Search dblp for Publications

export results for "toc:db/conf/icisc/icisc2007.bht:"

 download as .bib file

@inproceedings{DBLP:conf/icisc/AlomairLP07,
  author       = {Basel Alomair and
                  Loukas Lazos and
                  Radha Poovendran},
  editor       = {Kil{-}Hyun Nam and
                  Gwangsoo Rhee},
  title        = {Passive Attacks on a Class of Authentication Protocols for {RFID}},
  booktitle    = {Information Security and Cryptology - {ICISC} 2007, 10th International
                  Conference, Seoul, Korea, November 29-30, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4817},
  pages        = {102--115},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76788-6\_9},
  doi          = {10.1007/978-3-540-76788-6\_9},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/AlomairLP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/AndoKS07,
  author       = {Ruo Ando and
                  Youki Kadobayashi and
                  Yoichi Shinoda},
  editor       = {Kil{-}Hyun Nam and
                  Gwangsoo Rhee},
  title        = {Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized
                  {VMM} Using Split Kernel Module},
  booktitle    = {Information Security and Cryptology - {ICISC} 2007, 10th International
                  Conference, Seoul, Korea, November 29-30, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4817},
  pages        = {131--143},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76788-6\_11},
  doi          = {10.1007/978-3-540-76788-6\_11},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/AndoKS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/AumassonM07,
  author       = {Jean{-}Philippe Aumasson and
                  Willi Meier},
  editor       = {Kil{-}Hyun Nam and
                  Gwangsoo Rhee},
  title        = {Analysis of Multivariate Hash Functions},
  booktitle    = {Information Security and Cryptology - {ICISC} 2007, 10th International
                  Conference, Seoul, Korea, November 29-30, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4817},
  pages        = {309--323},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76788-6\_25},
  doi          = {10.1007/978-3-540-76788-6\_25},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/AumassonM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/CollardSQ07,
  author       = {Baudoin Collard and
                  Fran{\c{c}}ois{-}Xavier Standaert and
                  Jean{-}Jacques Quisquater},
  editor       = {Kil{-}Hyun Nam and
                  Gwangsoo Rhee},
  title        = {Improving the Time Complexity of Matsui's Linear Cryptanalysis},
  booktitle    = {Information Security and Cryptology - {ICISC} 2007, 10th International
                  Conference, Seoul, Korea, November 29-30, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4817},
  pages        = {77--88},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76788-6\_7},
  doi          = {10.1007/978-3-540-76788-6\_7},
  timestamp    = {Sat, 24 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/CollardSQ07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ComutaKT07,
  author       = {Aya Comuta and
                  Mitsuru Kawazoe and
                  Tetsuya Takahashi},
  editor       = {Kil{-}Hyun Nam and
                  Gwangsoo Rhee},
  title        = {Pairing-Friendly Elliptic Curves with Small Security Loss by Cheon's
                  Algorithm},
  booktitle    = {Information Security and Cryptology - {ICISC} 2007, 10th International
                  Conference, Seoul, Korea, November 29-30, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4817},
  pages        = {297--308},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76788-6\_24},
  doi          = {10.1007/978-3-540-76788-6\_24},
  timestamp    = {Tue, 12 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/ComutaKT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/FernandezNSD07,
  author       = {Marcel Fernandez and
                  Josep Cotrina Navau and
                  Miguel Soriano and
                  Neus Domingo},
  editor       = {Kil{-}Hyun Nam and
                  Gwangsoo Rhee},
  title        = {A Note About the Traceability Properties of Linear Codes},
  booktitle    = {Information Security and Cryptology - {ICISC} 2007, 10th International
                  Conference, Seoul, Korea, November 29-30, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4817},
  pages        = {251--258},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76788-6\_20},
  doi          = {10.1007/978-3-540-76788-6\_20},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/FernandezNSD07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/GeiselmannS07,
  author       = {Willi Geiselmann and
                  Rainer Steinwandt},
  editor       = {Kil{-}Hyun Nam and
                  Gwangsoo Rhee},
  title        = {Cryptanalysis of a Hash Function Proposed at {ICISC} 2006},
  booktitle    = {Information Security and Cryptology - {ICISC} 2007, 10th International
                  Conference, Seoul, Korea, November 29-30, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4817},
  pages        = {1--10},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76788-6\_1},
