Search dblp for Publications

export results for "toc:db/conf/icisc/icisc2004.bht:"

 download as .bib file

@proceedings{DBLP:conf/icisc/2004,
  editor       = {Choonsik Park and
                  Seongtaek Chee},
  title        = {Information Security and Cryptology - {ICISC} 2004, 7th International
                  Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3506},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/b137120},
  doi          = {10.1007/B137120},
  isbn         = {3-540-26226-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/2004.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/AnckaertSCB04,
  author       = {Bertrand Anckaert and
                  Bjorn De Sutter and
                  Dominique Chanet and
                  Koen De Bosschere},
  editor       = {Choonsik Park and
                  Seongtaek Chee},
  title        = {Steganography for Executables and Code Transformation Signatures},
  booktitle    = {Information Security and Cryptology - {ICISC} 2004, 7th International
                  Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3506},
  pages        = {425--439},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11496618\_31},
  doi          = {10.1007/11496618\_31},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/AnckaertSCB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/BohliS04,
  author       = {Jens{-}Matthias Bohli and
                  Rainer Steinwandt},
  editor       = {Choonsik Park and
                  Seongtaek Chee},
  title        = {On Subliminal Channels in Deterministic Signature Schemes},
  booktitle    = {Information Security and Cryptology - {ICISC} 2004, 7th International
                  Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3506},
  pages        = {182--194},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11496618\_14},
  doi          = {10.1007/11496618\_14},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/BohliS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/BurbeckN04,
  author       = {Kalle Burbeck and
                  Simin Nadjm{-}Tehrani},
  editor       = {Choonsik Park and
                  Seongtaek Chee},
  title        = {{ADWICE} - Anomaly Detection with Real-Time Incremental Clustering},
  booktitle    = {Information Security and Cryptology - {ICISC} 2004, 7th International
                  Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3506},
  pages        = {407--424},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11496618\_30},
  doi          = {10.1007/11496618\_30},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/BurbeckN04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ChangDFLKL04,
  author       = {Kisik Chang and
                  Robert H. Deng and
                  Feng Bao and
                  Sangjin Lee and
                  HyungJun Kim and
                  Jongin Lim},
  editor       = {Choonsik Park and
                  Seongtaek Chee},
  title        = {On Security Notions for Steganalysis},
  booktitle    = {Information Security and Cryptology - {ICISC} 2004, 7th International
                  Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3506},
  pages        = {440--454},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11496618\_32},
  doi          = {10.1007/11496618\_32},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/ChangDFLKL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ChatterjeeSB04,
  author       = {Sanjit Chatterjee and
                  Palash Sarkar and
                  Rana Barua},
  editor       = {Choonsik Park and
                  Seongtaek Chee},
  title        = {Efficient Computation of Tate Pairing in Projective Coordinate over
                  General Characteristic Fields},
  booktitle    = {Information Security and Cryptology - {ICISC} 2004, 7th International
                  Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3506},
  pages        = {168--181},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11496618\_13},
  doi          = {10.1007/11496618\_13},
  timestamp    = {Tue, 04 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/ChatterjeeSB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ChenF04,
  author       = {Hua Chen and
                  Dengguo Feng},
  editor       = {Choonsik Park and
                  Seongtaek Chee},
  title        = {An Evolutionary Algorithm to Improve the Nonlinearity of Self-inverse
                  S-Boxes},
  booktitle    = {Information Security and Cryptology - {ICISC} 2004, 7th International
                  Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3506},
  pages        = {352--361},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11496618\_26},
  doi          = {10.1007/11496618\_26},
  timestamp    = {Fri, 04 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/ChenF04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ChenHMFSDLM04,
  author       = {Kevin Chen and
                  Matthew Henricksen and
                  William Millan and
                  Joanne Fuller and
                  Leonie Ruth Simpson and
                  Ed Dawson and
                  Hoon{-}Jae Lee and
                  Sang{-}Jae Moon},
  editor       = {Choonsik Park and
                  Seongtaek Chee},
  title        = {Dragon: {A} Fast Word Based Stream Cipher},
  booktitle    = {Information Security and Cryptology - {ICISC} 2004, 7th International
                  Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3506},
  pages        = {33--50},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11496618\_5},
  doi          = {10.1007/11496618\_5},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/ChenHMFSDLM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ChoSKLSL04,
  author       = {Hong{-}Su Cho and
                  Soo Hak Sung and
                  Daesung Kwon and
                  Jung{-}Keun Lee and
                  Jung Hwan Song and
                  Jongin Lim},
  editor       = {Choonsik Park and
                  Seongtaek Chee},
  title        = {New Method for Bounding the Maximum Differential Probability for SPNs
                  and {ARIA}},
  booktitle    = {Information Security and Cryptology - {ICISC} 2004, 7th International
