Search dblp for Publications

export results for "toc:db/conf/icisc/icisc2002.bht:"

 download as .bib file

@proceedings{DBLP:conf/icisc/2002,
  editor       = {Pil Joong Lee and
                  Chae Hoon Lim},
  title        = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2587},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36552-4},
  doi          = {10.1007/3-540-36552-4},
  isbn         = {3-540-00716-4},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/2002.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/BevanK02,
  author       = {R{\'{e}}gis Bevan and
                  Erik Knudsen},
  editor       = {Pil Joong Lee and
                  Chae Hoon Lim},
  title        = {Ways to Enhance Differential Power Analysis},
  booktitle    = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2587},
  pages        = {327--342},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36552-4\_23},
  doi          = {10.1007/3-540-36552-4\_23},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/BevanK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ChoiY02,
  author       = {Se Ah Choi and
                  Kyeongcheol Yang},
  editor       = {Pil Joong Lee and
                  Chae Hoon Lim},
  title        = {Balanced Shrinking Generators},
  booktitle    = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2587},
  pages        = {213--225},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36552-4\_15},
  doi          = {10.1007/3-540-36552-4\_15},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/ChoiY02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Courtois02,
  author       = {Nicolas T. Courtois},
  editor       = {Pil Joong Lee and
                  Chae Hoon Lim},
  title        = {Higher Order Correlation Attacks, {XL} Algorithm and Cryptanalysis
                  of Toyocrypt},
  booktitle    = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2587},
  pages        = {182--199},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36552-4\_13},
  doi          = {10.1007/3-540-36552-4\_13},
  timestamp    = {Fri, 17 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/Courtois02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/GilMPC02,
  author       = {Youn{-}Hee Gil and
                  Daesung Moon and
                  Sung Bum Pan and
                  Yongwha Chung},
  editor       = {Pil Joong Lee and
                  Chae Hoon Lim},
  title        = {Fingerprint Verification System Involving Smart Card},
  booktitle    = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2587},
  pages        = {510--524},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36552-4\_35},
  doi          = {10.1007/3-540-36552-4\_35},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/GilMPC02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/IwataK02,
  author       = {Tetsu Iwata and
                  Kaoru Kurosawa},
  editor       = {Pil Joong Lee and
                  Chae Hoon Lim},
  title        = {On the Universal Hash Functionsin Luby-Rackoff Cipher},
  booktitle    = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2587},
  pages        = {226--236},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36552-4\_16},
  doi          = {10.1007/3-540-36552-4\_16},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/IwataK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/IzuT02,
  author       = {Tetsuya Izu and
                  Tsuyoshi Takagi},
  editor       = {Pil Joong Lee and
                  Chae Hoon Lim},
  title        = {Efficient Computations of the Tate Pairingfor the Large {MOV} Degrees},
  booktitle    = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2587},
  pages        = {283--297},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36552-4\_20},
  doi          = {10.1007/3-540-36552-4\_20},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/IzuT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/JeongJRLL02,
  author       = {Ik Rae Jeong and
                  Hee Yun Jeong and
                  Hyun Sook Rhee and
                  Dong Hoon Lee and
                  Jong In Lim},
  editor       = {Pil Joong Lee and
                  Chae Hoon Lim},
  title        = {Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption},
  booktitle    = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2587},
  pages        = {16--34},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36552-4\_2},
  doi          = {10.1007/3-540-36552-4\_2},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/JeongJRLL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/JinSCH02,
  author       = {Hai Jin and
                  Jianhua Sun and
                  Hao Chen and
                  Zongfen Han},
  editor       = {Pil Joong Lee and
                  Chae Hoon Lim},
  title        = {A Risk-Sensitive Intrusion Detection Model},
  booktitle    = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2587},
  pages        = {107--117},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36552-4\_8},
  doi          = {10.1007/3-540-36552-4\_8},
  timestamp    = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/JinSCH02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/JuKLL02,
  author       = {Hak Soo Ju and
                  Hyun{-}Jeong Kim and
                  Dong Hoon Lee and
                  Jong In Lim},
  editor       = {Pil Joong Lee and
                  Chae Hoon Lim},
  title        = {An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control},
  booktitle    = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2587},
  pages        = {421--432},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36552-4\_29},
  doi          = {10.1007/3-540-36552-4\_29},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/JuKLL02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KiKLP02,
  author       = {JuHee Ki and
                  Hyun{-}Jeong Kim and
                  Dong Hoon Lee and
                  Chang{-}Seop Park},
  editor       = {Pil Joong Lee and
                  Chae Hoon Lim},
  title        = {Efficient Multicast Key Management for Stateless Receivers},
  booktitle    = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2587},
  pages        = {497--509},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36552-4\_34},
  doi          = {10.1007/3-540-36552-4\_34},
  timestamp    = {Tue, 07 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/KiKLP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Kim02,
  author       = {HyungJong Kim},
  editor       = {Pil Joong Lee and
                  Chae Hoon Lim},
  title        = {System Specification Based Network Modeling for Survivability Testing
                  Simulation},
  booktitle    = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2587},
  pages        = {90--106},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36552-4\_7},
  doi          = {10.1007/3-540-36552-4\_7},
  timestamp    = {Fri, 27 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/Kim02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KimO02,
  author       = {Hyun{-}Gyu Kim and
                  Hyeong{-}Cheol Oh},
  editor       = {Pil Joong Lee and
                  Chae Hoon Lim},
  title        = {Efficient Hardware Multiplicative Inverters},
  booktitle    = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2587},
  pages        = {313--326},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36552-4\_22},
  doi          = {10.1007/3-540-36552-4\_22},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/KimO02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KurnioMSW02,
  author       = {Hartono Kurnio and
                  Luke McAven and
                  Reihaneh Safavi{-}Naini and
                  Huaxiong Wang},
  editor       = {Pil Joong Lee and
                  Chae Hoon Lim},
  title        = {A Dynamic Group Key Distribution Scheme with Flexible User Join},
  booktitle    = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2587},
  pages        = {478--496},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36552-4\_33},
  doi          = {10.1007/3-540-36552-4\_33},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/KurnioMSW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/LeeK02,
  author       = {Byoungcheon Lee and
                  Kwangjo Kim},
  editor       = {Pil Joong Lee and
                  Chae Hoon Lim},
  title        = {Receipt-Free Electronic Voting Scheme with a Tamper-Resistant Randomizer},
  booktitle    = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2587},
  pages        = {389--406},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36552-4\_27},
  doi          = {10.1007/3-540-36552-4\_27},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/LeeK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/LeeKSS02,
  author       = {Jaeil Lee and
                  Taekyoung Kwon and
                  Sanghoon Song and
                  JooSeok Song},
  editor       = {Pil Joong Lee and
                  Chae Hoon Lim},
  title        = {A Model for Embedding and Authorizing Digital Signatures in Printed
                  Documents},
  booktitle    = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2587},
  pages        = {465--477},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36552-4\_32},
  doi          = {10.1007/3-540-36552-4\_32},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/LeeKSS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/LefrancN02,
  author       = {Serge Lefranc and
                  David Naccache},
  editor       = {Pil Joong Lee and
                  Chae Hoon Lim},
  title        = {Cut-{\&}-Paste Attacks with {JAVA}},
  booktitle    = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2587},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36552-4\_1},
  doi          = {10.1007/3-540-36552-4\_1},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/LefrancN02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/LyuuW02,
  author       = {Yuh{-}Dauh Lyuu and
                  Ming{-}Luen Wu},
  editor       = {Pil Joong Lee and
                  Chae Hoon Lim},
  title        = {Convertible Group Undeniable Signatures},
  booktitle    = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2587},
  pages        = {48--61},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36552-4\_4},
  doi          = {10.1007/3-540-36552-4\_4},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/LyuuW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/MaltessonNTT02,
  author       = {Nils Maltesson and
                  David Naccache and
                  Elena Trichina and
                  Christophe Tymen},
