8. ICISC 2005:
Seoul,
Korea
Dongho Won, Seungjoo Kim (Eds.):
Information Security and Cryptology - ICISC 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers.
Lecture Notes in Computer Science 3935 Springer 2006, ISBN 3-540-33354-1 BibTeX
Invited Talks
Key Management and Distributed Cryptography
Authentication and Biometrics
Provable Security and Primitives
- Jacques Patarin, Audrey Montreuil:
Benes and Butterfly Schemes Revisited.
92-116
Electronic Edition (link) BibTeX
- Sung-Ming Yen, Lee-Chun Ko, Sang-Jae Moon, JaeCheol Ha:
Relative Doubling Attack Against Montgomery Ladder.
117-128
Electronic Edition (link) BibTeX
- Yusuke Naito, Yu Sasaki, Noboru Kunihiro, Kazuo Ohta:
Improved Collision Attack on MD4 with Probability Almost 1.
129-145
Electronic Edition (link) BibTeX
- Aaram Yun, Soo Hak Sung, Sangwoo Park, Donghoon Chang, Seokhie Hong, Hong-Su Cho:
Finding Collision on 45-Step HAS-160.
146-155
Electronic Edition (link) BibTeX
System/Network Security
- David Molnar, Matt Piotrowski, David Schultz, David Wagner:
The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks.
156-168
Electronic Edition (link) BibTeX
- Chang-da Wang, Shiguang Ju:
The Dilemma of Covert Channels Searching.
169-174
Electronic Edition (link) BibTeX
- Young-Gab Kim, Taek Lee, Hoh Peter In, Yoon Jung Chung, In-Jung Kim, Doo-Kwon Baik:
A Probabilistic Approach to Estimate the Damage Propagation of Cyber Attacks.
175-185
Electronic Edition (link) BibTeX
- Sjouke Mauw, Martijn Oostdijk:
Foundations of Attack Trees.
186-198
Electronic Edition (link) BibTeX
Block/Stream Ciphers (I)
Block/Stream Ciphers (II)
Efficient Implementations
Digital Rights Management
Public Key Cryptography
Copyright © Sat May 16 23:20:18 2009
by Michael Ley (ley@uni-trier.de)