Search dblp for Publications

export results for "toc:db/conf/icisc/icisc2005.bht:"

 download as .bib file

@proceedings{DBLP:conf/icisc/2005,
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11734727},
  doi          = {10.1007/11734727},
  isbn         = {3-540-33354-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/2005.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/AdelsbachHS05,
  author       = {Andr{\'{e}} Adelsbach and
                  Ulrich Huber and
                  Ahmad{-}Reza Sadeghi},
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {Property-Based Broadcast Encryption for Multi-level Security Policies},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  pages        = {15--31},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11734727\_4},
  doi          = {10.1007/11734727\_4},
  timestamp    = {Sat, 02 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/AdelsbachHS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/BaeKKPS05,
  author       = {Duhyun Bae and
                  Gwanyeon Kim and
                  Jiho Kim and
                  Sehyun Park and
                  Ohyoung Song},
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {An Efficient Design of {CCMP} for Robust Security Network},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  pages        = {352--361},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11734727\_28},
  doi          = {10.1007/11734727\_28},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/BaeKKPS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Brandt05,
  author       = {Felix Brandt},
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {Efficient Cryptographic Protocol Design Based on Distributed El Gamal
                  Encryption},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  pages        = {32--47},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11734727\_5},
  doi          = {10.1007/11734727\_5},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/Brandt05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ChatterjeeS05,
  author       = {Sanjit Chatterjee and
                  Palash Sarkar},
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {Trading Time for Space: Towards an Efficient {IBE} Scheme with Short(er)
                  Public Parameters in the Standard Model},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  pages        = {424--440},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11734727\_33},
  doi          = {10.1007/11734727\_33},
  timestamp    = {Tue, 04 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/ChatterjeeS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Courtois05,
  author       = {Nicolas T. Courtois},
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {Cryptanalysis of Sfinks},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  pages        = {261--269},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11734727\_22},
  doi          = {10.1007/11734727\_22},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/Courtois05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/CourtoisG05,
  author       = {Nicolas T. Courtois and
                  Louis Goubin},
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {An Algebraic Masking Method to Protect {AES} Against Power Attacks},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  pages        = {199--209},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11734727\_18},
  doi          = {10.1007/11734727\_18},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/CourtoisG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/GoyalJQ05,
  author       = {Vipul Goyal and
                  Abhishek Jain and
                  Jean{-}Jacques Quisquater},
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {Improvements to Mitchell's Remote User Authentication Protocol},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  pages        = {69--80},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11734727\_8},
  doi          = {10.1007/11734727\_8},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/GoyalJQ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/GrimenMM05,
  author       = {Gisle Grimen and
                  Christian M{\"{o}}nch and
                  Roger Midtstraum},
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {Software-Based Copy Protection for Temporal Media During Dissemination
                  and Playback},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  pages        = {362--377},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11734727\_29},
  doi          = {10.1007/11734727\_29},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/GrimenMM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/HurLHY05,
  author       = {Junbeom Hur and
                  Younho Lee and
                  Seong{-}Min Hong and
                  Hyunsoo Yoon},
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {Trust Management for Resilient Wireless Sensor Networks},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  pages        = {56--68},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11734727\_7},
  doi          = {10.1007/11734727\_7},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/HurLHY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/JiangG05,
  author       = {Shaoquan Jiang and
                  Guang Gong},
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {Efficient Authenticators with Application to Key Exchange},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  pages        = {81--91},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11734727\_9},
  doi          = {10.1007/11734727\_9},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/JiangG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KimLICKB05,
  author       = {Young{-}Gab Kim and
                  Taek Lee and
                  Hoh Peter In and
                  Yoon Jung Chung and
                  In{-}Jung Kim and
                  Doo{-}Kwon Baik},
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {A Probabilistic Approach to Estimate the Damage Propagation of Cyber
                  Attacks},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  pages        = {175--185},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11734727\_16},
  doi          = {10.1007/11734727\_16},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/KimLICKB05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KimYPK05,
  author       = {Woong{-}Sik Kim and
                  Weon{-}Hee Yoo and
                  Jang{-}Hyun Park and
                  Bok{-}Ki Kim},
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {An Enhanced Estimation Algorithm for Reconstructing Fingerprint Strip
                  Image},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  pages        = {48--55},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11734727\_6},
  doi          = {10.1007/11734727\_6},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/KimYPK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KwonKP05,
  author       = {Soonhak Kwon and
                  Taekyoung Kwon and
                  Young{-}Ho Park},
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {New Architecture for Multiplication in \emph{GF}(2\({}^{\mbox{\emph{m}}}\))
                  and Comparisons with Normal and Polynomial Basis Multipliers for Elliptic
                  Curve Cryptography},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  pages        = {335--351},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11734727\_27},
  doi          = {10.1007/11734727\_27},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/KwonKP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/LiuTWZ05,
  author       = {Joseph K. Liu and
                  Patrick P. Tsang and
                  Duncan S. Wong and
                  Robert W. Zhu},
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {Universal Custodian-Hiding Verifiable Encryption for Discrete Logarithms},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  pages        = {389--409},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11734727\_31},
  doi          = {10.1007/11734727\_31},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/LiuTWZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Lopez-TrejoRD05,
  author       = {Emmanuel L{\'{o}}pez{-}Trejo and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez and
                  Arturo D{\'{\i}}az{-}P{\'{e}}rez},
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {An {FPGA} Implementation of {CCM} Mode Using {AES}},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  pages        = {322--334},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11734727\_26},
  doi          = {10.1007/11734727\_26},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/Lopez-TrejoRD05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/MauwO05,
  author       = {Sjouke Mauw and
                  Martijn Oostdijk},
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {Foundations of Attack Trees},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  pages        = {186--198},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11734727\_17},
  doi          = {10.1007/11734727\_17},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/MauwO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/MinematsuT05,
  author       = {Kazuhiko Minematsu and
                  Yukiyasu Tsunoo},