  editor       = {Pil Joong Lee and
                  Chae Hoon Lim},
  title        = {Applet Verification Strategiesfor RAM-Constrained Devices},
  booktitle    = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2587},
  pages        = {118--137},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36552-4\_9},
  doi          = {10.1007/3-540-36552-4\_9},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/MaltessonNTT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Mangard02,
  author       = {Stefan Mangard},
  editor       = {Pil Joong Lee and
                  Chae Hoon Lim},
  title        = {A Simple Power-Analysis {(SPA)} Attack on Implementations of the {AES}
                  Key Expansion},
  booktitle    = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2587},
  pages        = {343--358},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36552-4\_24},
  doi          = {10.1007/3-540-36552-4\_24},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/Mangard02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/MarkowitchGK02,
  author       = {Olivier Markowitch and
                  Dieter Gollmann and
                  Steve Kremer},
  editor       = {Pil Joong Lee and
                  Chae Hoon Lim},
  title        = {On Fairness in Exchange Protocols},
  booktitle    = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2587},
  pages        = {451--464},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36552-4\_31},
  doi          = {10.1007/3-540-36552-4\_31},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/MarkowitchGK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/MartinPSWW02,
  author       = {Keith M. Martin and
                  Josef Pieprzyk and
                  Reihaneh Safavi{-}Naini and
                  Huaxiong Wang and
                  Peter R. Wild},
  editor       = {Pil Joong Lee and
                  Chae Hoon Lim},
  title        = {Threshold MACs},
  booktitle    = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2587},
  pages        = {237--252},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36552-4\_17},
  doi          = {10.1007/3-540-36552-4\_17},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/MartinPSWW02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Moller02,
  author       = {Bodo M{\"{o}}ller},
  editor       = {Pil Joong Lee and
                  Chae Hoon Lim},
  title        = {Improved Techniques for Fast Exponentiation},
  booktitle    = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2587},
  pages        = {298--312},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36552-4\_21},
  doi          = {10.1007/3-540-36552-4\_21},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/Moller02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ParkLP02,
  author       = {Tae{-}Jun Park and
                  Mun{-}Kyu Lee and
                  Kunsoo Park},
  editor       = {Pil Joong Lee and
                  Chae Hoon Lim},
  title        = {New Frobenius Expansions for Elliptic Curves with Efficient Endomorphisms},
  booktitle    = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2587},
  pages        = {264--282},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36552-4\_19},
  doi          = {10.1007/3-540-36552-4\_19},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/ParkLP02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/PengBDV02,
  author       = {Kun Peng and
                  Colin Boyd and
                  Ed Dawson and
                  Kapali Viswanathan},
  editor       = {Pil Joong Lee and
                  Chae Hoon Lim},
  title        = {Non-interactive Auction Schemewith Strong Privacy},
  booktitle    = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2587},
  pages        = {407--420},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36552-4\_28},
  doi          = {10.1007/3-540-36552-4\_28},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/PengBDV02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/PhanF02,
  author       = {Raphael Chung{-}Wei Phan and
                  Soichi Furuya},
  editor       = {Pil Joong Lee and
                  Chae Hoon Lim},
  title        = {Sliding Properties of the {DES} Key Schedule and Potential Extensions
                  to the Slide Attacks},
  booktitle    = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2587},
  pages        = {138--148},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36552-4\_10},
  doi          = {10.1007/3-540-36552-4\_10},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/PhanF02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/PieprzykZ02,
  author       = {Josef Pieprzyk and
                  Xian{-}Mo Zhang},
  editor       = {Pil Joong Lee and
                  Chae Hoon Lim},
  title        = {Ideal Threshold Schemes from {MDS} Codes},
  booktitle    = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2587},
  pages        = {253--263},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36552-4\_18},
  doi          = {10.1007/3-540-36552-4\_18},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/PieprzykZ02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/RyuK02,
  author       = {Choonwoo Ryu and
                  Hakil Kim},
  editor       = {Pil Joong Lee and
                  Chae Hoon Lim},