  doi          = {10.1007/978-3-540-76788-6\_1},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/GeiselmannS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/HuLL07,
  author       = {Jinwei Hu and
                  Ruixuan Li and
                  Zhengding Lu},
  editor       = {Kil{-}Hyun Nam and
                  Gwangsoo Rhee},
  title        = {Establishing RBAC-Based Secure Interoperability in Decentralized Multi-domain
                  Environments},
  booktitle    = {Information Security and Cryptology - {ICISC} 2007, 10th International
                  Conference, Seoul, Korea, November 29-30, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4817},
  pages        = {49--63},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76788-6\_5},
  doi          = {10.1007/978-3-540-76788-6\_5},
  timestamp    = {Wed, 28 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/HuLL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/JiangPP07,
  author       = {Li Jiang and
                  Lingdi Ping and
                  Xuezeng Pan},
  editor       = {Kil{-}Hyun Nam and
                  Gwangsoo Rhee},
  title        = {Handling Dynamic Information Release},
  booktitle    = {Information Security and Cryptology - {ICISC} 2007, 10th International
                  Conference, Seoul, Korea, November 29-30, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4817},
  pages        = {64--76},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76788-6\_6},
  doi          = {10.1007/978-3-540-76788-6\_6},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/JiangPP07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/JinKE07,
  author       = {Changlong Jin and
                  Hakil Kim and
                  Stephen J. Elliott},
  editor       = {Kil{-}Hyun Nam and
                  Gwangsoo Rhee},
  title        = {Liveness Detection of Fingerprint Based on Band-Selective Fourier
                  Spectrum},
  booktitle    = {Information Security and Cryptology - {ICISC} 2007, 10th International
                  Conference, Seoul, Korea, November 29-30, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4817},
  pages        = {168--179},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76788-6\_14},
  doi          = {10.1007/978-3-540-76788-6\_14},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/JinKE07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KimKK07,
  author       = {Jangseong Kim and
                  Zeen Kim and
                  Kwangjo Kim},
  editor       = {Kil{-}Hyun Nam and
                  Gwangsoo Rhee},
  title        = {A Lightweight Privacy Preserving Authentication and Access Control
                  Scheme for Ubiquitous Computing Environment},
  booktitle    = {Information Security and Cryptology - {ICISC} 2007, 10th International
                  Conference, Seoul, Korea, November 29-30, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4817},
  pages        = {37--48},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76788-6\_4},
  doi          = {10.1007/978-3-540-76788-6\_4},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/KimKK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KimSQL07,
  author       = {Chong Hee Kim and
                  Jong Hoon Shin and
                  Jean{-}Jacques Quisquater and
                  Pil Joong Lee},
  editor       = {Kil{-}Hyun Nam and
                  Gwangsoo Rhee},
  title        = {Safe-Error Attack on {SPA-FA} Resistant Exponentiations Using a {HW}
                  Modular Multiplier},
  booktitle    = {Information Security and Cryptology - {ICISC} 2007, 10th International
                  Conference, Seoul, Korea, November 29-30, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4817},
  pages        = {273--281},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76788-6\_22},
  doi          = {10.1007/978-3-540-76788-6\_22},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/KimSQL07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/LoeK07,
  author       = {Chuan{-}Wen Loe and
                  Khoongming Khoo},
  editor       = {Kil{-}Hyun Nam and
                  Gwangsoo Rhee},
  title        = {Side Channel Attacks on Irregularly Decimated Generators},
  booktitle    = {Information Security and Cryptology - {ICISC} 2007, 10th International
                  Conference, Seoul, Korea, November 29-30, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4817},
  pages        = {116--130},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76788-6\_10},
  doi          = {10.1007/978-3-540-76788-6\_10},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/LoeK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Lu07,
  author       = {Jiqiang Lu},
  editor       = {Kil{-}Hyun Nam and
                  Gwangsoo Rhee},
  title        = {Cryptanalysis of Reduced Versions of the {HIGHT} Block Cipher from
                  {CHES} 2006},
  booktitle    = {Information Security and Cryptology - {ICISC} 2007, 10th International
                  Conference, Seoul, Korea, November 29-30, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4817},
  pages        = {11--26},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76788-6\_2},
  doi          = {10.1007/978-3-540-76788-6\_2},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/Lu07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Maximov07,
  author       = {Alexander Maximov},
  editor       = {Kil{-}Hyun Nam and
                  Gwangsoo Rhee},
  title        = {On Large Distributions for Linear Cryptanalysis},
  booktitle    = {Information Security and Cryptology - {ICISC} 2007, 10th International
                  Conference, Seoul, Korea, November 29-30, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4817},
  pages        = {89--101},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76788-6\_8},
  doi          = {10.1007/978-3-540-76788-6\_8},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/Maximov07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/MendelR07,
  author       = {Florian Mendel and
                  Vincent Rijmen},
  editor       = {Kil{-}Hyun Nam and
                  Gwangsoo Rhee},
  title        = {Colliding Message Pair for 53-Step {HAS-160}},
  booktitle    = {Information Security and Cryptology - {ICISC} 2007, 10th International
                  Conference, Seoul, Korea, November 29-30, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4817},
  pages        = {324--334},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76788-6\_26},
  doi          = {10.1007/978-3-540-76788-6\_26},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/MendelR07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/MendelR07a,
  author       = {Florian Mendel and
                  Vincent Rijmen},
  editor       = {Kil{-}Hyun Nam and
                  Gwangsoo Rhee},
  title        = {Weaknesses in the {HAS-V} Compression Function},
  booktitle    = {Information Security and Cryptology - {ICISC} 2007, 10th International
                  Conference, Seoul, Korea, November 29-30, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4817},
  pages        = {335--345},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76788-6\_27},
  doi          = {10.1007/978-3-540-76788-6\_27},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/MendelR07a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Miyaji07,
  author       = {Atsuko Miyaji},
  editor       = {Kil{-}Hyun Nam and
                  Gwangsoo Rhee},
  title        = {Generalized MMM-Algorithm Secure Against SPA, DPA, and {RPA}},
  booktitle    = {Information Security and Cryptology - {ICISC} 2007, 10th International
                  Conference, Seoul, Korea, November 29-30, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4817},
  pages        = {282--296},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76788-6\_23},
  doi          = {10.1007/978-3-540-76788-6\_23},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/Miyaji07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/MolinaCC07,
  author       = {Jesus Molina and
                  Xavier Chorin and
                  Michel Cukier},
  editor       = {Kil{-}Hyun Nam and
                  Gwangsoo Rhee},
  title        = {Filesystem Activity Following a {SSH} Compromise: An Empirical Study
                  of File Sequences},
  booktitle    = {Information Security and Cryptology - {ICISC} 2007, 10th International
                  Conference, Seoul, Korea, November 29-30, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4817},
  pages        = {144--155},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76788-6\_12},
  doi          = {10.1007/978-3-540-76788-6\_12},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/MolinaCC07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/MoradiSS07,
  author       = {Amir Moradi and
                  Mahmoud Salmasizadeh and
                  Mohammad T. Manzuri Shalmani},
  editor       = {Kil{-}Hyun Nam and
                  Gwangsoo Rhee},
  title        = {Power Analysis Attacks on {MDPL} and {DRSL} Implementations},
  booktitle    = {Information Security and Cryptology - {ICISC} 2007, 10th International
                  Conference, Seoul, Korea, November 29-30, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4817},
  pages        = {259--272},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76788-6\_21},
  doi          = {10.1007/978-3-540-76788-6\_21},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/MoradiSS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/PhanV07,
  author       = {Raphael C.{-}W. Phan and
                  Serge Vaudenay},
  editor       = {Kil{-}Hyun Nam and
                  Gwangsoo Rhee},
  title        = {Security-Preserving Asymmetric Protocol Encapsulation},
  booktitle    = {Information Security and Cryptology - {ICISC} 2007, 10th International
                  Conference, Seoul, Korea, November 29-30, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4817},
  pages        = {346--366},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76788-6\_28},
  doi          = {10.1007/978-3-540-76788-6\_28},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/PhanV07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/SanadhyaS07,
  author       = {Somitra Kumar Sanadhya and
                  Palash Sarkar},
  editor       = {Kil{-}Hyun Nam and
                  Gwangsoo Rhee},
  title        = {New Local Collisions for the {SHA-2} Hash Family},
  booktitle    = {Information Security and Cryptology - {ICISC} 2007, 10th International
                  Conference, Seoul, Korea, November 29-30, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4817},
  pages        = {193--205},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76788-6\_16},
  doi          = {10.1007/978-3-540-76788-6\_16},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/SanadhyaS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Sarkar07,
  author       = {Palash Sarkar},
  editor       = {Kil{-}Hyun Nam and
                  Gwangsoo Rhee},
  title        = {Improving Upon the {TET} Mode of Operation},
  booktitle    = {Information Security and Cryptology - {ICISC} 2007, 10th International
                  Conference, Seoul, Korea, November 29-30, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4817},
  pages        = {180--192},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76788-6\_15},
  doi          = {10.1007/978-3-540-76788-6\_15},
  timestamp    = {Tue, 04 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/Sarkar07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Scemama07,
  author       = {Antoine Scemama},
  editor       = {Kil{-}Hyun Nam and
                  Gwangsoo Rhee},
  title        = {A Cryptanalysis of the Double-Round Quadratic Cryptosystem},
  booktitle    = {Information Security and Cryptology - {ICISC} 2007, 10th International
                  Conference, Seoul, Korea, November 29-30, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4817},
  pages        = {27--36},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76788-6\_3},
  doi          = {10.1007/978-3-540-76788-6\_3},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/Scemama07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/WenW07,
  author       = {Yan Wen and
                  Huaimin Wang},
  editor       = {Kil{-}Hyun Nam and
                  Gwangsoo Rhee},
  title        = {A Secure Virtual Execution Environment for Untrusted Code},
  booktitle    = {Information Security and Cryptology - {ICISC} 2007, 10th International
                  Conference, Seoul, Korea, November 29-30, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4817},
  pages        = {156--167},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76788-6\_13},
  doi          = {10.1007/978-3-540-76788-6\_13},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/WenW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/YuW07,
  author       = {Hongbo Yu and
                  Xiaoyun Wang},
  editor       = {Kil{-}Hyun Nam and
                  Gwangsoo Rhee},
  title        = {Multi-collision Attack on the Compression Functions of {MD4} and 3-Pass
                  {HAVAL}},
  booktitle    = {Information Security and Cryptology - {ICISC} 2007, 10th International
                  Conference, Seoul, Korea, November 29-30, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4817},
  pages        = {206--226},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76788-6\_17},
  doi          = {10.1007/978-3-540-76788-6\_17},
  timestamp    = {Mon, 25 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/YuW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ZhangW07,
  author       = {Haina Zhang and
                  Xiaoyun Wang},
  editor       = {Kil{-}Hyun Nam and
                  Gwangsoo Rhee},
  title        = {Differential Cryptanalysis of T-Function Based Stream Cipher {TSC-4}},
  booktitle    = {Information Security and Cryptology - {ICISC} 2007, 10th International
                  Conference, Seoul, Korea, November 29-30, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4817},
  pages        = {227--238},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76788-6\_18},
  doi          = {10.1007/978-3-540-76788-6\_18},
  timestamp    = {Mon, 25 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/ZhangW07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ZhangWF07,
  author       = {Wentao Zhang and
                  Wenling Wu and
                  Dengguo Feng},
  editor       = {Kil{-}Hyun Nam and
                  Gwangsoo Rhee},
  title        = {New Results on Impossible Differential Cryptanalysis of Reduced {AES}},
  booktitle    = {Information Security and Cryptology - {ICISC} 2007, 10th International
                  Conference, Seoul, Korea, November 29-30, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4817},
  pages        = {239--250},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76788-6\_19},
  doi          = {10.1007/978-3-540-76788-6\_19},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/ZhangWF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icisc/2007,
  editor       = {Kil{-}Hyun Nam and
                  Gwangsoo Rhee},
  title        = {Information Security and Cryptology - {ICISC} 2007, 10th International
                  Conference, Seoul, Korea, November 29-30, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4817},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76788-6},
  doi          = {10.1007/978-3-540-76788-6},
  isbn         = {978-3-540-76787-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}