


default search action
6. ICISC 2003: Seoul, Korea
- Jong In Lim, Dong Hoon Lee:

Information Security and Cryptology - ICISC 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers. Lecture Notes in Computer Science 2971, Springer 2004, ISBN 3-540-21376-7 - Jonathan Katz:

Binary Tree Encryption: Constructions and Applications. 1-11 - Joseph K. Liu, Victor K. Wei, Duncan S. Wong:

A Separable Threshold Ring Signature Scheme. 12-26 - Guilin Wang:

On the Security of a Group Signature Scheme with Forward Security. 27-39 - Shahrokh Saeednia, Steve Kremer, Olivier Markowitch:

An Efficient Strong Designated Verifier Signature Scheme. 40-54 - Peeter Laud, Ricardo Corin:

Sound Computational Interpretation of Formal Encryption with Composed Keys. 55-66 - Tetsu Iwata, Kaoru Kurosawa:

On the Security of a New Variant of OMAC. 67-78 - Wen Ping Ma, Moon Ho Lee:

New Methods to Construct Cheating Immune Functions. 79-86 - Shoichi Hirose:

Yet Another Definition of Weak Collision Resistance and Its Analysis. 87-96 - YoungJu Choie, Eunjeong Lee:

Implementation of Tate Pairing on Hyperelliptic Curves of Genus 2. 97-111 - Tae-Jun Park, Mun-Kyu Lee, E-yong Kim, Kunsoo Park:

A General Expansion Method Using Efficient Endomorphisms. 112-126 - Seon Ok Lee, Seok Won Jung, Chang Han Kim, Janghong Yoon, Jae-Young Koh, Daeho Kim:

Design of Bit Parallel Multiplier with Lower Time Complexity. 127-139 - Joong Chul Yoon, Seok Won Jung, Sungwoo Lee:

Architecture for an Elliptic Curve Scalar Multiplication Resistant to Some Side-Channel Attacks. 139-151 - Tae-Jun Park, Mun-Kyu Lee, Kunsoo Park:

Efficient Scalar Multiplication in Hyperelliptic Curves Using A New Frobenius Expansion. 152-165 - Muxiang Zhang:

Adaptive Protocol for Entity Authentication and Key Agreement in Mobile Networks. 166-183 - Wook Shin, Dong-Ik Lee, Hyoung-Chun Kim, Jung-Min Kang, Jin-Seok Lee:

Extended Role Based Access Control and Procedural Restrictions. 184-196 - Yuan Zhang, Moon-Jung Chung, Hyun Kim:

Layer-Based Access Control Model in the Manufacturing Infrastructure and Design Automation System. 197-214 - Changjie Wang, Ho-fung Leung, Yumin Wang:

Secure Double Auction Protocols with Full Privacy Protection. 215-229 - Toru Nakanishi, Daisuke Yamamoto, Yuji Sugiyama:

Sealed-Bid Auctions with Efficient Bids. 230-244 - Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, Seungjae Yoo:

Providing Receipt-Freeness in Mixnet-Based Voting Protocols. 245-258 - Xiaofeng Chen, Byoungcheon Lee, Kwangjo Kim:

Receipt-Free Electronic Auction Schemes Using Homomorphic Encryption. 259-273 - Ginger Myles, Christian S. Collberg:

Software Watermarking Through Register Allocation: Implementation, Analysis, and Attacks. 274-293 - Limin Gu, Jiwu Huang, Zewen Chen:

Analysis of the Bounds for Linear Block Codes in Watermark Channel. 294-304 - Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng

:
Security Analysis of Some Proxy Signatures. 305-319 - Jiun-Ming Chen, Bo-Yin Yang:

A More Secure and Efficacious TTS Signature Scheme. 320-338 - Zewen Chen, Jilin Wang, Yumin Wang, Jiwu Huang, Daren Huang:

An Efficient Revocation Algorithm in Group Signatures. 339-351 - Sherman S. M. Chow

, Siu-Ming Yiu, Lucas Chi Kwong Hui, Kam-Pui Chow:
Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity. 352-369 - Wen Ping Ma, Moon Ho Lee:

Group Oriented Cryptosystems Based on Linear Access Structures. 370-376 - Raylin Tso, Ying Miao, Eiji Okamoto:

A New Algorithm for Searching a Consistent Set of Shares in a Threshold Scheme with Cheaters. 377-385 - Willy Susilo

, Yi Mu:
Non-interactive Deniable Ring Authentication. 386-401 - Seokhie Hong, Deukjo Hong, Youngdai Ko, Donghoon Chang, Wonil Lee, Sangjin Lee:

Differential Cryptanalysis of TEA and XTEA. 402-417 - Kevin Chen, Leonie Ruth Simpson

, Matthew Henricksen, William Millan, Ed Dawson:
A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher. 418-431 - Daesung Kwon, Jaesung Kim, Sangwoo Park, Soo Hak Sung, Yaekwon Sohn, Jung Hwan Song, Yongjin Yeom, E-Joong Yoon, Sangjin Lee, Jaewon Lee, Seongtaek Chee, Daewan Han, Jin Hong

:
New Block Cipher: ARIA. 432-445 - Jongsung Kim, Seokhie Hong, Sangjin Lee, Jung Hwan Song, Hyungjin Yang:

Truncated Differential Attacks on 8-Round CRYPTON. 446-456

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














