default search action
Search dblp for Publications
export results for "toc:db/conf/icisc/icisc2007.bht:"
@inproceedings{DBLP:conf/icisc/AlomairLP07, author = {Basel Alomair and Loukas Lazos and Radha Poovendran}, editor = {Kil{-}Hyun Nam and Gwangsoo Rhee}, title = {Passive Attacks on a Class of Authentication Protocols for {RFID}}, booktitle = {Information Security and Cryptology - {ICISC} 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4817}, pages = {102--115}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76788-6\_9}, doi = {10.1007/978-3-540-76788-6\_9}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/AlomairLP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/AndoKS07, author = {Ruo Ando and Youki Kadobayashi and Yoichi Shinoda}, editor = {Kil{-}Hyun Nam and Gwangsoo Rhee}, title = {Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized {VMM} Using Split Kernel Module}, booktitle = {Information Security and Cryptology - {ICISC} 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4817}, pages = {131--143}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76788-6\_11}, doi = {10.1007/978-3-540-76788-6\_11}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/AndoKS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/AumassonM07, author = {Jean{-}Philippe Aumasson and Willi Meier}, editor = {Kil{-}Hyun Nam and Gwangsoo Rhee}, title = {Analysis of Multivariate Hash Functions}, booktitle = {Information Security and Cryptology - {ICISC} 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4817}, pages = {309--323}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76788-6\_25}, doi = {10.1007/978-3-540-76788-6\_25}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/AumassonM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/CollardSQ07, author = {Baudoin Collard and Fran{\c{c}}ois{-}Xavier Standaert and Jean{-}Jacques Quisquater}, editor = {Kil{-}Hyun Nam and Gwangsoo Rhee}, title = {Improving the Time Complexity of Matsui's Linear Cryptanalysis}, booktitle = {Information Security and Cryptology - {ICISC} 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4817}, pages = {77--88}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76788-6\_7}, doi = {10.1007/978-3-540-76788-6\_7}, timestamp = {Sat, 24 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/CollardSQ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ComutaKT07, author = {Aya Comuta and Mitsuru Kawazoe and Tetsuya Takahashi}, editor = {Kil{-}Hyun Nam and Gwangsoo Rhee}, title = {Pairing-Friendly Elliptic Curves with Small Security Loss by Cheon's Algorithm}, booktitle = {Information Security and Cryptology - {ICISC} 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4817}, pages = {297--308}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76788-6\_24}, doi = {10.1007/978-3-540-76788-6\_24}, timestamp = {Tue, 12 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/ComutaKT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/FernandezNSD07, author = {Marcel Fernandez and Josep Cotrina Navau and Miguel Soriano and Neus Domingo}, editor = {Kil{-}Hyun Nam and Gwangsoo Rhee}, title = {A Note About the Traceability Properties of Linear Codes}, booktitle = {Information Security and Cryptology - {ICISC} 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4817}, pages = {251--258}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76788-6\_20}, doi = {10.1007/978-3-540-76788-6\_20}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/FernandezNSD07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/GeiselmannS07, author = {Willi Geiselmann and Rainer Steinwandt}, editor = {Kil{-}Hyun Nam and Gwangsoo Rhee}, title = {Cryptanalysis of a Hash Function Proposed at {ICISC} 2006}, booktitle = {Information Security and Cryptology - {ICISC} 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4817}, pages = {1--10}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76788-6\_1}, doi = {10.1007/978-3-540-76788-6\_1}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/GeiselmannS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/HuLL07, author = {Jinwei Hu and Ruixuan Li and Zhengding Lu}, editor = {Kil{-}Hyun Nam and Gwangsoo Rhee}, title = {Establishing RBAC-Based Secure Interoperability in Decentralized Multi-domain Environments}, booktitle = {Information Security and Cryptology - {ICISC} 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4817}, pages = {49--63}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76788-6\_5}, doi = {10.1007/978-3-540-76788-6\_5}, timestamp = {Wed, 28 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/HuLL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/JiangPP07, author = {Li Jiang and Lingdi Ping and Xuezeng Pan}, editor = {Kil{-}Hyun Nam and Gwangsoo Rhee}, title = {Handling Dynamic Information Release}, booktitle = {Information Security and Cryptology - {ICISC} 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4817}, pages = {64--76}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76788-6\_6}, doi = {10.1007/978-3-540-76788-6\_6}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/JiangPP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/JinKE07, author = {Changlong Jin and Hakil