Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon |
RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
Fault infective CRT, Fault tolerance, Cryptography, Fault detection, Side channel attack, Factorization, Chinese remainder theorem (CRT), Residue number system, Physical cryptanalysis, Hardware fault cryptanalysis |
1 | Johannes Buchmann 0001, Kouichi Sakurai, Tsuyoshi Takagi |
An IND-CCA2 Public-Key Cryptosystem with Fast Decryption. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
NICE cryptosystem, fast decryption, Public-key cryptosystem, Chosen ciphertext attack, factoring algorithm |
1 | Jinho Kim, Kwangjo Kim, Chulsoo Lee |
An Efficient and Provably Secure Threshold Blind Signature. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Dongho Won (eds.) |
Information Security and Cryptology - ICISC 2000, Third International Conference, Seoul, Korea, December 8-9, 2000, Proceedings |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Stelvio Cimato |
Design of an Authentication Protocol for Gsm Javacards. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
Javacard, E-commerce and M- commerce security, Authentication protocol |
1 | Beomsik Song, Huaxiong Wang, Jennifer Seberry |
A New Cryptanalytic Method Using the Distribution Characteristics of Substitution Distances. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
Substitution-Permutation(SP) Networks, Subtitution Distance, Cryptanalysis, Rijndael |
1 | Dae Hyun Yum, Pil Joong Lee |
New Signcryption Schemes Based on KCDSA. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon |
A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
Square-multiply exponentiation, Cryptography, Side channel attack, Exponentiation, Timing attack, Power analysis attack, Physical cryptanalysis, Hardware fault cryptanalysis |
1 | Sabine Leveiller, Joseph Boutros, Philippe Guillot, Gilles Zémor |
Cryptanalysis of Nonlinear Filter Generators with {0, 1}-Metric Viterbi Decoding. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
Boolean functions, stream ciphers, Fourier transform, Viterbi algorithm, filter generator |
1 | Nicolás González-Deleito, Olivier Markowitch |
An Optimistic Multi-party Fair Exchange Protocol with Reduced Trust Requirements. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Dug-Hwan Choi, Seungbok Choi, Dongho Won |
Improvement of Probabilistic Public Key Cryptosystems Using Discrete Logarithm. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | David Pointcheval |
Practical Security in Public-Key Cryptography. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Hyejoung Yoo, Kwangsoo Lee, Sangjin Lee 0002, Jongin Lim 0001 |
Off-Line Authentication Using Watermarks. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
off-line authentication, PS distortion, PSP distortion, e-commerce |
1 | Richard Au, Mark Looi, Paul Ashley, Loo Tang Seet |
Secure Authorisation Agent for Cross-Domain Access Control in a Mobile Computing Environment. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Yang-Seo Choi, Dong-il Seo, Sung Won Sohn |
A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Seonhee Lee, Seokhie Hong, Sangjin Lee 0002, Jongin Lim 0001, Seonhee Yoon |
Truncated Differential Cryptanalysis of Camellia. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
|
1 | Jaechul Sung, Sangjin Lee 0002, Jong In Lim 0001, Wonil Lee, Okyeon Yi |
Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation. |
ICISC |
2001 |
DBLP DOI BibTeX RDF |
Pseudorandom Function Family, Symmetric Encryption Schemes, Modes of Operation, Concrete Security |
