6. ICISC 2003:
Seoul,
Korea
Jong In Lim, Dong Hoon Lee (Eds.):
Information Security and Cryptology - ICISC 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers.
Lecture Notes in Computer Science 2971 Springer 2004, ISBN 3-540-21376-7 BibTeX
@proceedings{DBLP:conf/icisc/2003,
editor = {Jong In Lim and
Dong Hoon Lee},
title = {Information Security and Cryptology - ICISC 2003, 6th International
Conference, Seoul, Korea, November 27-28, 2003, Revised Papers},
booktitle = {ICISC},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {2971},
year = {2004},
isbn = {3-540-21376-7},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
- Jonathan Katz:
Binary Tree Encryption: Constructions and Applications.
1-11
Electronic Edition (link) BibTeX
- Joseph K. Liu, Victor K. Wei, Duncan S. Wong:
A Separable Threshold Ring Signature Scheme.
12-26
Electronic Edition (link) BibTeX
- Guilin Wang:
On the Security of a Group Signature Scheme with Forward Security.
27-39
Electronic Edition (link) BibTeX
- Shahrokh Saeednia, Steve Kremer, Olivier Markowitch:
An Efficient Strong Designated Verifier Signature Scheme.
40-54
Electronic Edition (link) BibTeX
- Peeter Laud, Ricardo Corin:
Sound Computational Interpretation of Formal Encryption with Composed Keys.
55-66
Electronic Edition (link) BibTeX
- Tetsu Iwata, Kaoru Kurosawa:
On the Security of a New Variant of OMAC.
67-78
Electronic Edition (link) BibTeX
- Wen Ping Ma, Moon Ho Lee:
New Methods to Construct Cheating Immune Functions.
79-86
Electronic Edition (link) BibTeX
- Shoichi Hirose:
Yet Another Definition of Weak Collision Resistance and Its Analysis.
87-96
Electronic Edition (link) BibTeX
- YoungJu Choie, Eunjeong Lee:
Implementation of Tate Pairing on Hyperelliptic Curves of Genus 2.
97-111
Electronic Edition (link) BibTeX
- Tae-Jun Park, Mun-Kyu Lee, E-yong Kim, Kunsoo Park:
A General Expansion Method Using Efficient Endomorphisms.
112-126
Electronic Edition (link) BibTeX
- Seon Ok Lee, Seok Won Jung, Chang Han Kim, Janghong Yoon, Jae-Young Koh, Daeho Kim:
Design of Bit Parallel Multiplier with Lower Time Complexity.
127-139
Electronic Edition (link) BibTeX
- Joong Chul Yoon, Seok Won Jung, Sungwoo Lee:
Architecture for an Elliptic Curve Scalar Multiplication Resistant to Some Side-Channel Attacks.
139-151
Electronic Edition (link) BibTeX
- Tae-Jun Park, Mun-Kyu Lee, Kunsoo Park:
Efficient Scalar Multiplication in Hyperelliptic Curves Using A New Frobenius Expansion.
152-165
Electronic Edition (link) BibTeX
- Muxiang Zhang:
Adaptive Protocol for Entity Authentication and Key Agreement in Mobile Networks.
166-183
Electronic Edition (link) BibTeX
- Wook Shin, Dong-Ik Lee, Hyoung-Chun Kim, Jung-Min Kang, Jin-Seok Lee:
Extended Role Based Access Control and Procedural Restrictions.
184-196
Electronic Edition (link) BibTeX
- Yuan Zhang, Moon-Jung Chung, Hyun Kim:
Layer-Based Access Control Model in the Manufacturing Infrastructure and Design Automation System.
197-214
Electronic Edition (link) BibTeX
- Changjie Wang, Ho-fung Leung, Yumin Wang:
Secure Double Auction Protocols with Full Privacy Protection.
215-229
Electronic Edition (link) BibTeX
- Toru Nakanishi, Daisuke Yamamoto, Yuji Sugiyama:
Sealed-Bid Auctions with Efficient Bids.
230-244
Electronic Edition (link) BibTeX
- Byoungcheon Lee, Colin Boyd, Ed Dawson, Kwangjo Kim, Jeongmo Yang, Seungjae Yoo:
Providing Receipt-Freeness in Mixnet-Based Voting Protocols.
245-258
Electronic Edition (link) BibTeX
- Xiaofeng Chen, Byoungcheon Lee, Kwangjo Kim:
Receipt-Free Electronic Auction Schemes Using Homomorphic Encryption.
259-273
Electronic Edition (link) BibTeX
- Ginger Myles, Christian S. Collberg:
Software Watermarking Through Register Allocation: Implementation, Analysis, and Attacks.
274-293
Electronic Edition (link) BibTeX
- Limin Gu, Jiwu Huang, Zewen Chen:
Analysis of the Bounds for Linear Block Codes in Watermark Channel.
294-304
Electronic Edition (link) BibTeX
- Guilin Wang, Feng Bao, Jianying Zhou, Robert H. Deng:
Security Analysis of Some Proxy Signatures.
305-319
Electronic Edition (link) BibTeX
- Jiun-Ming Chen, Bo-Yin Yang:
A More Secure and Efficacious TTS Signature Scheme.
320-338
Electronic Edition (link) BibTeX
- Zewen Chen, Jilin Wang, Yumin Wang, Jiwu Huang, Daren Huang:
An Efficient Revocation Algorithm in Group Signatures.
339-351
Electronic Edition (link) BibTeX
- Sherman S. M. Chow, Siu-Ming Yiu, Lucas Chi Kwong Hui, K. P. Chow:
Efficient Forward and Provably Secure ID-Based Signcryption Scheme with Public Verifiability and Public Ciphertext Authenticity.
352-369
Electronic Edition (link) BibTeX
- Wen Ping Ma, Moon Ho Lee:
Group Oriented Cryptosystems Based on Linear Access Structures.
370-376
Electronic Edition (link) BibTeX
- Raylin Tso, Ying Miao, Eiji Okamoto:
A New Algorithm for Searching a Consistent Set of Shares in a Threshold Scheme with Cheaters.
377-385
Electronic Edition (link) BibTeX
- Willy Susilo, Yi Mu:
Non-interactive Deniable Ring Authentication.
386-401
Electronic Edition (link) BibTeX
- Seokhie Hong, Deukjo Hong, Youngdai Ko, Donghoon Chang, Wonil Lee, Sangjin Lee:
Differential Cryptanalysis of TEA and XTEA.
402-417
Electronic Edition (link) BibTeX
- Kevin Chen, Leonie Ruth Simpson, Matthew Henricksen, William Millan, Ed Dawson:
A Complete Divide and Conquer Attack on the Alpha1 Stream Cipher.
418-431
Electronic Edition (link) BibTeX
- Daesung Kwon, Jaesung Kim, Sangwoo Park, Soo Hak Sung, Yaekwon Sohn, Jung Hwan Song, Yongjin Yeom, E-Joong Yoon, Sangjin Lee, Jaewon Lee, Seongtaek Chee, Daewan Han, Jin Hong:
New Block Cipher: ARIA.
432-445
Electronic Edition (link) BibTeX
- Jongsung Kim, Seokhie Hong, Sangjin Lee, Jung Hwan Song, Hyungjin Yang:
Truncated Differential Attacks on 8-Round CRYPTON.
446-456
Electronic Edition (link) BibTeX
Copyright © Sat May 16 23:20:18 2009
by Michael Ley (ley@uni-trier.de)