Sold Out
Book Categories |
Cut-&-Paste Attacks with JAVA | 1 | |
Provably Secure Encrypt-then-Sign Composition in Hybrid Signcryption | 16 | |
New DSA-Verifiable Signcryption Schemes | 35 | |
Convertible Group Undeniable Signatures | 48 | |
An Efficient Fail-Stop Signature Scheme Based on Factorization | 62 | |
On the Security of the Li-Hwang-Lee-Tsai Threshold Group Signature Scheme | 75 | |
System Specification Based Network Modeling for Survivability Testing Simulation | 90 | |
A Risk-Sensitive Intrusion Detection Model | 107 | |
Applet Verification Strategies for RAM-Constrained Devices | 118 | |
Sliding Properties of the DES Key Schedule and Potential Extensions to the Slide Attacks | 138 | |
Consistent Differential Patterns of Rijndael | 149 | |
Hardware Design and Analysis of Block Cipher Components | 164 | |
Higher Order Correlation Attacks, XL Algorithm and Cryptanalysis of Toyocrypt | 182 | |
On the Efficiency of the Clock Control Guessing Attack | 200 | |
Balanced Shrinking Generators | 213 | |
On the Universal Hash Functions in Luby-Rackoff Cipher | 226 | |
Threshold MACs | 237 | |
Ideal Threshold Schemes from MDS Codes | 253 | |
New Frobenius Expansions for Elliptic Curves with Efficient Endomorphisms | 264 | |
Efficient Computations of the Tate Pairing for the Large MOV Degrees | 283 | |
Improved Techniques for Fast Exponentiation | 298 | |
Efficient Hardware Multiplicative Inverters | 313 | |
Ways to Enhance Differential Power Analysis | 327 | |
A Simple Power-Analysis (SPA) Attack on Implementations of the AES Key Expansion | 343 | |
A Reject Timing Attack on an IND-CCA2 Public-Key Cryptosystem | 359 | |
Hardware Fault Attack on RSA with CRT Revisited | 374 | |
Receipt-Free Electronic Voting Scheme with a Tamper-Resistant Randomizer | 389 | |
Non-interactive Auction Scheme with Strong Privacy | 407 | |
An Anonymous Buyer-Seller Watermarking Protocol with Anonymity Control | 421 | |
Speeding Up Secure Sessions Establishment on the Internet | 433 | |
On Fairness in Exchange Protocols | 451 | |
A Model for Embedding and Authorizing Digital Signatures in Printed Documents | 465 | |
A Dynamic Group Key Distribution Scheme with Flexible User Join | 478 | |
Efficient Multicast Key Management for Stateless Receivers | 497 | |
Fingerprint Verification System Involving Smart Card | 510 | |
A Fast Fingerprint Matching Algorithm Using Parzen Density Estimation | 525 | |
Author Index | 535 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionInformation Security and Cryptology - ICISC 2002
X
This Item is in Your InventoryInformation Security and Cryptology - ICISC 2002
X
You must be logged in to review the productsX
X
X
Add Information Security and Cryptology - ICISC 2002, This book constitutes the thoroughly refereed post-proceedings of the 5th International Conference on Information Security and Cryptology, ICISC 2002, held in Seoul, Korea in November 2002. The 35 revised full papers presented together with an invited , Information Security and Cryptology - ICISC 2002 to the inventory that you are selling on WonderClubX
X
Add Information Security and Cryptology - ICISC 2002, This book constitutes the thoroughly refereed post-proceedings of the 5th International Conference on Information Security and Cryptology, ICISC 2002, held in Seoul, Korea in November 2002. The 35 revised full papers presented together with an invited , Information Security and Cryptology - ICISC 2002 to your collection on WonderClub |