default search action
8. ICISC 2005: Seoul, Korea
- Dongho Won, Seungjoo Kim:
Information Security and Cryptology - ICISC 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers. Lecture Notes in Computer Science 3935, Springer 2006, ISBN 3-540-33354-1
Invited Talks
- David Naccache:
National Security, Forensics and Mobile Communications. 1 - Shigeo Tsujii:
Information Security as Interdisciplinary Science Based on Ethics. 2
Key Management and Distributed Cryptography
- Maki Yoshida, Shigeo Mitsunari, Toru Fujiwara:
A Timed-Release Key Management Scheme for Backward Recovery. 3-14 - André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi:
Property-Based Broadcast Encryption for Multi-level Security Policies. 15-31 - Felix Brandt:
Efficient Cryptographic Protocol Design Based on Distributed El Gamal Encryption. 32-47
Authentication and Biometrics
- Woong-Sik Kim, Weon-Hee Yoo, Jang-Hyun Park, Bok-Ki Kim:
An Enhanced Estimation Algorithm for Reconstructing Fingerprint Strip Image. 48-55 - Junbeom Hur, Younho Lee, Seong-Min Hong, Hyunsoo Yoon:
Trust Management for Resilient Wireless Sensor Networks. 56-68 - Vipul Goyal, Abhishek Jain, Jean-Jacques Quisquater:
Improvements to Mitchell's Remote User Authentication Protocol. 69-80 - Shaoquan Jiang, Guang Gong:
Efficient Authenticators with Application to Key Exchange. 81-91
Provable Security and Primitives
- Jacques Patarin, Audrey Montreuil:
Benes and Butterfly Schemes Revisited. 92-116 - Sung-Ming Yen, Lee-Chun Ko, Sang-Jae Moon, JaeCheol Ha:
Relative Doubling Attack Against Montgomery Ladder. 117-128 - Yusuke Naito, Yu Sasaki, Noboru Kunihiro, Kazuo Ohta:
Improved Collision Attack on MD4 with Probability Almost 1. 129-145 - Aaram Yun, Soo Hak Sung, Sangwoo Park, Donghoon Chang, Seokhie Hong, Hong-Su Cho:
Finding Collision on 45-Step HAS-160. 146-155
System/Network Security
- David Molnar, Matt Piotrowski, David Schultz, David A. Wagner:
The Program Counter Security Model: Automatic Detection and Removal of Control-Flow Side Channel Attacks. 156-168 - Changda Wang, Shiguang Ju:
The Dilemma of Covert Channels Searching. 169-174 - Young-Gab Kim, Taek Lee, Hoh Peter In, Yoon Jung Chung, InJung Kim, Doo-Kwon Baik:
A Probabilistic Approach to Estimate the Damage Propagation of Cyber Attacks. 175-185 - Sjouke Mauw, Martijn Oostdijk:
Foundations of Attack Trees. 186-198
Block/Stream Ciphers (I)
- Nicolas T. Courtois, Louis Goubin:
An Algebraic Masking Method to Protect AES Against Power Attacks. 199-209 - Josef Pieprzyk, Xian-Mo Zhang, Jovan Dj. Golic:
Characterisations of Extended Resiliency and Extended Immunity of S-Boxes. 210-228 - Wenling Wu, Wentao Zhang, Dengguo Feng:
Integral Cryptanalysis of Reduced FOX Block Cipher. 229-241 - Kazuhiko Minematsu, Yukiyasu Tsunoo:
Hybrid Symmetric Encryption Using Known-Plaintext Attack-Secure Components. 242-260
Block/Stream Ciphers (II)
- Nicolas T. Courtois:
Cryptanalysis of Sfinks. 261-269 - Bin Zhang, Hongjun Wu, Dengguo Feng, Hong Wang:
Weaknesses of COSvd (2, 128) Stream Cipher. 270-283 - Kazuhiko Minematsu, Yukiyasu Tsunoo:
Expanding Weak PRF with Small Key Size. 284-298 - Jacques Patarin:
On Linear Systems of Equations with Distinct Variables and Small Block Size. 299-321
Efficient Implementations
- Emmanuel López-Trejo, Francisco Rodríguez-Henríquez, Arturo Díaz-Pérez:
An FPGA Implementation of CCM Mode Using AES. 322-334 - Soonhak Kwon, Taekyoung Kwon, Young-Ho Park:
New Architecture for Multiplication in GF(2m) and Comparisons with Normal and Polynomial Basis Multipliers for Elliptic Curve Cryptography. 335-351 - Duhyun Bae, Gwanyeon Kim, Jiho Kim, Sehyun Park, Ohyoung Song:
An Efficient Design of CCMP for Robust Security Network. 352-361
Digital Rights Management
- Gisle Grimen, Christian Mönch, Roger Midtstraum:
Software-Based Copy Protection for Temporal Media During Dissemination and Playback. 362-377 - Grace C.-W. Ting:
Ambiguity Attacks on the Ganic-Eskicioglu Robust DWT-SVD Image Watermarking Scheme. 378-388
Public Key Cryptography
- Joseph K. Liu, Patrick P. Tsang, Duncan S. Wong, Robert W. Zhu:
Universal Custodian-Hiding Verifiable Encryption for Discrete Logarithms. 389-409 - Qianhong Wu, Fangguo Zhang, Willy Susilo, Yi Mu:
An Efficient Static Blind Ring Signature Scheme. 410-423 - Sanjit Chatterjee, Palash Sarkar:
Trading Time for Space: Towards an Efficient IBE Scheme with Short(er) Public Parameters in the Standard Model. 424-440 - Duc-Liem Vo, Kwangjo Kim:
Yet Another Forward Secure Signature from Bilinear Pairings. 441-455
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.