default search action
3. ICISC 2000: Seoul, Korea
- Dongho Won:
Information Security and Cryptology - ICISC 2000, Third International Conference, Seoul, Korea, December 8-9, 2000, Proceedings. Lecture Notes in Computer Science 2015, Springer 2001, ISBN 3-540-41782-6 - Ju-Sung Kang, Seongtaek Chee, Choonsik Park:
A Note on the Higher Order Differential Attack of Block Ciphers with Two-Block Structures. 1-13 - Hidema Tanaka, Chikashi Ishii, Toshinobu Kaneko:
On the Strength of KASUMI without FL Functions against Higher Order Differential Attack. 14-21 - Steve Babbage, Laurent Frisch:
On MISTY1 Higher Order Differential Cryptanalysis. 22-36 - Dong Hyeon Cheon, Seokhie Hong, Sangjin Lee, Sung Jae Lee, Kyung Hwan Park, Seonhee Yoon:
Difference Distribution Attack on DONUT and Improved DONUT. 37-48 - Yuliang Zheng, Xian-Mo Zhang:
New Results on Correlation Immunity. 49-63 - Jung Hee Cheon, Seongtaek Chee:
Elliptic Curves and Resilient Functions. 64-72 - Ted Krovetz, Phillip Rogaway:
Fast Universal Hashing with Small Keys and No Preprocessing: The PolyR Construction. 73-89 - Atsuko Miyaji, Masaki Nakabayashi, Shunzo Takano:
Characterization of Elliptic Curve Traces under FR-Reduction. 90-108 - Olivier Markowitch, Steve Kremer:
A Multi-party Optimistic Non-repudiation Protocol. 109-122 - Byoungcheon Lee, Kwangjo Kim:
Secure Matchmaking Protocol. 123-134 - Takeru Miyazaki:
An Improved Scheme of the Gennaro-Krawczyk-Rabin Undeniable Signature System Based on RSA. 135-149 - Hyun-Jeong Kim, Jong In Lim, Dong Hoon Lee:
Efficient and Secure Member Deletion in Group Signature Schemes. 150-161 - Feng Bao, Robert H. Deng, Peirong Feng:
An Efficient and Practical Scheme for Privacy Protection in the E-Commerce of Digital Goods. 162-170 - Yi Mu, Vijay Varadharajan:
An Internet Anonymous Auction Scheme. 171-182 - Koutarou Suzuki, Kunio Kobayashi, Hikaru Morita:
Efficient Sealed-Bid Auction Using Hash Chain. 183-191 - DongGook Park, Colin Boyd, Ed Dawson:
Micropayments for Wireless Communications. 192-205 - William D. Banks, Daniel Lieman, Igor E. Shparlinski, Van Thuong To:
Cryptographic Applications of Sparse Polynomials over Finite Rings. 206-220 - Chanjoo Chung, Seungbok Choi, Youngchul Choi, Dongho Won:
Efficient Anonymous Fingerprinting of Electronic Information with Improved Automatic Identification of Redistributors. 221-234 - Adam L. Young, Moti Yung:
Hash to the Rescue: Space Minimization for PKI Directories. 235-245 - Jae Seung Lee, Sang-Choon Kim, Seung Won Sohn:
A Design of the Security Evaluation System for Decision Support in the Enterprise Network Security Management. 246-260
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.