


default search action
10. ICISC 2007: Seoul, Korea
- Kil-Hyun Nam, Gwangsoo Rhee:

Information Security and Cryptology - ICISC 2007, 10th International Conference, Seoul, Korea, November 29-30, 2007, Proceedings. Lecture Notes in Computer Science 4817, Springer 2007, ISBN 978-3-540-76787-9
Cryptanalysis - I
- Willi Geiselmann, Rainer Steinwandt:

Cryptanalysis of a Hash Function Proposed at ICISC 2006. 1-10 - Jiqiang Lu:

Cryptanalysis of Reduced Versions of the HIGHT Block Cipher from CHES 2006. 11-26 - Antoine Scemama:

A Cryptanalysis of the Double-Round Quadratic Cryptosystem. 27-36
Access Control
- Jangseong Kim, Zeen Kim, Kwangjo Kim:

A Lightweight Privacy Preserving Authentication and Access Control Scheme for Ubiquitous Computing Environment. 37-48 - Jinwei Hu, Ruixuan Li, Zhengding Lu:

Establishing RBAC-Based Secure Interoperability in Decentralized Multi-domain Environments. 49-63 - Li Jiang, Lingdi Ping, Xuezeng Pan:

Handling Dynamic Information Release. 64-76
Cryptanalysis - II
- Baudoin Collard, François-Xavier Standaert

, Jean-Jacques Quisquater:
Improving the Time Complexity of Matsui's Linear Cryptanalysis. 77-88 - Alexander Maximov:

On Large Distributions for Linear Cryptanalysis. 89-101 - Basel Alomair

, Loukas Lazos, Radha Poovendran
:
Passive Attacks on a Class of Authentication Protocols for RFID. 102-115 - Chuan-Wen Loe, Khoongming Khoo:

Side Channel Attacks on Irregularly Decimated Generators. 116-130
System Security
- Ruo Ando, Youki Kadobayashi, Yoichi Shinoda:

Asynchronous Pseudo Physical Memory Snapshot and Forensics on Paravirtualized VMM Using Split Kernel Module. 131-143 - Jesus Molina, Xavier Chorin, Michel Cukier:

Filesystem Activity Following a SSH Compromise: An Empirical Study of File Sequences. 144-155 - Yan Wen, Huaimin Wang:

A Secure Virtual Execution Environment for Untrusted Code. 156-167
Biometrics
- Changlong Jin, Hakil Kim, Stephen J. Elliott:

Liveness Detection of Fingerprint Based on Band-Selective Fourier Spectrum. 168-179
Cryptographic Protocols
- Palash Sarkar:

Improving Upon the TET Mode of Operation. 180-192
Hash Functions - I
- Somitra Kumar Sanadhya

, Palash Sarkar:
New Local Collisions for the SHA-2 Hash Family. 193-205 - Hongbo Yu, Xiaoyun Wang:

Multi-collision Attack on the Compression Functions of MD4 and 3-Pass HAVAL. 206-226
Block and Stream Ciphers
- Haina Zhang, Xiaoyun Wang:

Differential Cryptanalysis of T-Function Based Stream Cipher TSC-4. 227-238 - Wentao Zhang, Wenling Wu, Dengguo Feng:

New Results on Impossible Differential Cryptanalysis of Reduced AES. 239-250
Copyright Protection
- Marcel Fernandez, Josep Cotrina Navau, Miguel Soriano, Neus Domingo:

A Note About the Traceability Properties of Linear Codes. 251-258
Smart Cards
- Amir Moradi

, Mahmoud Salmasizadeh, Mohammad T. Manzuri Shalmani:
Power Analysis Attacks on MDPL and DRSL Implementations. 259-272 - Chong Hee Kim, Jong Hoon Shin, Jean-Jacques Quisquater, Pil Joong Lee:

Safe-Error Attack on SPA-FA Resistant Exponentiations Using a HW Modular Multiplier. 273-281
Elliptic Curve Cryptosystems
- Atsuko Miyaji

:
Generalized MMM-Algorithm Secure Against SPA, DPA, and RPA. 282-296 - Aya Comuta, Mitsuru Kawazoe, Tetsuya Takahashi:

Pairing-Friendly Elliptic Curves with Small Security Loss by Cheon's Algorithm. 297-308
Hash Functions - II
- Jean-Philippe Aumasson, Willi Meier:

Analysis of Multivariate Hash Functions. 309-323 - Florian Mendel

, Vincent Rijmen:
Colliding Message Pair for 53-Step HAS-160. 324-334 - Florian Mendel

, Vincent Rijmen:
Weaknesses in the HAS-V Compression Function. 335-345
Authentication and Authorization
- Raphael C.-W. Phan, Serge Vaudenay:

Security-Preserving Asymmetric Protocol Encapsulation. 346-366

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














