- Jun-Bum Shin, Kwangsu Lee, Kyungah Shim:
New DSA-Verifiable Signcryption Schemes. ICISC 2002: 35-47 - Beomsik Song, Jennifer Seberry:
Consistent Differential Patterns of Rijndael. ICISC 2002: 149-163 - Willy Susilo, Reihaneh Safavi-Naini:
An Efficient Fail-Stop Signature Scheme Based on Factorization. ICISC 2002: 62-74 - Guilin Wang:
On the Security of the Li-Hwang-Lee-Tsai Threshold Group Signature Scheme. ICISC 2002: 75-89 - Lu Xiao, Howard M. Heys:
Hardware Design and Analysisof Block Cipher Components. ICISC 2002: 164-181 - Sung-Ming Yen, Sang-Jae Moon, JaeCheol Ha:
Hardware Fault Attackon RSA with CRT Revisited. ICISC 2002: 374-388 - Erik Zenner:
On the Efficiency of theClock Control Guessing Attack. ICISC 2002: 200-212