default search action
6. ICISC 2003: Seoul, Korea
- Jong In Lim, Dong Hoon Lee:
Information Security and Cryptology - ICISC 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers. Lecture Notes in Computer Science 2971, Springer 2004, ISBN 3-540-21376-7 - Jonathan Katz:
Binary Tree Encryption: Constructions and Applications. 1-11 - Joseph K. Liu, Victor K. Wei, Duncan S. Wong:
A Separable Threshold Ring Signature Scheme. 12-26 - Guilin Wang:
On the Security of a Group Signature Scheme with Forward Security. 27-39 - Shahrokh Saeednia, Steve Kremer, Olivier Markowitch:
An Efficient Strong Designated Verifier Signature Scheme. 40-54 - Peeter Laud, Ricardo Corin:
Sound Computational Interpretation of Formal Encryption with Composed Keys. 55-66 - Tetsu Iwata, Kaoru Kurosawa:
On the Security of a New Variant of OMAC. 67-78 - Wen Ping Ma, Moon Ho Lee:
New Methods to Construct Cheating Immune Functions. 79-86 - Shoichi Hirose:
Yet Another Definition of Weak Collision Resistance and Its Analysis. 87-96 - YoungJu Choie, Eunjeong Lee:
Implementation of Tate Pairing on Hyperelliptic Curves of Genus 2. 97-111 - Tae-Jun Park, Mun-Kyu Lee, E-yong Kim, Kunsoo Park:
A General Expansion Method Using Efficient Endomorphisms. 112-126 - Seon Ok Lee, Seok Won Jung, Chang Han Kim, Janghong Yoon, Jae-Young Koh, Daeho Kim:
Design of Bit Parallel Multiplier with Lower Time Complexity. 127-139 - Joong Chul Yoon, Seok Won Jung, Sungwoo Lee:
Architecture for an Elliptic Curve Scalar Multiplication Resistant to Some Side-Channel Attacks. 139-151 - Tae-Jun Park, Mun-Kyu Lee, Kunsoo Park:
Efficient Scalar Multiplication in Hyperelliptic Curves Using A New Frobenius Expansion. 152-165 - Muxiang Zhang:
Adaptive Protocol for Entity Authentication and Key Agreement in Mobile Networks. 166-183 - Wook Shin, Dong-Ik Lee, Hyoung-Chun Kim, Jung-Min Kang, Jin-Seok Lee:
Extended Role Based Access Control and Procedural Restrictions. 184-196 - Yuan Zhang, Moon-Jung Chung, Hyun Kim:
Layer-Based Access Control Model in the Manufacturing Infrastructure and Design Automation System. 197-214 - Changjie Wang, Ho-fung Leung, Yumin Wang:
Secure Double Auction Protocols with Full Privacy Protection. 215-229 - Toru Nakanishi, Daisuke Yamamoto, Yuji Sugiyama:
Sealed-Bid Auctions with Efficient Bids. 230-244 - Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, Seungjae Yoo:
Providing Receipt-Freeness in Mixnet-Based Voting Protocols. 245-258 - Xiaofeng Chen, Byoungcheon Lee, Kwangjo Kim:
Receipt-Free Electronic Auction Schemes Using Homomorphic Encryption. 259-273 - Ginger Myles, Christian S. Collberg:
Software Watermarking Through Register Allocation: Implementation, Analysis, and Attacks. 274-293 - Limin Gu, Jiwu Huang, Zewen Chen:
Analysis of the Bounds for Linear Block Codes in Watermark Channel. 294-304 - Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng:
Security Analysis of Some Proxy Signatures. 305-319 - Jiun-Ming Chen, Bo-Yin Yang:
A More Secure and Efficacious TTS Signature Scheme. 320-338 - Zewen Chen, Jilin Wang, Yumin Wang, Jiwu Huang, Daren Huang:
An Efficient Revocation Algorithm in Group Signatures. 339-351 - Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui, Kam-Pui Chow:
Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity. 352-369 - Wen Ping Ma, Moon Ho Lee:
Group Oriented Cryptosystems Based on Linear Access Structures. 370-376 - Raylin Tso, Ying Miao, Eiji Okamoto:
A New Algorithm for Searching a Consistent Set of Shares in a Threshold Scheme with Cheaters. 377-385 - Willy Susilo, Yi Mu:
Non-interactive Deniable Ring Authentication. 386-401 - Seokhie Hong, Deukjo Hong, Youngdai Ko, Donghoon Chang, Wonil Lee, Sangjin Lee:
Differential Cryptanalysis of TEA and XTEA. 402-417 - Kevin Chen, Leonie Ruth Simpson, Matthew Henricksen, William Millan, Ed Dawson:
A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher. 418-431 - Daesung Kwon, Jaesung Kim, Sangwoo Park, Soo Hak Sung, Yaekwon Sohn, Jung Hwan Song, Yongjin Yeom, E-Joong Yoon, Sangjin Lee, Jaewon Lee, Seongtaek Chee, Daewan Han, Jin Hong:
New Block Cipher: ARIA. 432-445 - Jongsung Kim, Seokhie Hong, Sangjin Lee, Jung Hwan Song, Hyungjin Yang:
Truncated Differential Attacks on 8-Round CRYPTON. 446-456
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.