


default search action
3. ICISC 2000: Seoul, Korea
- Dongho Won:

Information Security and Cryptology - ICISC 2000, Third International Conference, Seoul, Korea, December 8-9, 2000, Proceedings. Lecture Notes in Computer Science 2015, Springer 2001, ISBN 3-540-41782-6 - Ju-Sung Kang, Seongtaek Chee, Choonsik Park:

A Note on the Higher Order Differential Attack of Block Ciphers with Two-Block Structures. 1-13 - Hidema Tanaka, Chikashi Ishii, Toshinobu Kaneko:

On the Strength of KASUMI without FL Functions against Higher Order Differential Attack. 14-21 - Steve Babbage, Laurent Frisch:

On MISTY1 Higher Order Differential Cryptanalysis. 22-36 - Dong Hyeon Cheon, Seokhie Hong, Sangjin Lee, Sung Jae Lee, Kyung Hwan Park, Seonhee Yoon:

Difference Distribution Attack on DONUT and Improved DONUT. 37-48 - Yuliang Zheng

, Xian-Mo Zhang:
New Results on Correlation Immunity. 49-63 - Jung Hee Cheon, Seongtaek Chee:

Elliptic Curves and Resilient Functions. 64-72 - Ted Krovetz

, Phillip Rogaway:
Fast Universal Hashing with Small Keys and No Preprocessing: The PolyR Construction. 73-89 - Atsuko Miyaji

, Masaki Nakabayashi, Shunzo Takano:
Characterization of Elliptic Curve Traces under FR-Reduction. 90-108 - Olivier Markowitch, Steve Kremer:

A Multi-party Optimistic Non-repudiation Protocol. 109-122 - Byoungcheon Lee, Kwangjo Kim:

Secure Matchmaking Protocol. 123-134 - Takeru Miyazaki:

An Improved Scheme of the Gennaro-Krawczyk-Rabin Undeniable Signature System Based on RSA. 135-149 - Hyun-Jeong Kim, Jong In Lim, Dong Hoon Lee:

Efficient and Secure Member Deletion in Group Signature Schemes. 150-161 - Feng Bao, Robert H. Deng

, Peirong Feng:
An Efficient and Practical Scheme for Privacy Protection in the E-Commerce of Digital Goods. 162-170 - Yi Mu, Vijay Varadharajan:

An Internet Anonymous Auction Scheme. 171-182 - Koutarou Suzuki, Kunio Kobayashi, Hikaru Morita:

Efficient Sealed-Bid Auction Using Hash Chain. 183-191 - DongGook Park, Colin Boyd, Ed Dawson

:
Micropayments for Wireless Communications. 192-205 - William D. Banks

, Daniel Lieman, Igor E. Shparlinski
, Van Thuong To:
Cryptographic Applications of Sparse Polynomials over Finite Rings. 206-220 - Chanjoo Chung, Seungbok Choi, Youngchul Choi, Dongho Won:

Efficient Anonymous Fingerprinting of Electronic Information with Improved Automatic Identification of Redistributors. 221-234 - Adam L. Young, Moti Yung:

Hash to the Rescue: Space Minimization for PKI Directories. 235-245 - Jae Seung Lee, Sang-Choon Kim, Seung Won Sohn:

A Design of the Security Evaluation System for Decision Support in the Enterprise Network Security Management. 246-260

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














