


default search action
4. ICISC 2001: Seoul, Korea
- Kwangjo Kim: 
 Information Security and Cryptology - ICISC 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings. Lecture Notes in Computer Science 2288, Springer 2002, ISBN 3-540-43319-8
- David Pointcheval  : :
 Practical Security in Public-Key Cryptography. 1-17
- Beomsik Song, Huaxiong Wang, Jennifer Seberry: 
 A New Cryptanalytic Method Using the Distribution Characteristics of Substitution Distances. 18-31
- Seonhee Lee, Seokhie Hong, Sangjin Lee, Jongin Lim, Seonhee Yoon: 
 Truncated Differential Cryptanalysis of Camellia. 32-38
- Jung Hee Cheon, MunJu Kim, Kwangjo Kim, Jung-Yeun Lee, SungWoo Kang: 
 Improved Impossible Differential Cryptanalysis of Rijndael and Crypton. 39-49
- Sabine Leveiller, Joseph Boutros, Philippe Guillot, Gilles Zémor: 
 Cryptanalysis of Nonlinear Filter Generators with {0, 1}-Metric Viterbi Decoding. 50
- Johannes Buchmann, Kouichi Sakurai, Tsuyoshi Takagi: 
 An IND-CCA2 Public-Key Cryptosystem with Fast Decryption. 51-71
- Dug-Hwan Choi, Seungbok Choi, Dongho Won: 
 Improvement of Probabilistic Public Key Cryptosystems Using Discrete Logarithm. 72-80
- Mototsugu Nishioka, Hisayoshi Satoh, Kouichi Sakurai: 
 Design and Analysis of Fast Provably Secure Public-Key Cryptosystems Based on a Modular Squaring. 81-102
- Jaechul Sung  , Sangjin Lee, Jong In Lim, Wonil Lee, Okyeon Yi: , Sangjin Lee, Jong In Lim, Wonil Lee, Okyeon Yi:
 Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation. 103-113
- Christopher Krügel, Thomas Toth, Clemens Kerer: 
 Decentralized Event Correlation for Intrusion Detection. 114-131
- Vorapranee Khu-smith, Chris J. Mitchell  : :
 Enhancing the Security of Cookies. 132-145
- Yang-Seo Choi, Dong-il Seo, Sung Won Sohn: 
 A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation. 146-159
- Hartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang: 
 Efficient Revocation Schemes for Secure Multicast. 160-177
- Gérard D. Cohen, Simon Litsyn, Gilles Zémor: 
 Binary Codes for Collusion-Secure Fingerprinting. 178-185
- Jaroslaw Pastuszak, Darek Michalek, Josef Pieprzyk  : :
 Copyright Protection of Object-Oriented Software. 186-199
- Hyejoung Yoo, Kwangsoo Lee, Sangjin Lee, Jongin Lim: 
 Off-Line Authentication Using Watermarks. 200-213
- Soichi Furuya: 
 Slide Attacks with a Known-Plaintext Cryptanalysis. 214-225
- Josef Pieprzyk  , Xian-Mo Zhang: , Xian-Mo Zhang:
 Constructions of Cheating Immune Secret Sharing. 226-243
- Clemente Galdi, Pino Persiano: 
 Private Computation with Shared Randomness over Broadcast Channel. 244-257
- Nicolás González-Deleito, Olivier Markowitch: 
 An Optimistic Multi-party Fair Exchange Protocol with Reduced Trust Requirements. 258-267
- Supakorn Kungpisdan, Yongyuth Permpoontanalarp: 
 Practical Reasoning about Accountability in Electronic Commerce Protocols. 268-284
- Ron Steinfeld, Laurence Bull, Yuliang Zheng  : :
 Content Extraction Signatures. 285-304
- Dae Hyun Yum, Pil Joong Lee: 
 New Signcryption Schemes Based on KCDSA. 305-317
- Jinho Kim, Kwangjo Kim, Chulsoo Lee: 
 An Efficient and Provably Secure Threshold Blind Signature. 318-327
- Kei Kawauchi, Hiroshi Minato, Atsuko Miyaji  , Mitsuru Tada: , Mitsuru Tada:
 A Multi-signature Scheme with Signers' Intentions Secure against Active Attacks. 328-340
- André Weimerskirch, Gilles Thonet: 
 A Distributed Light-Weight Authentication Model for Ad-hoc Networks. 341-354
- Stelvio Cimato: 
 Design of an Authentication Protocol for Gsm Javacards. 355-368
- Richard Au, Mark Looi, Paul Ashley  , Loo Tang Seet: , Loo Tang Seet:
 Secure Authorisation Agent for Cross-Domain Access Control in a Mobile Computing Environment. 369-381
- Joan Mir, Joan Borrell: 
 Protecting General Flexible Itineraries of Mobile Agents. 382-396
- Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon: 
 RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis. 397-413
- Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon: 
 A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack. 414-427
- Katsuyuki Okeya, Kunihiko Miyazaki, Kouichi Sakurai: 
 A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks. 428-439
- Kouichi Itoh, Masahiko Takenaka, Naoya Torii: 
 DPA Countermeasure Based on the "Masking Method". 440-456

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


 Google
Google Google Scholar
Google Scholar Semantic Scholar
Semantic Scholar Internet Archive Scholar
Internet Archive Scholar CiteSeerX
CiteSeerX ORCID
ORCID














