ICICS C

49 papers

YearTitle / Authors
1997A
Satoshi Obana, Kaoru Kurosawa
1997A Trust policy framework.
Audun Jøsang
1997A language for specifying sequences of authorization transformations and its applications.
Yun Bai, Vijay Varadharajan
1997A multiplication-addition structure against differential attack.
Feng Zhu, Bao-An Guo
1997A new and optimal chosen-message attack on RSA-type cryptosystems.
Daniel Bleichenbacher, Marc Joye, Jean-Jacques Quisquater
1997A secure code for recipient watermarking against conspiracy attacks by all users.
Hajime Watanabe, Tadao Kasami
1997An anonymous and undeniable payment scheme.
Liqun Chen, Chris J. Mitchell
1997An effective genetic algorithm for finding highly nonlinear Boolean Functions.
William Millan, Andrew J. Clark, Ed Dawson
1997An implementable scheme for secure delegation of computing and data.
Josep Domingo-Ferrer, Ricardo X. Sanchez del Castillo
1997An improved key stream generator based on the programmable cellular automata.
Miodrag J. Mihaljevic
1997Asymmetric cryptography with S-Boxes.
Jacques Patarin, Louis Goubin
1997Computational learning theoretic cryptanalysis of language theoretic cryptosystems.
Takeshi Koshiba
1997Construction of correlation immune Boolean functions.
Ed Dawson, Chuan-Kun Wu
1997Critical analysis of security in voice hiding techniques.
Liwu Chang, Ira S. Moskowitz
1997Design of a security platform for CORBA based application.
Rakman Choi, Jung-Chan Na, Kwonil Lee, Eunmi Kim, Wooyong Han
1997Digital signature and public key cryptosystems in a prime order subgroup of Z
Colin Boyd
1997Distributed cryptographic function application protocols.
André Postma, Thijs Krol, Egbert Molenkamp
1997Duality of Boolean functions and its cryptographic significance.
Xian-Mo Zhang, Yuliang Zheng, Hideki Imai
1997Efficient construction of secure hyperelliptic discrete logarithm problems.
Jinhui Chao, Nori Matsuda, Shigeo Tsujii
1997Efficient elliptic curve exponentiation.
Atsuko Miyaji, Takatoshi Ono, Henri Cohen
1997Efficient scalable fair cash with off-line extortion prevention.
Holger Peterson, Guillaume Poupard
1997Electronic commerce with secure intelligent trade agent.
Jacobus E. van der Merwe, Sebastiaan H. von Solms
1997Enforcing traceability in software.
Colin Boyd
1997Fault tolerant anonymous channel.
Wakaha Ogata, Kaoru Kurosawa, Kazue Sako, Kazunori Takatani
1997Hiding the Hidden: A software system for concealing ciphertext as innocuous text.
Mark Chapman, George I. Davida
1997Improved fast software implementation of block ciphers.
Takeshi Shimoyama, Seiichi Amada, Shiho Moriai
1997Information and Communication Security, First International Conference, ICICS'97, Beijing, China, November 11-14, 1997, Proceedings
Yongfei Han, Tatsuaki Okamoto, Sihan Qing
1997Making unfair a "fair" blind signature scheme.
Jacques Traoré
1997Minimizing the use of random oracles in authenticated encryption schemes.
Mihir Bellare, Phillip Rogaway
1997Multisender authentication systems with unconditional security.
Keith M. Martin, Reihaneh Safavi-Naini
1997On strict estimation method of provable security against differential and linear cryptanalysis.
Yasuyoshi Kaneko, Shiho Moriai, Kazuo Ohta
1997On the decomposition constructions for perfect secret sharing schemes.
Hung-Min Sun, Bor-Liang Chen
1997On the powerline system.
Paul Camion, Hervé Chabanne
1997On weak RSA-keys produced from Pretty Good Privacy.
Yasuyuki Sakai, Kouichi Sakurai, Hirokazu Ishizuka
1997Proposal of user identification scheme using mouse.
Kenichi Hayashi, Eiji Okamoto, Masahiro Mambo
1997Protocols for issuing public-key certificates over the Internet.
James W. Gray III, Kin Fai Epsilon Ip
1997Proxy signatures, Revisited.
Seungjoo Kim, Sangjoon Park, Dongho Won
1997Publicly verifiable partial key escrow.
Wenbo Mao
1997Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA.
John Kelsey, Bruce Schneier, David A. Wagner
1997Remarks on the multiple assignment secret sharing scheme.
Hossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini
1997Secret sharing in hierarchical groups.
Chris Charnes, Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini
1997Secure document management and distribution in an open network environment.
Antonio Lioy, Fabio Maino, Marco Mezzalama
1997Security comments on the Hwang-Chen algebraic-code cryptosystem.
Mohssen Alabbadi
1997Self-synchronized message randomization methods for subliminal channels.
Kazukuni Kobara, Hideki Imai
1997Stateless connections.
Tuomas Aura, Pekka Nikander
1997Traceable visual cryptography.
Ingrid Biehl, Susanne Wetzel
1997Trapdoor one-way permutations and multivariate polynominals.
Jacques Patarin, Louis Goubin
1997Two efficient RSA multisignature schemes.
Sangjoon Park, Sangwoo Park, Kwangjo Kim, Dongho Won
1997Zero-knowledge proofs of decision power: new protocols and optimal round-complexity.
Giovanni Di Crescenzo, Kouichi Sakurai, Moti Yung