Kim and Stephen J. Elliott}, editor = {Kil{-}Hyun Nam and Gwangsoo Rhee}, title = {Liveness Detection of Fingerprint Based on Band-Selective Fourier Spectrum}, booktitle = {Information Security and Cryptology - {ICISC} 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4817}, pages = {168--179}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76788-6\_14}, doi = {10.1007/978-3-540-76788-6\_14}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/JinKE07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/KimKK07, author = {Jangseong Kim and Zeen Kim and Kwangjo Kim}, editor = {Kil{-}Hyun Nam and Gwangsoo Rhee}, title = {A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment}, booktitle = {Information Security and Cryptology - {ICISC} 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4817}, pages = {37--48}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76788-6\_4}, doi = {10.1007/978-3-540-76788-6\_4}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/KimKK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/KimSQL07, author = {Chong Hee Kim and Jong Hoon Shin and Jean{-}Jacques Quisquater and Pil Joong Lee}, editor = {Kil{-}Hyun Nam and Gwangsoo Rhee}, title = {Safe-Error Attack on {SPA-FA} Resistant Exponentiations Using a {HW} Modular Multiplier}, booktitle = {Information Security and Cryptology - {ICISC} 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4817}, pages = {273--281}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76788-6\_22}, doi = {10.1007/978-3-540-76788-6\_22}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/KimSQL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/LoeK07, author = {Chuan{-}Wen Loe and Khoongming Khoo}, editor = {Kil{-}Hyun Nam and Gwangsoo Rhee}, title = {Side Channel Attacks on Irregularly Decimated Generators}, booktitle = {Information Security and Cryptology - {ICISC} 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4817}, pages = {116--130}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76788-6\_10}, doi = {10.1007/978-3-540-76788-6\_10}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/LoeK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/Lu07, author = {Jiqiang Lu}, editor = {Kil{-}Hyun Nam and Gwangsoo Rhee}, title = {Cryptanalysis of Reduced Versions of the {HIGHT} Block Cipher from {CHES} 2006}, booktitle = {Information Security and Cryptology - {ICISC} 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4817}, pages = {11--26}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76788-6\_2}, doi = {10.1007/978-3-540-76788-6\_2}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/Lu07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/Maximov07, author = {Alexander Maximov}, editor = {Kil{-}Hyun Nam and Gwangsoo Rhee}, title = {On Large Distributions for Linear Cryptanalysis}, booktitle = {Information Security and Cryptology - {ICISC} 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4817}, pages = {89--101}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76788-6\_8}, doi = {10.1007/978-3-540-76788-6\_8}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/Maximov07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/MendelR07, author = {Florian Mendel and Vincent Rijmen}, editor = {Kil{-}Hyun Nam and Gwangsoo Rhee}, title = {Colliding Message Pair for 53-Step {HAS-160}}, booktitle = {Information Security and Cryptology - {ICISC} 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4817}, pages = {324--334}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76788-6\_26}, doi = {10.1007/978-3-540-76788-6\_26}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/MendelR07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/MendelR07a, author = {Florian Mendel and Vincent Rijmen}, editor = {Kil{-}Hyun Nam and Gwangsoo Rhee}, title = {Weaknesses in the {HAS-V} Compression Function}, booktitle = {Information Security and Cryptology - {ICISC} 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4817}, pages = {335--345}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76788-6\_27}, doi = {10.1007/978-3-540-76788-6\_27}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/MendelR07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/Miyaji07, author = {Atsuko Miyaji}, editor = {Kil{-}Hyun Nam and Gwangsoo Rhee}, title = {Generalized MMM-Algorithm Secure Against SPA, DPA, and {RPA}}, booktitle = {Information Security and Cryptology - {ICISC} 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4817}, pages = {282--296}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76788-6\_23}, doi = {10.1007/978-3-540-76788-6\_23}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/Miyaji07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/MolinaCC07, author = {Jesus Molina and Xavier Chorin and Michel Cukier}, editor = {Kil{-}Hyun Nam and Gwangsoo Rhee}, title = {Filesystem Activity Following a {SSH} Compromise: An Empirical Study of File Sequences}, booktitle = {Information Security and Cryptology - {ICISC} 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4817}, pages = {144--155}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76788-6\_12}, doi = {10.1007/978-3-540-76788-6\_12}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/MolinaCC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/MoradiSS07, author = {Amir Moradi and Mahmoud Salmasizadeh and Mohammad T. Manzuri Shalmani}, editor = {Kil{-}Hyun Nam and Gwangsoo Rhee}, title = {Power Analysis Attacks on {MDPL} and {DRSL} Implementations}, booktitle = {Information Security and Cryptology - {ICISC} 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4817}, pages = {259--272}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76788-6\_21}, doi = {10.1007/978-3-540-76788-6\_21}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/MoradiSS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/PhanV07, author = {Raphael C.