


default search action
8. ICISC 2005: Seoul, Korea
- Dongho Won, Seungjoo Kim:

Information Security and Cryptology - ICISC 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers. Lecture Notes in Computer Science 3935, Springer 2006, ISBN 3-540-33354-1
Invited Talks
- David Naccache:

National Security, Forensics and Mobile Communications. 1 - Shigeo Tsujii:

Information Security as Interdisciplinary Science Based on Ethics. 2
Key Management and Distributed Cryptography
- Maki Yoshida, Shigeo Mitsunari

, Toru Fujiwara:
A Timed-Release Key Management Scheme for Backward Recovery. 3-14 - André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi:

Property-Based Broadcast Encryption for Multi-level Security Policies. 15-31 - Felix Brandt:

Efficient Cryptographic Protocol Design Based on Distributed El Gamal Encryption. 32-47
Authentication and Biometrics
- Woong-Sik Kim, Weon-Hee Yoo, Jang-Hyun Park, Bok-Ki Kim:

An Enhanced Estimation Algorithm for Reconstructing Fingerprint Strip Image. 48-55 - Junbeom Hur, Younho Lee

, Seong-Min Hong, Hyunsoo Yoon:
Trust Management for Resilient Wireless Sensor Networks. 56-68 - Vipul Goyal, Abhishek Jain, Jean-Jacques Quisquater:

Improvements to Mitchell's Remote User Authentication Protocol. 69-80 - Shaoquan Jiang, Guang Gong:

Efficient Authenticators with Application to Key Exchange. 81-91
Provable Security and Primitives
- Jacques Patarin, Audrey Montreuil:

Benes and Butterfly Schemes Revisited. 92-116 - Sung-Ming Yen, Lee-Chun Ko, Sang-Jae Moon, JaeCheol Ha:

Relative Doubling Attack Against Montgomery Ladder. 117-128 - Yusuke Naito, Yu Sasaki, Noboru Kunihiro

, Kazuo Ohta:
Improved Collision Attack on MD4 with Probability Almost 1. 129-145 - Aaram Yun, Soo Hak Sung, Sangwoo Park, Donghoon Chang, Seokhie Hong, Hong-Su Cho:

Finding Collision on 45-Step HAS-160. 146-155
System/Network Security
- David Molnar, Matt Piotrowski, David Schultz, David A. Wagner:

The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks. 156-168 - Changda Wang, Shiguang Ju:

The Dilemma of Covert Channels Searching. 169-174 - Young-Gab Kim

, Taek Lee, Hoh Peter In, Yoon Jung Chung, InJung Kim, Doo-Kwon Baik:
A Probabilistic Approach to Estimate the Damage Propagation of Cyber Attacks. 175-185 - Sjouke Mauw

, Martijn Oostdijk:
Foundations of Attack Trees. 186-198
Block/Stream Ciphers (I)
- Nicolas T. Courtois, Louis Goubin:

An Algebraic Masking Method to Protect AES Against Power Attacks. 199-209 - Josef Pieprzyk

, Xian-Mo Zhang, Jovan Dj. Golic:
Characterisations of Extended Resiliency and Extended Immunity of S-Boxes. 210-228 - Wenling Wu, Wentao Zhang, Dengguo Feng:

Integral Cryptanalysis of Reduced FOX Block Cipher. 229-241 - Kazuhiko Minematsu, Yukiyasu Tsunoo:

Hybrid Symmetric Encryption Using Known-Plaintext Attack-Secure Components. 242-260
Block/Stream Ciphers (II)
- Nicolas T. Courtois:

Cryptanalysis of Sfinks. 261-269 - Bin Zhang, Hongjun Wu, Dengguo Feng, Hong Wang:

Weaknesses of COSvd (2, 128) Stream Cipher. 270-283 - Kazuhiko Minematsu, Yukiyasu Tsunoo:

Expanding Weak PRF with Small Key Size. 284-298 - Jacques Patarin:

On Linear Systems of Equations with Distinct Variables and Small Block Size. 299-321
Efficient Implementations
- Emmanuel López-Trejo, Francisco Rodríguez-Henríquez, Arturo Díaz-Pérez:

An FPGA Implementation of CCM Mode Using AES. 322-334 - Soonhak Kwon, Taekyoung Kwon, Young-Ho Park

:
New Architecture for Multiplication in GF(2m) and Comparisons with Normal and Polynomial Basis Multipliers for Elliptic Curve Cryptography. 335-351 - Duhyun Bae, Gwanyeon Kim, Jiho Kim, Sehyun Park, Ohyoung Song:

An Efficient Design of CCMP for Robust Security Network. 352-361
Digital Rights Management
- Gisle Grimen, Christian Mönch, Roger Midtstraum:

Software-Based Copy Protection for Temporal Media During Dissemination and Playback. 362-377 - Grace C.-W. Ting:

Ambiguity Attacks on the Ganic-Eskicioglu Robust DWT-SVD Image Watermarking Scheme. 378-388
Public Key Cryptography
- Joseph K. Liu, Patrick P. Tsang, Duncan S. Wong, Robert W. Zhu:

Universal Custodian-Hiding Verifiable Encryption for Discrete Logarithms. 389-409 - Qianhong Wu, Fangguo Zhang, Willy Susilo

, Yi Mu:
An Efficient Static Blind Ring Signature Scheme. 410-423 - Sanjit Chatterjee, Palash Sarkar:

Trading Time for Space: Towards an Efficient IBE Scheme with Short(er) Public Parameters in the Standard Model. 424-440 - Duc-Liem Vo, Kwangjo Kim:

Yet Another Forward Secure Signature from Bilinear Pairings. 441-455

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














