4. ICISC 2001:
Seoul,
Korea
Kwangjo Kim (Ed.):
Information Security and Cryptology - ICISC 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings.
Lecture Notes in Computer Science 2288 Springer 2002, ISBN 3-540-43319-8 BibTeX
@proceedings{DBLP:conf/icisc/2001,
editor = {Kwangjo Kim},
title = {Information Security and Cryptology - ICISC 2001, 4th International
Conference Seoul, Korea, December 6-7, 2001, Proceedings},
booktitle = {ICISC},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {2288},
year = {2002},
isbn = {3-540-43319-8},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
- David Pointcheval:
Practical Security in Public-Key Cryptography.
1-17
Electronic Edition (Springer LINK) BibTeX
- Beomsik Song, Huaxiong Wang, Jennifer Seberry:
A New Cryptanalytic Method Using the Distribution Characteristics of Substitution Distances.
18-31
Electronic Edition (Springer LINK) BibTeX
- Seonhee Lee, Seokhie Hong, Sangjin Lee, Jongin Lim, Seonhee Yoon:
Truncated Differential Cryptanalysis of Camellia.
32-38
Electronic Edition (Springer LINK) BibTeX
- Jung Hee Cheon, MunJu Kim, Kwangjo Kim, Jung-Yeun Lee, SungWoo Kang:
Improved Impossible Differential Cryptanalysis of Rijndael and Crypton.
39-49
Electronic Edition (Springer LINK) BibTeX
- Sabine Leveiller, Joseph Boutros, Philippe Guillot, Gilles Zémor:
Cryptanalysis of Nonlinear Filter Generators with {0, 1}-Metric Viterbi Decoding.
50
Electronic Edition (Springer LINK) BibTeX
- Johannes Buchmann, Kouichi Sakurai, Tsuyoshi Takagi:
An IND-CCA2 Public-Key Cryptosystem with Fast Decryption.
51-71
Electronic Edition (Springer LINK) BibTeX
- Dug-Hwan Choi, Seungbok Choi, Dongho Won:
Improvement of Probabilistic Public Key Cryptosystems Using Discrete Logarithm.
72-80
Electronic Edition (Springer LINK) BibTeX
- Mototsugu Nishioka, Hisayoshi Satoh, Kouichi Sakurai:
Design and Analysis of Fast Provably Secure Public-Key Cryptosystems Based on a Modular Squaring.
81-102
Electronic Edition (Springer LINK) BibTeX
- Jaechul Sung, Sangjin Lee, Jong In Lim, Wonil Lee, Okyeon Yi:
Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation.
103-113
Electronic Edition (Springer LINK) BibTeX
- Christopher Krügel, Thomas Toth, Clemens Kerer:
Decentralized Event Correlation for Intrusion Detection.
114-131
Electronic Edition (Springer LINK) BibTeX
- Vorapranee Khu-smith, Chris J. Mitchell:
Enhancing the Security of Cookies.
132-145
Electronic Edition (Springer LINK) BibTeX
- Yang-Seo Choi, Dong-il Seo, Sung Won Sohn:
A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation.
146-159
Electronic Edition (Springer LINK) BibTeX
- Hartono Kurnio, Reihaneh Safavi-Naini, Huaxiong Wang:
Efficient Revocation Schemes for Secure Multicast.
160-177
Electronic Edition (Springer LINK) BibTeX
- Gérard D. Cohen, Simon Litsyn, Gilles Zémor:
Binary Codes for Collusion-Secure Fingerprinting.
178-185
Electronic Edition (Springer LINK) BibTeX
- Jaroslaw Pastuszak, Darek Michalek, Josef Pieprzyk:
Copyright Protection of Object-Oriented Software.
186-199
Electronic Edition (Springer LINK) BibTeX
- Hyejoung Yoo, Kwangsoo Lee, Sangjin Lee, Jongin Lim:
Off-Line Authentication Using Watermarks.
200-213
Electronic Edition (Springer LINK) BibTeX
- Soichi Furuya:
Slide Attacks with a Known-Plaintext Cryptanalysis.
214-225
Electronic Edition (Springer LINK) BibTeX
- Josef Pieprzyk, Xian-Mo Zhang:
Constructions of Cheating Immune Secret Sharing.
226-243
Electronic Edition (Springer LINK) BibTeX
- Clemente Galdi, Pino Persiano:
Private Computation with Shared Randomness over Broadcast Channel.
244-257
Electronic Edition (Springer LINK) BibTeX
- Nicolás González-Deleito, Olivier Markowitch:
An Optimistic Multi-party Fair Exchange Protocol with Reduced Trust Requirements.
258-267
Electronic Edition (Springer LINK) BibTeX
- Supakorn Kungpisdan, Yongyuth Permpoontanalarp:
Practical Reasoning about Accountability in Electronic Commerce Protocols.
268-284
Electronic Edition (Springer LINK) BibTeX
- Ron Steinfeld, Laurence Bull, Yuliang Zheng:
Content Extraction Signatures.
285-304
Electronic Edition (Springer LINK) BibTeX
- Dae Hyun Yum, Pil Joong Lee:
New Signcryption Schemes Based on KCDSA.
305-317
Electronic Edition (Springer LINK) BibTeX
- Jinho Kim, Kwangjo Kim, Chulsoo Lee:
An Efficient and Provably Secure Threshold Blind Signature.
318-327
Electronic Edition (Springer LINK) BibTeX
- Kei Kawauchi, Hiroshi Minato, Atsuko Miyaji, Mitsuru Tada:
A Multi-signature Scheme with Signers' Intentions Secure against Active Attacks.
328-340
Electronic Edition (Springer LINK) BibTeX
- André Weimerskirch, Gilles Thonet:
A Distributed Light-Weight Authentication Model for Ad-hoc Networks.
341-354
Electronic Edition (Springer LINK) BibTeX
- Stelvio Cimato:
Design of an Authentication Protocol for Gsm Javacards.
355-368
Electronic Edition (Springer LINK) BibTeX
- Richard Au, Mark Looi, Paul Ashley, Loo Tang Seet:
Secure Authorisation Agent for Cross-Domain Access Control in a Mobile Computing Environment.
369-381
Electronic Edition (Springer LINK) BibTeX
- Joan Mir, Joan Borrell:
Protecting General Flexible Itineraries of Mobile Agents.
382-396
Electronic Edition (Springer LINK) BibTeX
- Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon:
RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis.
397-413
Electronic Edition (Springer LINK) BibTeX
- Sung-Ming Yen, Seungjoo Kim, Seongan Lim, Sang-Jae Moon:
A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack.
414-427
Electronic Edition (Springer LINK) BibTeX
- Katsuyuki Okeya, Kunihiko Miyazaki, Kouichi Sakurai:
A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks.
428-439
Electronic Edition (Springer LINK) BibTeX
- Kouichi Itoh, Masahiko Takenaka, Naoya Torii:
DPA Countermeasure Based on the "Masking Method".
440-456
Electronic Edition (Springer LINK) BibTeX
Copyright © Sat May 16 23:20:17 2009
by Michael Ley (ley@uni-trier.de)