default search action
1. ICISC 1998: Seoul, Korea
- The 1st International Conference on Information Security and Cryptology, ICSCI '98, December 18-19, 1998, Seoul, Korea, Proceedings. Korea Institute of Information Security and Cryptology (KIISC) 1998
Protocols and Architecture
- Ahto Buldas, Peeter Laud:
New linking schemes for digital time-stamping. ICISC 1998: 3-13 - Gary Gaskell, Mark Looi, Ed Dawson, Colin Boyd, Selwyn Russell:
A security architecture for third generation wireless systems. ICISC 1998: 15-32 - Seong-Min Hong, Jun-Bum Shin, H. Lee-Kwang, Hyunsoo Yoon:
A new appraoch to server-aided secret computation. ICISC 1998: 33-45 - Colin Boyd, DongGook Park:
Public key protocols for wireless communications. ICISC 1998: 47-57
Public Key Systems I
- Seungjoo Kim, Soohyun Oh, Dongho Won:
One-time self-certified public keys, revisited. ICISC 1998: 59-69 - Luis Hernández Encinas, Fausto Montoya Vitini, Jaime Muñoz Masqué, Alberto Peinado Domínguez:
Maximal period of orbits of the BBS generator. ICISC 1998: 71-80 - Eun Jeong Lee, Duk Soo Kim, Pil Joong Lee:
Speed-up of arithmetics in Fpm for elliptic curve cryptosystems. ICISC 1998: 81-91
Hash Functions and Block Ciphers
- Jae Woo Yoon, Sang-Uk Shin, Kyung Hyune Rhee:
A secure hash function based on cellular automata. ICISC 1998: 93-105 - William Millan:
Cryptanalysis of the alleged CAVE algorithm. ICISC 1998: 107-119 - Sangwoo Park, Seongtaek Chee, Choonsik Park, Soo Hak Sung:
How to construct balanced Boolean functions with good global avalanche characteristics. ICISC 1998: 121-130 - Yuliang Zheng, Xian-Mo Zhang:
The nonhomomorphicity of S-boxes. ICISC 1998: 131-145
Network Security
- Ernst Georg Haffner, Thomas Engel, Christoph Meinel:
The flood-gate principle - a hybrid approach to a high security solution. ICISC 1998: 147-160 - Jae Woo Yoon, Kyeoung Ju Ha, Chang Gu Kang, Sang Seob Song:
Development of the web security system using a cryptographic token. ICISC 1998: 161-177 - Kazukuni Kobara, Hideki Imai:
A successive carrier-transmission model for narrow-band subliminal channels. ICISC 1998: 179-187 - Byung Kak Lee, Cheol Won Lee, Chung Ho Park, Hong Sub Lee:
A study on appliance of role based access control model using role attributes. ICISC 1998: 189-200
Public Key Systems II
- Marc Gysin:
The discrete logarithm problem for Lucas sequences and a new class of weak RSA Moduli. ICISC 1998: 201-209 - Sachar Paulus, Tsuyoshi Takagi:
A generalization of the Diffie-Hellman problem and related cryptosystems allowing fast decryption. ICISC 1998: 211-220 - Detlef Hühnlein, Andreas Meyer, Tsuyoshi Takagi:
Rabin and RSA analogues based on non-maximal imaginary quadratic orders. ICISC 1998: 221-240
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.