


default search action
5. ICISC 2002: Seoul, Korea
- Pil Joong Lee, Chae Hoon Lim:

Information Security and Cryptology - ICISC 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers. Lecture Notes in Computer Science 2587, Springer 2003, ISBN 3-540-00716-4
Invited Talk
- Serge Lefranc, David Naccache:

Cut-&-Paste Attacks with JAVA. 1-15
Digital Signatures
- Ik Rae Jeong, Hee Yun Jeong, Hyun Sook Rhee, Dong Hoon Lee, Jong In Lim:

Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption. 16-34 - Jun-Bum Shin, Kwangsu Lee

, Kyungah Shim:
New DSA-Verifiable Signcryption Schemes. 35-47 - Yuh-Dauh Lyuu, Ming-Luen Wu:

Convertible Group Undeniable Signatures. 48-61 - Willy Susilo

, Reihaneh Safavi-Naini:
An Efficient Fail-Stop Signature Scheme Based on Factorization. 62-74 - Guilin Wang:

On the Security of the Li-Hwang-Lee-Tsai Threshold Group Signature Scheme. 75-89
Internet Security
- HyungJong Kim:

System Specification Based Network Modeling for Survivability Testing Simulation. 90-106 - Hai Jin, Jianhua Sun, Hao Chen, Zongfen Han:

A Risk-Sensitive Intrusion Detection Model. 107-117 - Nils Maltesson, David Naccache, Elena Trichina, Christophe Tymen:

Applet Verification Strategiesfor RAM-Constrained Devices. 118-137
Block/Stream Ciphers
- Raphael Chung-Wei Phan, Soichi Furuya:

Sliding Properties of the DES Key Schedule and Potential Extensions to the Slide Attacks. 138-148 - Beomsik Song, Jennifer Seberry:

Consistent Differential Patterns of Rijndael. 149-163 - Lu Xiao, Howard M. Heys

:
Hardware Design and Analysisof Block Cipher Components. 164-181 - Nicolas T. Courtois:

Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt. 182-199
Stream Ciphers & Other Primitives
- Erik Zenner:

On the Efficiency of theClock Control Guessing Attack. 200-212 - Se Ah Choi, Kyeongcheol Yang:

Balanced Shrinking Generators. 213-225 - Tetsu Iwata, Kaoru Kurosawa:

On the Universal Hash Functionsin Luby-Rackoff Cipher. 226-236 - Keith M. Martin, Josef Pieprzyk

, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild:
Threshold MACs. 237-252 - Josef Pieprzyk

, Xian-Mo Zhang:
Ideal Threshold Schemes from MDS Codes. 253-263
Efficient Implementations
- Tae-Jun Park, Mun-Kyu Lee, Kunsoo Park:

New Frobenius Expansions for Elliptic Curves with Efficient Endomorphisms. 264-282 - Tetsuya Izu, Tsuyoshi Takagi:

Efficient Computations of the Tate Pairingfor the Large MOV Degrees. 283-297 - Bodo Möller:

Improved Techniques for Fast Exponentiation. 298-312 - Hyun-Gyu Kim, Hyeong-Cheol Oh:

Efficient Hardware Multiplicative Inverters. 313-326
Side-Channel Attacks
- Régis Bevan, Erik Knudsen:

Ways to Enhance Differential Power Analysis. 327-342 - Stefan Mangard:

A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion. 343-358 - Kouichi Sakurai, Tsuyoshi Takagi:

A Reject Timing Attackon an IND-CCA2 Public-Key Cryptosystem. 359-373 - Sung-Ming Yen, Sang-Jae Moon, JaeCheol Ha:

Hardware Fault Attackon RSA with CRT Revisited. 374-388
Cryptographic Protocols I
- Byoungcheon Lee, Kwangjo Kim:

Receipt-Free Electronic Voting Scheme with a Tamper-Resistant Randomizer. 389-406 - Kun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan:

Non-interactive Auction Schemewith Strong Privacy. 407-420 - Hak Soo Ju, Hyun-Jeong Kim, Dong Hoon Lee, Jong In Lim:

An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control. 421-432 - Yaron Sella:

Speeding Up Secure Sessions Establishment on the Internet. 433-450
Cryptographic Protocols II
- Olivier Markowitch, Dieter Gollmann, Steve Kremer:

On Fairness in Exchange Protocols. 451-464 - Jaeil Lee, Taekyoung Kwon, Sanghoon Song, JooSeok Song:

A Model for Embedding and Authorizing Digital Signatures in Printed Documents. 465-477 - Hartono Kurnio, Luke McAven, Reihaneh Safavi-Naini, Huaxiong Wang:

A Dynamic Group Key Distribution Scheme with Flexible User Join. 478-496 - JuHee Ki, Hyun-Jeong Kim, Dong Hoon Lee, Chang-Seop Park:

Efficient Multicast Key Management for Stateless Receivers. 497-509
Biometrics
- Youn-Hee Gil, Daesung Moon, Sung Bum Pan, Yongwha Chung:

Fingerprint Verification System Involving Smart Card. 510-524 - Choonwoo Ryu, Hakil Kim:

A Fast Fingerprint Matching Algorithm Using Parzen Density Estimation. 525-533

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