                  Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3506},
  pages        = {21--32},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11496618\_4},
  doi          = {10.1007/11496618\_4},
  timestamp    = {Fri, 18 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/ChoSKLSL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ChowHY04,
  author       = {Sherman S. M. Chow and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  editor       = {Choonsik Park and
                  Seongtaek Chee},
  title        = {Identity Based Threshold Ring Signature},
  booktitle    = {Information Security and Cryptology - {ICISC} 2004, 7th International
                  Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3506},
  pages        = {218--232},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11496618\_17},
  doi          = {10.1007/11496618\_17},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/ChowHY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Courtois04,
  author       = {Nicolas T. Courtois},
  editor       = {Choonsik Park and
                  Seongtaek Chee},
  title        = {Algebraic Attacks on Combiners with Memory and Several Outputs},
  booktitle    = {Information Security and Cryptology - {ICISC} 2004, 7th International
                  Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3506},
  pages        = {3--20},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11496618\_3},
  doi          = {10.1007/11496618\_3},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/Courtois04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/GoethalsLLM04,
  author       = {Bart Goethals and
                  Sven Laur and
                  Helger Lipmaa and
                  Taneli Mielik{\"{a}}inen},
  editor       = {Choonsik Park and
                  Seongtaek Chee},
  title        = {On Private Scalar Product Computation for Privacy-Preserving Data
                  Mining},
  booktitle    = {Information Security and Cryptology - {ICISC} 2004, 7th International
                  Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3506},
  pages        = {104--120},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11496618\_9},
  doi          = {10.1007/11496618\_9},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/GoethalsLLM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/GogolewskiKL04,
  author       = {Marcin Gogolewski and
                  Miroslaw Kutylowski and
                  Tomasz Luczak},
  editor       = {Choonsik Park and
                  Seongtaek Chee},
  title        = {Mobile Mixing},
  booktitle    = {Information Security and Cryptology - {ICISC} 2004, 7th International
                  Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3506},
  pages        = {380--393},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11496618\_28},
  doi          = {10.1007/11496618\_28},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/GogolewskiKL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/HanRMKC04,
  author       = {Youngchan Han and
                  Choonwoo Ryu and
                  Jihyun Moon and
                  Hakil Kim and
                  H. Choi},
  editor       = {Choonsik Park and
                  Seongtaek Chee},
  title        = {A Study on Evaluating the Uniqueness of Fingerprints Using Statistical
                  Analysis},
  booktitle    = {Information Security and Cryptology - {ICISC} 2004, 7th International
                  Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3506},
  pages        = {467--477},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11496618\_34},
  doi          = {10.1007/11496618\_34},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/HanRMKC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Hirose04,
  author       = {Shoichi Hirose},
  editor       = {Choonsik Park and
                  Seongtaek Chee},
  title        = {Provably Secure Double-Block-Length Hash Functions in a Black-Box
                  Model},
  booktitle    = {Information Security and Cryptology - {ICISC} 2004, 7th International
                  Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3506},
  pages        = {330--342},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11496618\_24},
  doi          = {10.1007/11496618\_24},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/Hirose04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KatagiAKT04,
  author       = {Masanobu Katagi and
                  Toru Akishita and
                  Izuru Kitamura and
                  Tsuyoshi Takagi},
  editor       = {Choonsik Park and
                  Seongtaek Chee},
  title        = {Some Improved Algorithms for Hyperelliptic Curve Cryptosystems Using
                  Degenerate Divisors},
  booktitle    = {Information Security and Cryptology - {ICISC} 2004, 7th International
                  Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3506},
  pages        = {296--312},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11496618\_22},
  doi          = {10.1007/11496618\_22},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/KatagiAKT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KimW04,
  author       = {Seungjoo Kim and
                  Dongho Won},
  editor       = {Choonsik Park and
                  Seongtaek Chee},
  title        = {Threshold Entrusted Undeniable Signature},
  booktitle    = {Information Security and Cryptology - {ICISC} 2004, 7th International
                  Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3506},
  pages        = {195--203},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11496618\_15},
  doi          = {10.1007/11496618\_15},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/KimW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KonstantinouKSZ04,
  author       = {Elisavet Konstantinou and
                  Aristides Kontogeorgis and
                  Yannis C. Stamatiou and
                  Christos D. Zaroliagis},
  editor       = {Choonsik Park and
                  Seongtaek Chee},
  title        = {Generating Prime Order Elliptic Curves: Difficulties and Efficiency
                  Considerations},
  booktitle    = {Information Security and Cryptology - {ICISC} 2004, 7th International
