Sold Out
Book Categories |
Binary tree encryption : constructions and applications | 1 | |
A separable threshold ring signature scheme | 12 | |
On the security of a group signature scheme with forward security | 27 | |
An efficient strong designated verifier signature scheme | 40 | |
Sound computational interpretation of formal encryption with composed keys | 55 | |
On the security of a new variant of OMAC | 67 | |
New methods to construct cheating immune functions | 79 | |
Yet another definition of weak collision resistance and its analysis | 87 | |
Implementation of Tate pairing on hyperelliptic curves of Genus 2 | 97 | |
A general expansion method using efficient endomorphisms | 112 | |
Design of bit parallel multiplier with lower time complexity | 127 | |
Architecture for an elliptic curve scalar multiplication resistant on some side-channel attacks | 139 | |
Efficient scalar multiplication in hyperelliptic curves using a new Frobenius expansion | 152 | |
Adaptive protocol for entity authentication and key agreement in mobile networks | 166 | |
Extended role based access control and procedural restrictions | 184 | |
Layer-based access control model in the manufacturing infrastructure and design automation system | 197 | |
Secure double auction protocols with full privacy protection | 215 | |
Sealed-bid auctions with efficient bids | 230 | |
Providing receipt-freeness in mixnet-based voting protocols | 245 | |
Receipt-free electronic auction schemes using homomorphic encryption | 259 | |
Software watermarking through register allocation : implementation, analysis, and attacks | 274 | |
Analysis of the bounds of linear block codes in watermark channel | 294 | |
Security analysis of some proxy signatures | 305 | |
A more secure and efficacious TTS signature scheme | 320 | |
An efficient revocation algorithm in group signatures | 339 | |
Efficient forward and provably secure ID-based signcryption scheme with public verifiability and public ciphertext authenticity | 352 | |
Group oriented cryptosystems based on linear access structures | 370 | |
A new algorith for searching a consistent set of shares in a threshold scheme with cheaters | 377 | |
Non-interactive deniable ring authentication | 386 | |
Differential cryptanalysis of TEA and XTEA | 402 | |
A complete divide and conquer attack on the Alpha1 stream cipher | 418 | |
New block cipher : ARIA | ||
Truncated differential attacks on 8-round CRYPTON | 446 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionInformation Security and Cryptology - ICISC 2003
X
This Item is in Your InventoryInformation Security and Cryptology - ICISC 2003
X
You must be logged in to review the productsX
X
X
Add Information Security and Cryptology - ICISC 2003, This book constitutes the thoroughly refereed post-proceedings of the 6th International Conference on Information Security and Cryptology, ICISC 2003, held in Seoul, Korea, in November 2003. The 32 revised full papers presented together with an invited, Information Security and Cryptology - ICISC 2003 to the inventory that you are selling on WonderClubX
X
Add Information Security and Cryptology - ICISC 2003, This book constitutes the thoroughly refereed post-proceedings of the 6th International Conference on Information Security and Cryptology, ICISC 2003, held in Seoul, Korea, in November 2003. The 32 revised full papers presented together with an invited, Information Security and Cryptology - ICISC 2003 to your collection on WonderClub |