default search action
5. ICISC 2002: Seoul, Korea
- Pil Joong Lee, Chae Hoon Lim:
Information Security and Cryptology - ICISC 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers. Lecture Notes in Computer Science 2587, Springer 2003, ISBN 3-540-00716-4
Invited Talk
- Serge Lefranc, David Naccache:
Cut-&-Paste Attacks with JAVA. 1-15
Digital Signatures
- Ik Rae Jeong, Hee Yun Jeong, Hyun Sook Rhee, Dong Hoon Lee, Jong In Lim:
Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption. 16-34 - Jun-Bum Shin, Kwangsu Lee, Kyungah Shim:
New DSA-Verifiable Signcryption Schemes. 35-47 - Yuh-Dauh Lyuu, Ming-Luen Wu:
Convertible Group Undeniable Signatures. 48-61 - Willy Susilo, Reihaneh Safavi-Naini:
An Efficient Fail-Stop Signature Scheme Based on Factorization. 62-74 - Guilin Wang:
On the Security of the Li-Hwang-Lee-Tsai Threshold Group Signature Scheme. 75-89
Internet Security
- HyungJong Kim:
System Specification Based Network Modeling for Survivability Testing Simulation. 90-106 - Hai Jin, Jianhua Sun, Hao Chen, Zongfen Han:
A Risk-Sensitive Intrusion Detection Model. 107-117 - Nils Maltesson, David Naccache, Elena Trichina, Christophe Tymen:
Applet Verification Strategiesfor RAM-Constrained Devices. 118-137
Block/Stream Ciphers
- Raphael Chung-Wei Phan, Soichi Furuya:
Sliding Properties of the DES Key Schedule and Potential Extensions to the Slide Attacks. 138-148 - Beomsik Song, Jennifer Seberry:
Consistent Differential Patterns of Rijndael. 149-163 - Lu Xiao, Howard M. Heys:
Hardware Design and Analysisof Block Cipher Components. 164-181 - Nicolas T. Courtois:
Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt. 182-199
Stream Ciphers & Other Primitives
- Erik Zenner:
On the Efficiency of theClock Control Guessing Attack. 200-212 - Se Ah Choi, Kyeongcheol Yang:
Balanced Shrinking Generators. 213-225 - Tetsu Iwata, Kaoru Kurosawa:
On the Universal Hash Functionsin Luby-Rackoff Cipher. 226-236 - Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild:
Threshold MACs. 237-252 - Josef Pieprzyk, Xian-Mo Zhang:
Ideal Threshold Schemes from MDS Codes. 253-263
Efficient Implementations
- Tae-Jun Park, Mun-Kyu Lee, Kunsoo Park:
New Frobenius Expansions for Elliptic Curves with Efficient Endomorphisms. 264-282 - Tetsuya Izu, Tsuyoshi Takagi:
Efficient Computations of the Tate Pairingfor the Large MOV Degrees. 283-297 - Bodo Möller:
Improved Techniques for Fast Exponentiation. 298-312 - Hyun-Gyu Kim, Hyeong-Cheol Oh:
Efficient Hardware Multiplicative Inverters. 313-326
Side-Channel Attacks
- Régis Bevan, Erik Knudsen:
Ways to Enhance Differential Power Analysis. 327-342 - Stefan Mangard:
A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion. 343-358 - Kouichi Sakurai, Tsuyoshi Takagi:
A Reject Timing Attackon an IND-CCA2 Public-Key Cryptosystem. 359-373 - Sung-Ming Yen, Sang-Jae Moon, JaeCheol Ha:
Hardware Fault Attackon RSA with CRT Revisited. 374-388
Cryptographic Protocols I
- Byoungcheon Lee, Kwangjo Kim:
Receipt-Free Electronic Voting Scheme with a Tamper-Resistant Randomizer. 389-406 - Kun Peng, Colin Boyd, Ed Dawson, Kapali Viswanathan:
Non-interactive Auction Schemewith Strong Privacy. 407-420 - Hak Soo Ju, Hyun-Jeong Kim, Dong Hoon Lee, Jong In Lim:
An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control. 421-432 - Yaron Sella:
Speeding Up Secure Sessions Establishment on the Internet. 433-450
Cryptographic Protocols II
- Olivier Markowitch, Dieter Gollmann, Steve Kremer:
On Fairness in Exchange Protocols. 451-464 - Jaeil Lee, Taekyoung Kwon, Sanghoon Song, JooSeok Song:
A Model for Embedding and Authorizing Digital Signatures in Printed Documents. 465-477 - Hartono Kurnio, Luke McAven, Reihaneh Safavi-Naini, Huaxiong Wang:
A Dynamic Group Key Distribution Scheme with Flexible User Join. 478-496 - JuHee Ki, Hyun-Jeong Kim, Dong Hoon Lee, Chang-Seop Park:
Efficient Multicast Key Management for Stateless Receivers. 497-509
Biometrics
- Youn-Hee Gil, Daesung Moon, Sung Bum Pan, Yongwha Chung:
Fingerprint Verification System Involving Smart Card. 510-524 - Choonwoo Ryu, Hakil Kim:
A Fast Fingerprint Matching Algorithm Using Parzen Density Estimation. 525-533
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.