{-}W. Phan and Serge Vaudenay}, editor = {Kil{-}Hyun Nam and Gwangsoo Rhee}, title = {Security-Preserving Asymmetric Protocol Encapsulation}, booktitle = {Information Security and Cryptology - {ICISC} 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4817}, pages = {346--366}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76788-6\_28}, doi = {10.1007/978-3-540-76788-6\_28}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/PhanV07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/SanadhyaS07, author = {Somitra Kumar Sanadhya and Palash Sarkar}, editor = {Kil{-}Hyun Nam and Gwangsoo Rhee}, title = {New Local Collisions for the {SHA-2} Hash Family}, booktitle = {Information Security and Cryptology - {ICISC} 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4817}, pages = {193--205}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76788-6\_16}, doi = {10.1007/978-3-540-76788-6\_16}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/SanadhyaS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/Sarkar07, author = {Palash Sarkar}, editor = {Kil{-}Hyun Nam and Gwangsoo Rhee}, title = {Improving Upon the {TET} Mode of Operation}, booktitle = {Information Security and Cryptology - {ICISC} 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4817}, pages = {180--192}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76788-6\_15}, doi = {10.1007/978-3-540-76788-6\_15}, timestamp = {Tue, 04 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/Sarkar07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/Scemama07, author = {Antoine Scemama}, editor = {Kil{-}Hyun Nam and Gwangsoo Rhee}, title = {A Cryptanalysis of the Double-Round Quadratic Cryptosystem}, booktitle = {Information Security and Cryptology - {ICISC} 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4817}, pages = {27--36}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76788-6\_3}, doi = {10.1007/978-3-540-76788-6\_3}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/Scemama07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/WenW07, author = {Yan Wen and Huaimin Wang}, editor = {Kil{-}Hyun Nam and Gwangsoo Rhee}, title = {A Secure Virtual Execution Environment for Untrusted Code}, booktitle = {Information Security and Cryptology - {ICISC} 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4817}, pages = {156--167}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76788-6\_13}, doi = {10.1007/978-3-540-76788-6\_13}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/WenW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/YuW07, author = {Hongbo Yu and Xiaoyun Wang}, editor = {Kil{-}Hyun Nam and Gwangsoo Rhee}, title = {Multi-collision Attack on the Compression Functions of {MD4} and 3-Pass {HAVAL}}, booktitle = {Information Security and Cryptology - {ICISC} 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4817}, pages = {206--226}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76788-6\_17}, doi = {10.1007/978-3-540-76788-6\_17}, timestamp = {Mon, 25 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/YuW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ZhangW07, author = {Haina Zhang and Xiaoyun Wang}, editor = {Kil{-}Hyun Nam and Gwangsoo Rhee}, title = {Differential Cryptanalysis of T-Function Based Stream Cipher {TSC-4}}, booktitle = {Information Security and Cryptology - {ICISC} 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4817}, pages = {227--238}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76788-6\_18}, doi = {10.1007/978-3-540-76788-6\_18}, timestamp = {Mon, 25 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/ZhangW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ZhangWF07, author = {Wentao Zhang and Wenling Wu and Dengguo Feng}, editor = {Kil{-}Hyun Nam and Gwangsoo Rhee}, title = {New Results on Impossible Differential Cryptanalysis of Reduced {AES}}, booktitle = {Information Security and Cryptology - {ICISC} 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4817}, pages = {239--250}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76788-6\_19}, doi = {10.1007/978-3-540-76788-6\_19}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/ZhangWF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/icisc/2007, editor = {Kil{-}Hyun Nam and Gwangsoo Rhee}, title = {Information Security and Cryptology - {ICISC} 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4817}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76788-6}, doi = {10.1007/978-3-540-76788-6}, isbn = {978-3-540-76787-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.