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {Hybrid Symmetric Encryption Using Known-Plaintext Attack-Secure Components},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  pages        = {242--260},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11734727\_21},
  doi          = {10.1007/11734727\_21},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/MinematsuT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/MinematsuT05a,
  author       = {Kazuhiko Minematsu and
                  Yukiyasu Tsunoo},
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {Expanding Weak {PRF} with Small Key Size},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  pages        = {284--298},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11734727\_24},
  doi          = {10.1007/11734727\_24},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/MinematsuT05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/MolnarPSW05,
  author       = {David Molnar and
                  Matt Piotrowski and
                  David Schultz and
                  David A. Wagner},
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {The Program Counter Security Model: Automatic Detection and Removal
                  of Control-Flow Side Channel Attacks},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  pages        = {156--168},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11734727\_14},
  doi          = {10.1007/11734727\_14},
  timestamp    = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/MolnarPSW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Naccache05,
  author       = {David Naccache},
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {National Security, Forensics and Mobile Communications},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  pages        = {1},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11734727\_1},
  doi          = {10.1007/11734727\_1},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/Naccache05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/NaitoSKO05,
  author       = {Yusuke Naito and
                  Yu Sasaki and
                  Noboru Kunihiro and
                  Kazuo Ohta},
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {Improved Collision Attack on {MD4} with Probability Almost 1},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  pages        = {129--145},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11734727\_12},
  doi          = {10.1007/11734727\_12},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/NaitoSKO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Patarin05,
  author       = {Jacques Patarin},
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {On Linear Systems of Equations with Distinct Variables and Small Block
                  Size},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  pages        = {299--321},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11734727\_25},
  doi          = {10.1007/11734727\_25},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/Patarin05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/PatarinM05,
  author       = {Jacques Patarin and
                  Audrey Montreuil},
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {Benes and Butterfly Schemes Revisited},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  pages        = {92--116},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11734727\_10},
  doi          = {10.1007/11734727\_10},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/PatarinM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/PieprzykZG05,
  author       = {Josef Pieprzyk and
                  Xian{-}Mo Zhang and
                  Jovan Dj. Golic},
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {Characterisations of Extended Resiliency and Extended Immunity of
                  S-Boxes},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  pages        = {210--228},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11734727\_19},
  doi          = {10.1007/11734727\_19},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/PieprzykZG05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Ting05,
  author       = {Grace C.{-}W. Ting},
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {Ambiguity Attacks on the Ganic-Eskicioglu Robust {DWT-SVD} Image Watermarking
                  Scheme},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  pages        = {378--388},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11734727\_30},
  doi          = {10.1007/11734727\_30},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/Ting05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Tsujii05,
  author       = {Shigeo Tsujii},
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {Information Security as Interdisciplinary Science Based on Ethics},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  pages        = {2},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11734727\_2},
  doi          = {10.1007/11734727\_2},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/Tsujii05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/VoK05,
  author       = {Duc{-}Liem Vo and
                  Kwangjo Kim},
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {Yet Another Forward Secure Signature from Bilinear Pairings},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  pages        = {441--455},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11734727\_34},
  doi          = {10.1007/11734727\_34},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/VoK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/WangJ05,
  author       = {Changda Wang and
                  Shiguang Ju},
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {The Dilemma of Covert Channels Searching},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  pages        = {169--174},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11734727\_15},
  doi          = {10.1007/11734727\_15},
  timestamp    = {Tue, 07 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/WangJ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/WuZF05,
  author       = {Wenling Wu and
                  Wentao Zhang and
                  Dengguo Feng},
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {Integral Cryptanalysis of Reduced {FOX} Block Cipher},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  pages        = {229--241},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11734727\_20},
  doi          = {10.1007/11734727\_20},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/WuZF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/WuZSM05,
  author       = {Qianhong Wu and
                  Fangguo Zhang and
                  Willy Susilo and
                  Yi Mu},
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {An Efficient Static Blind Ring Signature Scheme},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  pages        = {410--423},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11734727\_32},
  doi          = {10.1007/11734727\_32},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/WuZSM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/YenKMH05,
  author       = {Sung{-}Ming Yen and
                  Lee{-}Chun Ko and
                  Sang{-}Jae Moon and
                  JaeCheol Ha},
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {Relative Doubling Attack Against Montgomery Ladder},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  pages        = {117--128},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11734727\_11},
  doi          = {10.1007/11734727\_11},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/YenKMH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/YoshidaMF05,
  author       = {Maki Yoshida and
                  Shigeo Mitsunari and
                  Toru Fujiwara},
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {A Timed-Release Key Management Scheme for Backward Recovery},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  pages        = {3--14},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11734727\_3},
  doi          = {10.1007/11734727\_3},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/YoshidaMF05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/YunSPCHC05,
  author       = {Aaram Yun and
                  Soo Hak Sung and
                  Sangwoo Park and
                  Donghoon Chang and
                  Seokhie Hong and
                  Hong{-}Su Cho},
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {Finding Collision on 45-Step {HAS-160}},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  pages        = {146--155},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11734727\_13},
  doi          = {10.1007/11734727\_13},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/YunSPCHC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ZhangWFW05,
  author       = {Bin Zhang and
                  Hongjun Wu and
                  Dengguo Feng and
                  Hong Wang},
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {Weaknesses of COSvd (2, 128) Stream Cipher},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  pages        = {270--283},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11734727\_23},
  doi          = {10.1007/11734727\_23},
  timestamp    = {Thu, 30 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/ZhangWFW05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics