1. ICICS 1997:
Beijing,
China
Yongfei Han, Tatsuaki Okamoto, Sihan Qing (Eds.):
Information and Communication Security, First International Conference, ICICS'97, Beijing, China, November 11-14, 1997, Proceedings.
Lecture Notes in Computer Science 1334 Springer 1997, ISBN 3-540-63696-X BibTeX
@proceedings{DBLP:conf/icics/1997,
editor = {Yongfei Han and
Tatsuaki Okamoto and
Sihan Qing},
title = {Information and Communication Security, First International Conference,
ICICS'97, Beijing, China, November 11-14, 1997, Proceedings},
booktitle = {ICICS},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {1334},
year = {1997},
isbn = {3-540-63696-X},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
Session 1:
Theoretical Foundations of Security
Session 2:
Secret Sharing
Session 3:
Network Security
Session 4:
Authentication and Identification
Session 5:
Boolean Functions and Stream Ciphers
Session 6:
Security Evaluation
Session 7:
Signatures
Session 8:
Block Ciphers
- John Kelsey, Bruce Schneier, David Wagner:
Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA.
233-246 BibTeX
- Feng Zhu, Bao-An Guo:
A multiplication-addition structure against differential attack.
247-257 BibTeX
- Yasuyoshi Kaneko, Shiho Moriai, Kazuo Ohta:
On strict estimation method of provable security against differential and linear cryptanalysis.
258-268 BibTeX
- Takeshi Shimoyama, Seiichi Amada, Shiho Moriai:
Improved fast software implementation of block ciphers.
269-273 BibTeX
- Mohssen Alabbadi:
Security comments on the Hwang-Chen algebraic-code cryptosystem.
274-281 BibTeX
Session 9:
Public Key Systems 1
Session 10:
Cryptanalysis of Public Key Systems
Session 11:
Subliminal Channels
Session 12:
Public Key Systems 2
Session 13:
Key Recovery/Fair Cryptosystem
Session 14:
Intellectual Property Protection
Session 15:
Protocols
Session 16:
Electronic Commerce
Copyright © Sat May 16 23:19:53 2009
by Michael Ley (ley@uni-trier.de)