1 | Chanjoo Chung, Seungbok Choi, Youngchul Choi, Dongho Won |
Efficient Anonymous Fingerprinting of Electronic Information with Improved Automatic Identification of Redistributors. |
ICISC |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Yi Mu 0001, Vijay Varadharajan |
An Internet Anonymous Auction Scheme. |
ICISC |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Byoungcheon Lee, Kwangjo Kim |
Secure Matchmaking Protocol. |
ICISC |
2000 |
DBLP DOI BibTeX RDF |
proving the equality or inequality of two discrete logarithms, finding collisions without decryption, public commitment, matchmaking, secure multiparty computation, proof of knowledge |
1 | Adam L. Young, Moti Yung |
Hash to the Rescue: Space Minimization for PKI Directories. |
ICISC |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Steve Babbage, Laurent Frisch |
On MISTY1 Higher Order Differential Cryptanalysis. |
ICISC |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Ted Krovetz, Phillip Rogaway |
Fast Universal Hashing with Small Keys and No Preprocessing: The PolyR Construction. |
ICISC |
2000 |
DBLP DOI BibTeX RDF |
software-optimized hashing, UMAC, message authentication, Universal hashing |
1 | Takeru Miyazaki |
An Improved Scheme of the Gennaro-Krawczyk-Rabin Undeniable Signature System Based on RSA. |
ICISC |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Atsuko Miyaji, Masaki Nakabayashi, Shunzo Takano |
Characterization of Elliptic Curve Traces under FR-Reduction. |
ICISC |
2000 |
DBLP DOI BibTeX RDF |
FR-reduction, trace, elliptic curve cryptosystems, number theory |
1 | Koutarou Suzuki, Kunio Kobayashi, Hikaru Morita |
Efficient Sealed-Bid Auction Using Hash Chain. |
ICISC |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Ju-Sung Kang, Seongtaek Chee, Choonsik Park |
A Note on the Higher Order Differential Attack of Block Ciphers with Two-Block Structures. |
ICISC |
2000 |
DBLP DOI BibTeX RDF |
(probabilistic) higher order differential attack, two-block structure, provable security, LC, DC |
1 | Yuliang Zheng 0001, Xian-Mo Zhang |
New Results on Correlation Immunity. |
ICISC |
2000 |
DBLP DOI BibTeX RDF |
Absolute Indicator, Stream Ciphers, Nonlinearity, Correlation Immunity, Linear Structures |
1 | Jae Seung Lee, Sang-Choon Kim, Seung Won Sohn |
A Design of the Security Evaluation System for Decision Support in the Enterprise Network Security Management. |
ICISC |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Hyun-Jeong Kim, Jong In Lim 0001, Dong Hoon Lee 0001 |
Efficient and Secure Member Deletion in Group Signature Schemes. |
ICISC |
2000 |
DBLP DOI BibTeX RDF |
|
1 | William D. Banks, Daniel Lieman, Igor E. Shparlinski, Van Thuong To |
Cryptographic Applications of Sparse Polynomials over Finite Rings. |
ICISC |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Dong Hyeon Cheon, Seokhie Hong, Sangjin Lee 0002, Sung Jae Lee, Kyung Hwan Park, Seonhee Yoon |
Difference Distribution Attack on DONUT and Improved DONUT. |
ICISC |
2000 |
DBLP DOI BibTeX RDF |
DONUT, Differential Cryptanalysis(DC), Linear Cryptanalysis(LC), Difference Distribution Attack(DDA), Decorrelation |
1 | Olivier Markowitch, Steve Kremer |
A Multi-party Optimistic Non-repudiation Protocol. |
ICISC |
2000 |
DBLP DOI BibTeX RDF |
|
1 | DongGook Park, Colin Boyd, Ed Dawson |
Micropayments for Wireless Communications. |
ICISC |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Jung Hee Cheon, Seongtaek Chee |
Elliptic Curves and Resilient Functions. |
ICISC |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Feng Bao 0001, Robert H. Deng, Peirong Feng |
An Efficient and Practical Scheme for Privacy Protection in the E-Commerce of Digital Goods. |
ICISC |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Hidema Tanaka, Chikashi Ishii, Toshinobu Kaneko |
On the Strength of KASUMI without FL Functions against Higher Order Differential Attack. |
ICISC |
2000 |
DBLP DOI BibTeX RDF |
|
1 | JooSeok Song (eds.) |
Information Security and Cryptology - ICISC'99, Second International Conference, Seoul, Korea, December 9-10, 1999, Proceedings |
ICISC |
2000 |
DBLP DOI BibTeX RDF |
|
1 | Chae Hoon Lim, Hyo Sun Hwang |
Speeding Up Elliptic Scalar Multiplication with Precomputation. |
ICISC |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Reihaneh Safavi-Naini, Huaxiong Wang, Kwok-Yan Lam |
A New Approach to Robust Threshold RSA Signature Schemes. |
ICISC |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Takeshi Koshiba |
A Technique for Boosting the Security of Cryptographic Systems with One-Way Hash Functions. |
ICISC |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Yasuyuki Sakai |
Over Fp vs. over F2n and on Pentium vs. on Alpha in Software Implementation of Hyperelliptic Curve Cryptosystems. |
ICISC |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Ho-Sun Yoon, Heung Youl Youm |
A New Approach to Efficient Verifiable Secret Sharing for Threshold KCDSA Signature. |
ICISC |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Pascal Paillier, Moti Yung |
Self-Escrowed Public-Key Infrastructures. |
ICISC |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Hyoungkyu Lee, Dongho Won, Kiwook Sohn, Hyoungkyu Yang |
Efficient 3-Pass Password-Based Key Exchange Protocol with Low Computational Cost for Client. |
ICISC |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Tetsuya Tamura, Kouichi Sakurai, Tsutomu Matsumoto |
A Hardware-Oriented Algorithm for Computing in Jacobians and Its Implementation for Hyperelliptic Curve Cryptosystems. |
ICISC |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Shingo Miyazaki, Kouichi Sakurai, Moti Yung |
On Threshold RSA-Signing with no Dealer. |
ICISC |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Serge Vaudenay |
On Probable Security for Conventional Cryptography. |
ICISC |
1999 |
DBLP DOI BibTeX RDF |
|
1 | DaeHun Nyang, JooSeok Song |
Preventing Double-Spent Coins from Revealing User's Whole Secret. |
ICISC |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Kapali Viswanathan, Colin Boyd, Ed Dawson |
Secure Selection Protocols. |
ICISC |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng 0001 |
Why Hierarchical Key Distribution Is Appropriate for Multicast Networks. |
ICISC |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Miia Hermelin, Kaisa Nyberg |
Correlation Properties of the Bluetooth Combiner Generator. |
ICISC |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Yuliang Zheng 0001, Xian-Mo Zhang |
Relationships between Bent Functions and Complementary Plateaued Functions. |
ICISC |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Jussipekka Leiwo, Christoph Hänle, Philip Homburg, Chandana Gamage, Andrew S. Tanenbaum |
A Security Design for a Wide-Area Distributed System. |
ICISC |
1999 |
DBLP DOI BibTeX RDF |
|
1 | William D. Banks, Frances Griffin, Daniel Lieman, Igor E. Shparlinski |
Non-linear Complexity of the Naor-Reingold Pseudo-random Function. |
ICISC |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Josef Pieprzyk, Eiji Okamoto |
Verfiable Secret Sharing and Time Capsules. |
ICISC |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Moonseog Seo, Kwangjo Kim |
Electronic Funds Transfer Protocol Using Domain-Verifiable Signcryption Scheme. |
ICISC |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Kook-Heui Lee, Sang-Jae Moon, Won-Young Jeong, Tae-Geun Kim |
A 2-Pass Authentication and Key Agreement Protocol for Mobile Communications. |
ICISC |
1999 |
DBLP DOI BibTeX RDF |
|
1 | Ju-Sung Kang, Choonsik Park, Sangjin Lee 0002, Jong In Lim 0001 |
On the Optimal Diffusion Layers with Practical Security against Differential and Linear Cryptanalysis. |
ICISC |
1999 |
DBLP DOI BibTeX RDF |
|
1 | |
The 1st International Conference on Information Security and Cryptology, ICSCI '98, December 18-19, 1998, Seoul, Korea, Proceedings |
ICISC |
1998 |
DBLP BibTeX RDF |
|
1 | Seungjoo Kim, Soohyun Oh, Dongho Won |
One-time self-certified public keys, revisited. |
ICISC |
1998 |
DBLP BibTeX RDF |
|
1 | Seong-Min Hong 0001, Jun-Bum Shin, H. Lee-Kwang, Hyunsoo Yoon |
A new appraoch to server-aided secret computation. |
ICISC |
1998 |
DBLP BibTeX RDF |
|
1 | Ernst Georg Haffner, Thomas Engel 0001, Christoph Meinel |
The flood-gate principle - a hybrid approach to a high security solution. |
ICISC |
1998 |
DBLP BibTeX RDF |
|
1 | Ahto Buldas, Peeter Laud |
New linking schemes for digital time-stamping. |
ICISC |
1998 |
DBLP BibTeX RDF |
|
1 | Yuliang Zheng 0001, Xian-Mo Zhang |
The nonhomomorphicity of S-boxes. |
ICISC |
1998 |
DBLP BibTeX RDF |
|
1 | Sachar Paulus, Tsuyoshi Takagi |
A generalization of the Diffie-Hellman problem and related cryptosystems allowing fast decryption. |
ICISC |
1998 |
DBLP BibTeX RDF |
|
1 | Eun Jeong Lee, Duk Soo Kim, Pil Joong Lee |
Speed-up of arithmetics in Fpm for elliptic curve cryptosystems. |
ICISC |
1998 |
DBLP BibTeX RDF |
|
1 | Colin Boyd, DongGook Park |
Public key protocols for wireless communications. |
ICISC |
1998 |
DBLP BibTeX RDF |
|
1 | Jae Woo Yoon, Kyeoung Ju Ha, Chang Gu Kang, Sang Seob Song |
Development of the web security system using a cryptographic token. |
ICISC |
1998 |
DBLP BibTeX RDF |
|
1 | Kazukuni Kobara, Hideki Imai |
A successive carrier-transmission model for narrow-band subliminal channels. |
ICISC |
1998 |
DBLP BibTeX RDF |
|
1 | Gary Gaskell, Mark Looi, Ed Dawson, Colin Boyd, Selwyn Russell |
A security architecture for third generation wireless systems. |
ICISC |
1998 |
DBLP BibTeX RDF |
|
1 | Detlef Hühnlein, Andreas Meyer 0003, Tsuyoshi Takagi |
Rabin and RSA analogues based on non-maximal imaginary quadratic orders. |
ICISC |
1998 |
DBLP BibTeX RDF |
|
1 | Sangwoo Park, Seongtaek Chee, Choonsik Park, Soo Hak Sung |
How to construct balanced Boolean functions with good global avalanche characteristics. |
ICISC |
1998 |
DBLP BibTeX RDF |
|
1 | Byung Kak Lee, Cheol Won Lee, Chung Ho Park, Hong Sub Lee |
A study on appliance of role based access control model using role attributes. |
ICISC |
1998 |
DBLP BibTeX RDF |
|
1 | Jae Woo Yoon, Sang-Uk Shin, Kyung Hyune Rhee |
A secure hash function based on cellular automata. |
ICISC |
1998 |
DBLP BibTeX RDF |
|
1 | Luis Hernández Encinas, Fausto Montoya Vitini, Jaime Muñoz Masqué, Alberto Peinado Domínguez |
Maximal period of orbits of the BBS generator. |
ICISC |
1998 |
DBLP BibTeX RDF |
|
1 | Marc Gysin |
The discrete logarithm problem for Lucas sequences and a new class of weak RSA Moduli. |
ICISC |
1998 |
DBLP BibTeX RDF |
|
1 | William Millan |
Cryptanalysis of the alleged CAVE algorithm. |
ICISC |
1998 |
DBLP BibTeX RDF |
|