Publications
Search

Publications :: Search

Show venue

On this page you see the details of the selected venue.

    Conference
    Name: Information, Security and Cryptology - ICISC 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers 2010
    URL: https://doi.org/10.1007/978-3-642-14423-3
    DBLP: db/conf/icisc/icisc2009.html
    Bookmark:

    Below you find the publications assigned to this venue.

    Show item 1 to 10 of 25  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Deukjo Hong, Bonwook Koo, Yu Sasaki.
    Improved Preimage Attack for 68-Step HAS-160.
    Information, Security and Cryptology - ICISC 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers 2010 (0) 2009
    Conference paper
    M. Choudary Gorantla, Colin Boyd, Juan Manuel González Nieto, Mark Manulis.
    Generic One Round Group Key Exchange in the Standard Model.
    Information, Security and Cryptology - ICISC 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers 2010 (0) 2009
    Conference paper
    Axel Poschmann, Matthew J. B. Robshaw, Frank Vater, Christof Paar.
    Lightweight Cryptography and RFID: Tackling the Hidden Overheads.
    Information, Security and Cryptology - ICISC 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers 2010 (0) 2009
    Conference paper
    Aivo Jürgenson, Jan Willemson.
    Serial Model for Attack Tree Computations.
    Information, Security and Cryptology - ICISC 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers 2010 (0) 2009
    Conference paper
    Amir Moradi 0001, Thomas Eisenbarth, Axel Poschmann, Christof Paar.
    Power Analysis of Single-Rail Storage Elements as Used in MDPL.
    Information, Security and Cryptology - ICISC 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers 2010 (0) 2009
    Conference paper
    Alessandro Sorniotti, Refik Molva.
    Secret Handshakes with Revocation Support.
    Information, Security and Cryptology - ICISC 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers 2010 (0) 2009
    Conference paper
    Ahmad-Reza Sadeghi, Thomas Schneider, Immo Wehrenberg.
    Efficient Privacy-Preserving Face Recognition.
    Information, Security and Cryptology - ICISC 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers 2010 (0) 2009
    Conference paper
    Helger Lipmaa.
    First CPIR Protocol with Data-Dependent Computation.
    Information, Security and Cryptology - ICISC 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers 2010 (0) 2009
    Conference paper
    Shuang Wu, Dengguo Feng, Wenling Wu.
    Practical Rebound Attack on 12-Round Cheetah-256.
    Information, Security and Cryptology - ICISC 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers 2010 (0) 2009
    Conference paper
    Madeline González Muñiz, Rainer Steinwandt.
    Cryptanalysis of a Message Recognition Protocol by Mashatan and Stinson.
    Information, Security and Cryptology - ICISC 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers 2010 (0) 2009
    Show item 1 to 10 of 25  

    Your query returned 25 matches in the database.