Publications
Search

Publications :: Search

Show venue

On this page you see the details of the selected venue.

    Conference
    Name: Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers 2012
    URL: https://doi.org/10.1007/978-3-642-31912-9
    DBLP: db/conf/icisc/icisc2011.html
    Bookmark:

    Below you find the publications assigned to this venue.

    Show item 1 to 10 of 32  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Daehyun Strobel, Christof Paar.
    An Efficient Method for Eliminating Random Delays in Power Traces of Embedded Software.
    Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers 2012 (0) 2011
    Conference paper
    Fangming Zhao, Takashi Nishide, Kouichi Sakurai.
    Multi-User Keyword Search Scheme for Secure Data Sharing with Fine-Grained Access Control.
    Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers 2012 (0) 2011
    Conference paper
    Teruya Minamoto, Ryuji Ohura.
    A Blind Digital Image Watermarking Method Based on the Dual-Tree Complex Discrete Wavelet Transform and Interval Arithmetic.
    Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers 2012 (0) 2011
    Conference paper
    Haibo Tian, Xiaofeng Chen 0001, Zhengtao Jiang, Yusong Du.
    Non-delegatable Strong Designated Verifier Signature on Elliptic Curves.
    Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers 2012 (0) 2011
    Conference paper
    Keita Emura, Atsuko Miyaji, Kazumasa Omote.
    A Revocable Group Signature Scheme with the Property of Hiding the Number of Revoked Users.
    Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers 2012 (0) 2011
    Conference paper
    Song Luo, Qingni Shen, Zhong Chen.
    Fully Secure Unidirectional Identity-Based Proxy Re-encryption.
    Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers 2012 (0) 2011
    Conference paper
    Yusong Du, Fangguo Zhang, Meicheng Liu.
    On the Resistance of Boolean Functions against Fast Algebraic Attacks.
    Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers 2012 (0) 2011
    Conference paper
    Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida.
    Compression Functions Using a Dedicated Blockcipher for Lightweight Hashing.
    Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers 2012 (0) 2011
    Conference paper
    Yu Sasaki, Kazumaro Aoki.
    Improved Integral Analysis on Tweaked Lesamnta.
    Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers 2012 (0) 2011
    Conference paper
    Deukjo Hong, Bonwook Koo, Daesung Kwon.
    Biclique Attack on the Full HIGHT.
    Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30 - December 2, 2011. Revised Selected Papers 2012 (0) 2011
    Show item 1 to 10 of 32  

    Your query returned 32 matches in the database.