default search action
Search dblp for Publications
export results for "toc:db/conf/icisc/icisc2005.bht:"
@proceedings{DBLP:conf/icisc/2005, editor = {Dongho Won and Seungjoo Kim}, title = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11734727}, doi = {10.1007/11734727}, isbn = {3-540-33354-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/2005.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/AdelsbachHS05, author = {Andr{\'{e}} Adelsbach and Ulrich Huber and Ahmad{-}Reza Sadeghi}, editor = {Dongho Won and Seungjoo Kim}, title = {Property-Based Broadcast Encryption for Multi-level Security Policies}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, pages = {15--31}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11734727\_4}, doi = {10.1007/11734727\_4}, timestamp = {Sat, 02 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/AdelsbachHS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/BaeKKPS05, author = {Duhyun Bae and Gwanyeon Kim and Jiho Kim and Sehyun Park and Ohyoung Song}, editor = {Dongho Won and Seungjoo Kim}, title = {An Efficient Design of {CCMP} for Robust Security Network}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, pages = {352--361}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11734727\_28}, doi = {10.1007/11734727\_28}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/BaeKKPS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/Brandt05, author = {Felix Brandt}, editor = {Dongho Won and Seungjoo Kim}, title = {Efficient Cryptographic Protocol Design Based on Distributed El Gamal Encryption}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, pages = {32--47}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11734727\_5}, doi = {10.1007/11734727\_5}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/Brandt05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ChatterjeeS05, author = {Sanjit Chatterjee and Palash Sarkar}, editor = {Dongho Won and Seungjoo Kim}, title = {Trading Time for Space: Towards an Efficient {IBE} Scheme with Short(er) Public Parameters in the Standard Model}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, pages = {424--440}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11734727\_33}, doi = {10.1007/11734727\_33}, timestamp = {Tue, 04 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/ChatterjeeS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/Courtois05, author = {Nicolas T. Courtois}, editor = {Dongho Won and Seungjoo Kim}, title = {Cryptanalysis of Sfinks}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, pages = {261--269}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11734727\_22}, doi = {10.1007/11734727\_22}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/Courtois05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/CourtoisG05, author = {Nicolas T. Courtois and Louis Goubin}, editor = {Dongho Won and Seungjoo Kim}, title = {An Algebraic Masking Method to Protect {AES} Against Power Attacks}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, pages = {199--209}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11734727\_18}, doi = {10.1007/11734727\_18}, timestamp = {Fri, 17 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/CourtoisG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/GoyalJQ05, author = {Vipul Goyal and Abhishek Jain and Jean{-}Jacques Quisquater}, editor = {Dongho Won and Seungjoo Kim}, title = {Improvements to Mitchell's Remote User Authentication Protocol}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, pages = {69--80}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11734727\_8}, doi = {10.1007/11734727\_8}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/GoyalJQ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/GrimenMM05, author = {Gisle Grimen and Christian M{\"{o}}nch and Roger Midtstraum}, editor = {Dongho Won and Seungjoo Kim}, title = {Software-Based Copy Protection for Temporal Media During Dissemination and Playback}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, pages = {362--377}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11734727\_29}, doi = {10.1007/11734727\_29}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/GrimenMM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/HurLHY05, author = {Junbeom Hur and Younho Lee and Seong{-}Min Hong and Hyunsoo Yoon}, editor = {Dongho Won and Seungjoo Kim}, title = {Trust Management for Resilient Wireless Sensor Networks}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, pages = {56--68}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11734727\_7}, doi = {10.1007/11734727\_7}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/HurLHY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/JiangG05, author = {Shaoquan Jiang and Guang Gong}, editor = {Dongho Won and Seungjoo Kim}, title = {Efficient Authenticators with Application to Key Exchange}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, pages = {81--91}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11734727\_9}, doi = {10.1007/11734727\_9}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/JiangG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/KimLICKB05, author = {Young{-}Gab Kim and Taek Lee and Hoh Peter In and Yoon Jung Chung and InJung Kim and Doo{-}Kwon Baik}, editor = {Dongho Won and Seungjoo Kim}, title = {A Probabilistic Approach to Estimate the Damage Propagation of Cyber Attacks}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, pages = {175--185}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11734727\_16}, doi = {10.1007/11734727\_16}, timestamp = {Sat, 24 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/KimLICKB05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/KimYPK05, author = {Woong{-}Sik Kim and Weon{-}Hee Yoo and Jang{-}Hyun Park and Bok{-}Ki Kim}, editor = {Dongho Won and Seungjoo Kim}, title = {An Enhanced Estimation Algorithm for Reconstructing Fingerprint Strip Image}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, pages = {48--55}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11734727\_6}, doi = {10.1007/11734727\_6}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/KimYPK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/KwonKP05, author = {Soonhak Kwon and Taekyoung Kwon and Young{-}Ho Park}, editor = {Dongho Won and Seungjoo Kim}, title = {New Architecture for Multiplication in \emph{GF}(2\({}^{\mbox{\emph{m}}}\)) and Comparisons with Normal and Polynomial Basis Multipliers for Elliptic Curve Cryptography}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, pages = {335--351}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11734727\_27}, doi = {10.1007/11734727\_27}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/KwonKP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/LiuTWZ05, author = {Joseph K. Liu and Patrick P. Tsang and Duncan S. Wong and Robert W. Zhu}, editor = {Dongho Won and Seungjoo Kim}, title = {Universal Custodian-Hiding Verifiable Encryption for Discrete Logarithms}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, pages = {389--409}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11734727\_31}, doi = {10.1007/11734727\_31}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/LiuTWZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/Lopez-TrejoRD05, author = {Emmanuel L{\'{o}}pez{-}Trejo and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez and Arturo D{\'{\i}}az{-}P{\'{e}}rez}, editor = {Dongho Won and Seungjoo Kim}, title = {An {FPGA} Implementation of {CCM} Mode Using {AES}}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, pages = {322--334}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11734727\_26}, doi = {10.1007/11734727\_26}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/Lopez-TrejoRD05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/MauwO05, author = {Sjouke Mauw and Martijn Oostdijk}, editor = {Dongho Won and Seungjoo Kim}, title = {Foundations of Attack Trees}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, pages = {186--198}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11734727\_17}, doi = {10.1007/11734727\_17}, timestamp = {Sun, 04 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/MauwO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/MinematsuT05, author = {Kazuhiko Minematsu and Yukiyasu Tsunoo}, editor = {Dongho Won and Seungjoo Kim}, title = {Hybrid Symmetric Encryption Using Known-Plaintext Attack-Secure Components}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, pages = {242--260}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11734727\_21}, doi = {10.1007/11734727\_21}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/MinematsuT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/MinematsuT05a, author = {Kazuhiko Minematsu and Yukiyasu Tsunoo}, editor = {Dongho Won and Seungjoo Kim}, title = {Expanding Weak {PRF} with Small Key Size}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, pages = {284--298}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11734727\_24}, doi = {10.1007/11734727\_24}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/MinematsuT05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/MolnarPSW05, author = {David Molnar and Matt Piotrowski and David Schultz and David A. Wagner}, editor = {Dongho Won and Seungjoo Kim}, title = {The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, pages = {156--168}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11734727\_14}, doi = {10.1007/11734727\_14}, timestamp = {Wed, 14 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/MolnarPSW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/Naccache05, author = {David Naccache}, editor = {Dongho Won and Seungjoo Kim}, title = {National Security, Forensics and Mobile Communications}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, pages = {1}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11734727\_1}, doi = {10.1007/11734727\_1}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/Naccache05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/NaitoSKO05, author = {Yusuke Naito and Yu Sasaki and Noboru Kunihiro and Kazuo Ohta}, editor = {Dongho Won and Seungjoo Kim}, title = {Improved Collision Attack on {MD4} with Probability Almost 1}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, pages = {129--145}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11734727\_12}, doi = {10.1007/11734727\_12}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/NaitoSKO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/Patarin05, author = {Jacques Patarin}, editor = {Dongho Won and Seungjoo Kim}, title = {On Linear Systems of Equations with Distinct Variables and Small Block Size}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, pages = {299--321}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11734727\_25}, doi = {10.1007/11734727\_25}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/Patarin05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/PatarinM05, author = {Jacques Patarin and Audrey Montreuil}, editor = {Dongho Won and Seungjoo Kim}, title = {Benes and Butterfly Schemes Revisited}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, pages = {92--116}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11734727\_10}, doi = {10.1007/11734727\_10}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/PatarinM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/PieprzykZG05, author = {Josef Pieprzyk and Xian{-}Mo Zhang and Jovan Dj. Golic}, editor = {Dongho Won and Seungjoo Kim}, title = {Characterisations of Extended Resiliency and Extended Immunity of S-Boxes}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, pages = {210--228}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11734727\_19}, doi = {10.1007/11734727\_19}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/PieprzykZG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/Ting05, author = {Grace C.{-}W. Ting}, editor = {Dongho Won and Seungjoo Kim}, title = {Ambiguity Attacks on the Ganic-Eskicioglu Robust {DWT-SVD} Image Watermarking Scheme}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, pages = {378--388}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11734727\_30}, doi = {10.1007/11734727\_30}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/Ting05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/Tsujii05, author = {Shigeo Tsujii}, editor = {Dongho Won and Seungjoo Kim}, title = {Information Security as Interdisciplinary Science Based on Ethics}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, pages = {2}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11734727\_2}, doi = {10.1007/11734727\_2}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/Tsujii05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/VoK05, author = {Duc{-}Liem Vo and Kwangjo Kim}, editor = {Dongho Won and Seungjoo Kim}, title = {Yet Another Forward Secure Signature from Bilinear Pairings}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, pages = {441--455}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11734727\_34}, doi = {10.1007/11734727\_34}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/VoK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/WangJ05, author = {Changda Wang and Shiguang Ju}, editor = {Dongho Won and Seungjoo Kim}, title = {The Dilemma of Covert Channels Searching}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, pages = {169--174}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11734727\_15}, doi = {10.1007/11734727\_15}, timestamp = {Tue, 07 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/WangJ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/WuZF05, author = {Wenling Wu and Wentao Zhang and Dengguo Feng}, editor = {Dongho Won and Seungjoo Kim}, title = {Integral Cryptanalysis of Reduced {FOX} Block Cipher}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, pages = {229--241}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11734727\_20}, doi = {10.1007/11734727\_20}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/WuZF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/WuZSM05, author = {Qianhong Wu and Fangguo Zhang and Willy Susilo and Yi Mu}, editor = {Dongho Won and Seungjoo Kim}, title = {An Efficient Static Blind Ring Signature Scheme}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, pages = {410--423}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11734727\_32}, doi = {10.1007/11734727\_32}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/WuZSM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/YenKMH05, author = {Sung{-}Ming Yen and Lee{-}Chun Ko and Sang{-}Jae Moon and JaeCheol Ha}, editor = {Dongho Won and Seungjoo Kim}, title = {Relative Doubling Attack Against Montgomery Ladder}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, pages = {117--128}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11734727\_11}, doi = {10.1007/11734727\_11}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/YenKMH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/YoshidaMF05, author = {Maki Yoshida and Shigeo Mitsunari and Toru Fujiwara}, editor = {Dongho Won and Seungjoo Kim}, title = {A Timed-Release Key Management Scheme for Backward Recovery}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, pages = {3--14}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11734727\_3}, doi = {10.1007/11734727\_3}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/YoshidaMF05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/YunSPCHC05, author = {Aaram Yun and Soo Hak Sung and Sangwoo Park and Donghoon Chang and Seokhie Hong and Hong{-}Su Cho}, editor = {Dongho Won and Seungjoo Kim}, title = {Finding Collision on 45-Step {HAS-160}}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, pages = {146--155}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11734727\_13}, doi = {10.1007/11734727\_13}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/YunSPCHC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/ZhangWFW05, author = {Bin Zhang and Hongjun Wu and Dengguo Feng and Hong Wang}, editor = {Dongho Won and Seungjoo Kim}, title = {Weaknesses of COSvd (2, 128) Stream Cipher}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, pages = {270--283}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11734727\_23}, doi = {10.1007/11734727\_23}, timestamp = {Thu, 30 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/ZhangWFW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.