                  Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3506},
  pages        = {261--278},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11496618\_20},
  doi          = {10.1007/11496618\_20},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/KonstantinouKSZ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/LeeKLSLH04,
  author       = {Taekeon Lee and
                  Jongsung Kim and
                  Changhoon Lee and
                  Jaechul Sung and
                  Sangjin Lee and
                  Dowon Hong},
  editor       = {Choonsik Park and
                  Seongtaek Chee},
  title        = {Padding Oracle Attacks on Multiple Modes of Operation},
  booktitle    = {Information Security and Cryptology - {ICISC} 2004, 7th International
                  Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3506},
  pages        = {343--351},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11496618\_25},
  doi          = {10.1007/11496618\_25},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/LeeKLSLH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/LeeKPSJ04,
  author       = {Minsoo Lee and
                  Jintaek Kim and
                  Sehyun Park and
                  Ohyoung Song and
                  Sungik Jun},
  editor       = {Choonsik Park and
                  Seongtaek Chee},
  title        = {A Location-Aware Secure Interworking Architecture Between 3GPP and
                  {WLAN} Systems},
  booktitle    = {Information Security and Cryptology - {ICISC} 2004, 7th International
                  Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3506},
  pages        = {394--406},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11496618\_29},
  doi          = {10.1007/11496618\_29},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/LeeKPSJ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/LeeSHL04,
  author       = {Wonil Lee and
                  Kouichi Sakurai and
                  Seokhie Hong and
                  Sangjin Lee},
  editor       = {Choonsik Park and
                  Seongtaek Chee},
  title        = {On the Pseudorandomness of a Modification of {KASUMI} Type Permutations},
  booktitle    = {Information Security and Cryptology - {ICISC} 2004, 7th International
                  Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3506},
  pages        = {313--329},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11496618\_23},
  doi          = {10.1007/11496618\_23},
  timestamp    = {Sat, 26 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/LeeSHL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/LiB04,
  author       = {Chao Li and
                  Armando Barreto},
  editor       = {Choonsik Park and
                  Seongtaek Chee},
  title        = {Profile-Based 3D Face Registration and Recognition},
  booktitle    = {Information Security and Cryptology - {ICISC} 2004, 7th International
                  Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3506},
  pages        = {478--488},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11496618\_35},
  doi          = {10.1007/11496618\_35},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/LiB04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/LiuW04,
  author       = {Joseph K. Liu and
                  Duncan S. Wong},
  editor       = {Choonsik Park and
                  Seongtaek Chee},
  title        = {On the Security Models of (Threshold) Ring Signature Schemes},
  booktitle    = {Information Security and Cryptology - {ICISC} 2004, 7th International
                  Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3506},
  pages        = {204--217},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11496618\_16},
  doi          = {10.1007/11496618\_16},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/LiuW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/LiuWDS04,
  author       = {Siyuan Liu and
                  Shuhong Wang and
                  Robert H. Deng and
                  Weizhong Shao},
  editor       = {Choonsik Park and
                  Seongtaek Chee},
  title        = {A Block Oriented Fingerprinting Scheme in Relational Database},
  booktitle    = {Information Security and Cryptology - {ICISC} 2004, 7th International
                  Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3506},
  pages        = {455--466},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11496618\_33},
  doi          = {10.1007/11496618\_33},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/LiuWDS04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Moller04,
  author       = {Bodo M{\"{o}}ller},
  editor       = {Choonsik Park and
                  Seongtaek Chee},
  title        = {Fractional Windows Revisited: Improved Signed-Digit Representations
                  for Efficient Exponentiation},
  booktitle    = {Information Security and Cryptology - {ICISC} 2004, 7th International
                  Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3506},
  pages        = {137--153},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11496618\_11},
  doi          = {10.1007/11496618\_11},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/Moller04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/NogamiM04,
  author       = {Yasuyuki Nogami and
                  Yoshitaka Morikawa},
  editor       = {Choonsik Park and
                  Seongtaek Chee},
  title        = {A Method for Distinguishing the Two Candidate Elliptic Curves in {CM}
                  Method},
  booktitle    = {Information Security and Cryptology - {ICISC} 2004, 7th International
                  Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3506},
  pages        = {249--260},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11496618\_19},
  doi          = {10.1007/11496618\_19},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/NogamiM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/PengBDL04,
  author       = {Kun Peng and
                  Colin Boyd and
                  Ed Dawson and
                  Byoungcheon Lee},
  editor       = {Choonsik Park and
                  Seongtaek Chee},
  title        = {An Efficient and Verifiable Solution to the Millionaire Problem},
  booktitle    = {Information Security and Cryptology - {ICISC} 2004, 7th International
                  Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3506},
  pages        = {51--66},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11496618\_6},
  doi          = {10.1007/11496618\_6},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/PengBDL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Reiter04,
  author       = {Michael K. Reiter},
  editor       = {Choonsik Park and
                  Seongtaek Chee},
  title        = {Security by, and for, Converged Mobile Devices},
  booktitle    = {Information Security and Cryptology - {ICISC} 2004, 7th International
                  Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3506},
  pages        = {1},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11496618\_1},
  doi          = {10.1007/11496618\_1},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/Reiter04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/SaxenaTY04,
  author       = {Nitesh Saxena and
                  Gene Tsudik and
                  Jeong Hyun Yi},
  editor       = {Choonsik Park and
                  Seongtaek Chee},
  title        = {Identity-Based Access Control for Ad Hoc Groups},
  booktitle    = {Information Security and Cryptology - {ICISC} 2004, 7th International
                  Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3506},
  pages        = {362--379},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11496618\_27},
  doi          = {10.1007/11496618\_27},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/SaxenaTY04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Stajano04,
  author       = {Frank Stajano},
  editor       = {Choonsik Park and
                  Seongtaek Chee},
  title        = {Security for Ubiquitous Computing},
  booktitle    = {Information Security and Cryptology - {ICISC} 2004, 7th International
                  Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3506},
  pages        = {2},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11496618\_2},
  doi          = {10.1007/11496618\_2},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/Stajano04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Takashima04,
  author       = {Katsuyuki Takashima},
  editor       = {Choonsik Park and
                  Seongtaek Chee},
  title        = {New Families of Hyperelliptic Curves with Efficient Gallant-Lambert-Vanstone
                  Method},
  booktitle    = {Information Security and Cryptology - {ICISC} 2004, 7th International
                  Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3506},
  pages        = {279--295},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11496618\_21},
  doi          = {10.1007/11496618\_21},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/Takashima04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/YangC04,
  author       = {Bo{-}Yin Yang and
                  Jiun{-}Ming Chen},
  editor       = {Choonsik Park and
                  Seongtaek Chee},
  title        = {All in the {XL} Family: Theory and Practice},
  booktitle    = {Information Security and Cryptology - {ICISC} 2004, 7th International
                  Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3506},
  pages        = {67--86},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11496618\_7},
  doi          = {10.1007/11496618\_7},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/YangC04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/YenCMH04,
  author       = {Sung{-}Ming Yen and
                  Chien{-}Ning Chen and
                  Sang{-}Jae Moon and
                  JaeCheol Ha},
  editor       = {Choonsik Park and
                  Seongtaek Chee},
  title        = {Improvement on Ha-Moon Randomized Exponentiation Algorithm},
  booktitle    = {Information Security and Cryptology - {ICISC} 2004, 7th International
                  Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3506},
  pages        = {154--167},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11496618\_12},
  doi          = {10.1007/11496618\_12},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/YenCMH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/YooJCK04,
  author       = {Eun Sun Yoo and
                  Nam{-}Su Jho and
                  Jung Hee Cheon and
                  Myung{-}Hwan Kim},
  editor       = {Choonsik Park and
                  Seongtaek Chee},
  title        = {Efficient Broadcast Encryption Using Multiple Interpolation Methods},
  booktitle    = {Information Security and Cryptology - {ICISC} 2004, 7th International
                  Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3506},
  pages        = {87--103},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11496618\_8},
  doi          = {10.1007/11496618\_8},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/YooJCK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/YoonCK04,
  author       = {HyoJin Yoon and
                  Jung Hee Cheon and
                  Yongdae Kim},
  editor       = {Choonsik Park and
                  Seongtaek Chee},
  title        = {Batch Verifications with ID-Based Signatures},
  booktitle    = {Information Security and Cryptology - {ICISC} 2004, 7th International
                  Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3506},
  pages        = {233--248},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11496618\_18},
  doi          = {10.1007/11496618\_18},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/YoonCK04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/YumL04,
  author       = {Dae Hyun Yum and
                  Pil Joong Lee},
  editor       = {Choonsik Park and
                  Seongtaek Chee},
  title        = {Separable Implicit Certificate Revocation},
  booktitle    = {Information Security and Cryptology - {ICISC} 2004, 7th International
                  Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3506},
  pages        = {121--136},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11496618\_10},
  doi          = {10.1007/11496618\_10},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/YumL04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics