSA Signature Schemes. Search on Bibsonomy ICISC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Takeshi Koshiba A Technique for Boosting the Security of Cryptographic Systems with One-Way Hash Functions. Search on Bibsonomy ICISC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Yasuyuki Sakai Over Fp vs. over F2n and on Pentium vs. on Alpha in Software Implementation of Hyperelliptic Curve Cryptosystems. Search on Bibsonomy ICISC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Ho-Sun Yoon, Heung Youl Youm A New Approach to Efficient Verifiable Secret Sharing for Threshold KCDSA Signature. Search on Bibsonomy ICISC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Pascal Paillier, Moti Yung Self-Escrowed Public-Key Infrastructures. Search on Bibsonomy ICISC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Hyoungkyu Lee, Dongho Won, Kiwook Sohn, Hyoungkyu Yang Efficient 3-Pass Password-Based Key Exchange Protocol with Low Computational Cost for Client. Search on Bibsonomy ICISC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Tetsuya Tamura, Kouichi Sakurai, Tsutomu Matsumoto A Hardware-Oriented Algorithm for Computing in Jacobians and Its Implementation for Hyperelliptic Curve Cryptosystems. Search on Bibsonomy ICISC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Shingo Miyazaki, Kouichi Sakurai, Moti Yung On Threshold RSA-Signing with no Dealer. Search on Bibsonomy ICISC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Serge Vaudenay On Probable Security for Conventional Cryptography. Search on Bibsonomy ICISC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1DaeHun Nyang, JooSeok Song Preventing Double-Spent Coins from Revealing User's Whole Secret. Search on Bibsonomy ICISC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Kapali Viswanathan, Colin Boyd, Ed Dawson Secure Selection Protocols. Search on Bibsonomy ICISC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng 0001 Why Hierarchical Key Distribution Is Appropriate for Multicast Networks. Search on Bibsonomy ICISC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Miia Hermelin, Kaisa Nyberg Correlation Properties of the Bluetooth Combiner Generator. Search on Bibsonomy ICISC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Yuliang Zheng 0001, Xian-Mo Zhang Relationships between Bent Functions and Complementary Plateaued Functions. Search on Bibsonomy ICISC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Jussipekka Leiwo, Christoph Hänle, Philip Homburg, Chandana Gamage, Andrew S. Tanenbaum A Security Design for a Wide-Area Distributed System. Search on Bibsonomy ICISC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1William D. Banks, Frances Griffin, Daniel Lieman, Igor E. Shparlinski Non-linear Complexity of the Naor-Reingold Pseudo-random Function. Search on Bibsonomy ICISC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Josef Pieprzyk, Eiji Okamoto Verfiable Secret Sharing and Time Capsules. Search on Bibsonomy ICISC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Moonseog Seo, Kwangjo Kim Electronic Funds Transfer Protocol Using Domain-Verifiable Signcryption Scheme. Search on Bibsonomy ICISC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Kook-Heui Lee, Sang-Jae Moon, Won-Young Jeong, Tae-Geun Kim A 2-Pass Authentication and Key Agreement Protocol for Mobile Communications. Search on Bibsonomy ICISC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1Ju-Sung Kang, Choonsik Park, Sangjin Lee 0002, Jong In Lim 0001 On the Optimal Diffusion Layers with Practical Security against Differential and Linear Cryptanalysis. Search on Bibsonomy ICISC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