  title        = {A Fast Fingerprint Matching Algorithm Using Parzen Density Estimation},
  booktitle    = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2587},
  pages        = {525--533},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36552-4\_36},
  doi          = {10.1007/3-540-36552-4\_36},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/RyuK02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/SakuraiT02,
  author       = {Kouichi Sakurai and
                  Tsuyoshi Takagi},
  editor       = {Pil Joong Lee and
                  Chae Hoon Lim},
  title        = {A Reject Timing Attackon an {IND-CCA2} Public-Key Cryptosystem},
  booktitle    = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2587},
  pages        = {359--373},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36552-4\_25},
  doi          = {10.1007/3-540-36552-4\_25},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/SakuraiT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Sella02,
  author       = {Yaron Sella},
  editor       = {Pil Joong Lee and
                  Chae Hoon Lim},
  title        = {Speeding Up Secure Sessions Establishment on the Internet},
  booktitle    = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2587},
  pages        = {433--450},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36552-4\_30},
  doi          = {10.1007/3-540-36552-4\_30},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/Sella02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/ShinLS02,
  author       = {Jun{-}Bum Shin and
                  Kwangsu Lee and
                  Kyungah Shim},
  editor       = {Pil Joong Lee and
                  Chae Hoon Lim},
  title        = {New DSA-Verifiable Signcryption Schemes},
  booktitle    = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2587},
  pages        = {35--47},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36552-4\_3},
  doi          = {10.1007/3-540-36552-4\_3},
  timestamp    = {Sun, 04 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/ShinLS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/SongS02,
  author       = {Beomsik Song and
                  Jennifer Seberry},
  editor       = {Pil Joong Lee and
                  Chae Hoon Lim},
  title        = {Consistent Differential Patterns of Rijndael},
  booktitle    = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2587},
  pages        = {149--163},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36552-4\_11},
  doi          = {10.1007/3-540-36552-4\_11},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/SongS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/SusiloS02,
  author       = {Willy Susilo and
                  Reihaneh Safavi{-}Naini},
  editor       = {Pil Joong Lee and
                  Chae Hoon Lim},
  title        = {An Efficient Fail-Stop Signature Scheme Based on Factorization},
  booktitle    = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2587},
  pages        = {62--74},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36552-4\_5},
  doi          = {10.1007/3-540-36552-4\_5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/SusiloS02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Wang02,
  author       = {Guilin Wang},
  editor       = {Pil Joong Lee and
                  Chae Hoon Lim},
  title        = {On the Security of the Li-Hwang-Lee-Tsai Threshold Group Signature
                  Scheme},
  booktitle    = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2587},
  pages        = {75--89},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36552-4\_6},
  doi          = {10.1007/3-540-36552-4\_6},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/Wang02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/XiaoH02,
  author       = {Lu Xiao and
                  Howard M. Heys},
  editor       = {Pil Joong Lee and
                  Chae Hoon Lim},
  title        = {Hardware Design and Analysisof Block Cipher Components},
  booktitle    = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2587},
  pages        = {164--181},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36552-4\_12},
  doi          = {10.1007/3-540-36552-4\_12},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/XiaoH02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/YenMH02,
  author       = {Sung{-}Ming Yen and
                  Sang{-}Jae Moon and
                  JaeCheol Ha},
  editor       = {Pil Joong Lee and
                  Chae Hoon Lim},
  title        = {Hardware Fault Attackon {RSA} with {CRT} Revisited},
  booktitle    = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2587},
  pages        = {374--388},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36552-4\_26},
  doi          = {10.1007/3-540-36552-4\_26},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/YenMH02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Zenner02,
  author       = {Erik Zenner},
  editor       = {Pil Joong Lee and
                  Chae Hoon Lim},
  title        = {On the Efficiency of theClock Control Guessing Attack},
  booktitle    = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2587},
  pages        = {200--212},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36552-4\_14},
  doi          = {10.1007/3-540-36552-4\_14},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/Zenner02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics