Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/conf/icisc/icisc2002.bht:"
@proceedings{DBLP:conf/icisc/2002, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36552-4}, doi = {10.1007/3-540-36552-4}, isbn = {3-540-00716-4}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/2002.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/BevanK02, author = {R{\'{e}}gis Bevan and Erik Knudsen}, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {Ways to Enhance Differential Power Analysis}, booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, pages = {327--342}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36552-4\_23}, doi = {10.1007/3-540-36552-4\_23}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/BevanK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ChoiY02, author = {Se Ah Choi and Kyeongcheol Yang}, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {Balanced Shrinking Generators}, booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, pages = {213--225}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36552-4\_15}, doi = {10.1007/3-540-36552-4\_15}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/ChoiY02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/Courtois02, author = {Nicolas T. Courtois}, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {Higher Order Correlation Attacks, {XL} Algorithm and Cryptanalysis of Toyocrypt}, booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, pages = {182--199}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36552-4\_13}, doi = {10.1007/3-540-36552-4\_13}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/Courtois02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/GilMPC02, author = {Youn{-}Hee Gil and Daesung Moon and Sung Bum Pan and Yongwha Chung}, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {Fingerprint Verification System Involving Smart Card}, booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, pages = {510--524}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36552-4\_35}, doi = {10.1007/3-540-36552-4\_35}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/GilMPC02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/IwataK02, author = {Tetsu Iwata and Kaoru Kurosawa}, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {On the Universal Hash Functionsin Luby-Rackoff Cipher}, booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, pages = {226--236}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36552-4\_16}, doi = {10.1007/3-540-36552-4\_16}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/IwataK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/IzuT02, author = {Tetsuya Izu and Tsuyoshi Takagi}, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {Efficient Computations of the Tate Pairingfor the Large {MOV} Degrees}, booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, pages = {283--297}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36552-4\_20}, doi = {10.1007/3-540-36552-4\_20}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/IzuT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/JeongJRLL02, author = {Ik Rae Jeong and Hee Yun Jeong and Hyun Sook Rhee and Dong Hoon Lee and Jong In Lim}, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption}, booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, pages = {16--34}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36552-4\_2}, doi = {10.1007/3-540-36552-4\_2}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/JeongJRLL02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/JinSCH02, author = {Hai Jin and Jianhua Sun and Hao Chen and Zongfen Han}, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {A Risk-Sensitive Intrusion Detection Model}, booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, pages = {107--117}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36552-4\_8}, doi = {10.1007/3-540-36552-4\_8}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/JinSCH02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/JuKLL02, author = {Hak Soo Ju and Hyun{-}Jeong Kim and Dong Hoon Lee and Jong In Lim}, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control}, booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, pages = {421--432}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36552-4\_29}, doi = {10.1007/3-540-36552-4\_29}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/JuKLL02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/KiKLP02, author = {JuHee Ki and Hyun{-}Jeong Kim and Dong Hoon Lee and Chang{-}Seop Park}, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {Efficient Multicast Key Management for Stateless Receivers}, booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, pages = {497--509}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36552-4\_34}, doi = {10.1007/3-540-36552-4\_34}, timestamp = {Tue, 07 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/KiKLP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/Kim02, author = {HyungJong Kim}, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {System Specification Based Network Modeling for Survivability Testing Simulation}, booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, pages = {90--106}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36552-4\_7}, doi = {10.1007/3-540-36552-4\_7}, timestamp = {Fri, 27 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/Kim02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/KimO02, author = {Hyun{-}Gyu Kim and Hyeong{-}Cheol Oh}, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {Efficient Hardware Multiplicative Inverters}, booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, pages = {313--326}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36552-4\_22}, doi = {10.1007/3-540-36552-4\_22}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/KimO02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/KurnioMSW02, author = {Hartono Kurnio and Luke McAven and Reihaneh Safavi{-}Naini and Huaxiong Wang}, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {A Dynamic Group Key Distribution Scheme with Flexible User Join}, booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, pages = {478--496}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36552-4\_33}, doi = {10.1007/3-540-36552-4\_33}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/KurnioMSW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/LeeK02, author = {Byoungcheon Lee and Kwangjo Kim}, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {Receipt-Free Electronic Voting Scheme with a Tamper-Resistant Randomizer}, booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, pages = {389--406}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36552-4\_27}, doi = {10.1007/3-540-36552-4\_27}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/LeeK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/LeeKSS02, author = {Jaeil Lee and Taekyoung Kwon and Sanghoon Song and JooSeok Song}, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {A Model for Embedding and Authorizing Digital Signatures in Printed Documents}, booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, pages = {465--477}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36552-4\_32}, doi = {10.1007/3-540-36552-4\_32}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/LeeKSS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/LefrancN02, author = {Serge Lefranc and David Naccache}, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {Cut-{\&}-Paste Attacks with {JAVA}}, booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, pages = {1--15}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36552-4\_1}, doi = {10.1007/3-540-36552-4\_1}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/LefrancN02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/LyuuW02, author = {Yuh{-}Dauh Lyuu and Ming{-}Luen Wu}, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {Convertible Group Undeniable Signatures}, booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, pages = {48--61}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36552-4\_4}, doi = {10.1007/3-540-36552-4\_4}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/LyuuW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/MaltessonNTT02, author = {Nils Maltesson and David Naccache and Elena Trichina and Christophe Tymen}, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {Applet Verification Strategiesfor RAM-Constrained Devices}, booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, pages = {118--137}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36552-4\_9}, doi = {10.1007/3-540-36552-4\_9}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/MaltessonNTT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/Mangard02, author = {Stefan Mangard}, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {A Simple Power-Analysis {(SPA)} Attack on Implementations of the {AES} Key Expansion}, booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, pages = {343--358}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36552-4\_24}, doi = {10.1007/3-540-36552-4\_24}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/Mangard02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/MarkowitchGK02, author = {Olivier Markowitch and Dieter Gollmann and Steve Kremer}, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {On Fairness in Exchange Protocols}, booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, pages = {451--464}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36552-4\_31}, doi = {10.1007/3-540-36552-4\_31}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/MarkowitchGK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/MartinPSWW02, author = {Keith M. Martin and Josef Pieprzyk and Reihaneh Safavi{-}Naini and Huaxiong Wang and Peter R. Wild}, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {Threshold MACs}, booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, pages = {237--252}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36552-4\_17}, doi = {10.1007/3-540-36552-4\_17}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/MartinPSWW02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/Moller02, author = {Bodo M{\"{o}}ller}, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {Improved Techniques for Fast Exponentiation}, booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, pages = {298--312}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36552-4\_21}, doi = {10.1007/3-540-36552-4\_21}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/Moller02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ParkLP02, author = {Tae{-}Jun Park and Mun{-}Kyu Lee and Kunsoo Park}, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {New Frobenius Expansions for Elliptic Curves with Efficient Endomorphisms}, booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, pages = {264--282}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36552-4\_19}, doi = {10.1007/3-540-36552-4\_19}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/ParkLP02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/PengBDV02, author = {Kun Peng and Colin Boyd and Ed Dawson and Kapali Viswanathan}, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {Non-interactive Auction Schemewith Strong Privacy}, booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, pages = {407--420}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36552-4\_28}, doi = {10.1007/3-540-36552-4\_28}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/PengBDV02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/PhanF02, author = {Raphael Chung{-}Wei Phan and Soichi Furuya}, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {Sliding Properties of the {DES} Key Schedule and Potential Extensions to the Slide Attacks}, booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, pages = {138--148}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36552-4\_10}, doi = {10.1007/3-540-36552-4\_10}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/PhanF02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/PieprzykZ02, author = {Josef Pieprzyk and Xian{-}Mo Zhang}, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {Ideal Threshold Schemes from {MDS} Codes}, booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, pages = {253--263}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36552-4\_18}, doi = {10.1007/3-540-36552-4\_18}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/PieprzykZ02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/RyuK02, author = {Choonwoo Ryu and Hakil Kim}, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {A Fast Fingerprint Matching Algorithm Using Parzen Density Estimation}, booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, pages = {525--533}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36552-4\_36}, doi = {10.1007/3-540-36552-4\_36}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/RyuK02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/SakuraiT02, author = {Kouichi Sakurai and Tsuyoshi Takagi}, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {A Reject Timing Attackon an {IND-CCA2} Public-Key Cryptosystem}, booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, pages = {359--373}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36552-4\_25}, doi = {10.1007/3-540-36552-4\_25}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/SakuraiT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/Sella02, author = {Yaron Sella}, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {Speeding Up Secure Sessions Establishment on the Internet}, booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, pages = {433--450}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36552-4\_30}, doi = {10.1007/3-540-36552-4\_30}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/Sella02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ShinLS02, author = {Jun{-}Bum Shin and Kwangsu Lee and Kyungah Shim}, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {New DSA-Verifiable Signcryption Schemes}, booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, pages = {35--47}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36552-4\_3}, doi = {10.1007/3-540-36552-4\_3}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/ShinLS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/SongS02, author = {Beomsik Song and Jennifer Seberry}, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {Consistent Differential Patterns of Rijndael}, booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, pages = {149--163}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36552-4\_11}, doi = {10.1007/3-540-36552-4\_11}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/SongS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/SusiloS02, author = {Willy Susilo and Reihaneh Safavi{-}Naini}, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {An Efficient Fail-Stop Signature Scheme Based on Factorization}, booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, pages = {62--74}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36552-4\_5}, doi = {10.1007/3-540-36552-4\_5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/SusiloS02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/Wang02, author = {Guilin Wang}, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {On the Security of the Li-Hwang-Lee-Tsai Threshold Group Signature Scheme}, booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, pages = {75--89}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36552-4\_6}, doi = {10.1007/3-540-36552-4\_6}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/Wang02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/XiaoH02, author = {Lu Xiao and Howard M. Heys}, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {Hardware Design and Analysisof Block Cipher Components}, booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, pages = {164--181}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36552-4\_12}, doi = {10.1007/3-540-36552-4\_12}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/XiaoH02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/YenMH02, author = {Sung{-}Ming Yen and Sang{-}Jae Moon and JaeCheol Ha}, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {Hardware Fault Attackon {RSA} with {CRT} Revisited}, booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, pages = {374--388}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36552-4\_26}, doi = {10.1007/3-540-36552-4\_26}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/YenMH02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/Zenner02, author = {Erik Zenner}, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {On the Efficiency of theClock Control Guessing Attack}, booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, pages = {200--212}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36552-4\_14}, doi = {10.1007/3-540-36552-4\_14}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/Zenner02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.