1 The 1st International Conference on Information Security and Cryptology, ICSCI '98, December 18-19, 1998, Seoul, Korea, Proceedings Search on Bibsonomy ICISC The full citation details ... 1998 DBLP  BibTeX  RDF
1Seungjoo Kim, Soohyun Oh, Dongho Won One-time self-certified public keys, revisited. Search on Bibsonomy ICISC The full citation details ... 1998 DBLP  BibTeX  RDF
1Seong-Min Hong 0001, Jun-Bum Shin, H. Lee-Kwang, Hyunsoo Yoon A new appraoch to server-aided secret computation. Search on Bibsonomy ICISC The full citation details ... 1998 DBLP  BibTeX  RDF
1Ernst Georg Haffner, Thomas Engel 0001, Christoph Meinel The flood-gate principle - a hybrid approach to a high security solution. Search on Bibsonomy ICISC The full citation details ... 1998 DBLP  BibTeX  RDF
1Ahto Buldas, Peeter Laud New linking schemes for digital time-stamping. Search on Bibsonomy ICISC The full citation details ... 1998 DBLP  BibTeX  RDF
1Yuliang Zheng 0001, Xian-Mo Zhang The nonhomomorphicity of S-boxes. Search on Bibsonomy ICISC The full citation details ... 1998 DBLP  BibTeX  RDF
1Sachar Paulus, Tsuyoshi Takagi A generalization of the Diffie-Hellman problem and related cryptosystems allowing fast decryption. Search on Bibsonomy ICISC The full citation details ... 1998 DBLP  BibTeX  RDF
1Eun Jeong Lee, Duk Soo Kim, Pil Joong Lee Speed-up of arithmetics in Fpm for elliptic curve cryptosystems. Search on Bibsonomy ICISC The full citation details ... 1998 DBLP  BibTeX  RDF
1Colin Boyd, DongGook Park Public key protocols for wireless communications. Search on Bibsonomy ICISC The full citation details ... 1998 DBLP  BibTeX  RDF
1Jae Woo Yoon, Kyeoung Ju Ha, Chang Gu Kang, Sang Seob Song Development of the web security system using a cryptographic token. Search on Bibsonomy ICISC The full citation details ... 1998 DBLP  BibTeX  RDF
1Kazukuni Kobara, Hideki Imai A successive carrier-transmission model for narrow-band subliminal channels. Search on Bibsonomy ICISC The full citation details ... 1998 DBLP  BibTeX  RDF
1Gary Gaskell, Mark Looi, Ed Dawson, Colin Boyd, Selwyn Russell A security architecture for third generation wireless systems. Search on Bibsonomy ICISC The full citation details ... 1998 DBLP  BibTeX  RDF
1Detlef Hühnlein, Andreas Meyer 0003, Tsuyoshi Takagi Rabin and RSA analogues based on non-maximal imaginary quadratic orders. Search on Bibsonomy ICISC The full citation details ... 1998 DBLP  BibTeX  RDF
1Sangwoo Park, Seongtaek Chee, Choonsik Park, Soo Hak Sung How to construct balanced Boolean functions with good global avalanche characteristics. Search on Bibsonomy ICISC The full citation details ... 1998 DBLP  BibTeX  RDF
1Byung Kak Lee, Cheol Won Lee, Chung Ho Park, Hong Sub Lee A study on appliance of role based access control model using role attributes. Search on Bibsonomy ICISC The full citation details ... 1998 DBLP  BibTeX  RDF
1Jae Woo Yoon, Sang-Uk Shin, Kyung Hyune Rhee A secure hash function based on cellular automata. Search on Bibsonomy ICISC The full citation details ... 1998 DBLP  BibTeX  RDF
1Luis Hernández Encinas, Fausto Montoya Vitini, Jaime Muñoz Masqué, Alberto Peinado Domínguez Maximal period of orbits of the BBS generator. Search on Bibsonomy ICISC The full citation details ... 1998 DBLP  BibTeX  RDF
1Marc Gysin The discrete logarithm problem for Lucas sequences and a new class of weak RSA Moduli. Search on Bibsonomy ICISC The full citation details ... 1998 DBLP  BibTeX  RDF
1William Millan Cryptanalysis of the alleged CAVE algorithm. Search on Bibsonomy ICISC The full citation details ... 1998 DBLP  BibTeX  RDF
Displaying result #601 - #678 of 678 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license