ISC C

39 papers

YearTitle / Authors
2002A Distributed and Computationally Secure Key Distribution Scheme.
Vanesa Daza, Javier Herranz, Carles Padró, Germán Sáez
2002A New Design of Privilege Management Infrastructure for Organizations Using Outsourced PKI.
Ed Dawson, Javier López, José A. Montenegro, Eiji Okamoto
2002A New Offline Privacy Protecting E-cash System with Revokable Anonymity.
Weidong Qiu, Kefei Chen, Dawu Gu
2002A New Public Key Cryptosystem for Constrained Hardware.
Jiande Zheng
2002A Nyberg-Rueppel Signature for Multiple Messages and Its Batch Verification.
Shunsuke Araki
2002A Provably Secure Additive and Multiplicative Privacy Homomorphism.
Josep Domingo-Ferrer
2002A Realistic Protocol for Multi-party Certified Electronic Mail.
Josep-Lluís Ferrer-Gomila, Magdalena Payeras-Capellà, Llorenç Huguet i Rotger
2002A Second-Order DPA Attack Breaks a Window-Method Based Countermeasure against Side Channel Attacks.
Katsuyuki Okeya, Kouichi Sakurai
2002Algorithms for Efficient Simultaneous Elliptic Scalar Multiplication with Reduced Joint Hamming Weight Representation of Scalars.
Yasuyuki Sakai, Kouichi Sakurai
2002An Access Control Model for Tree Data Structures.
Alban Gabillon, Manuel Munier, Jean-Jacques Bascou, Laurent Gallon, Emmanuel Bruno
2002An Anonymous Loan System Based on Group Signature Scheme.
Rie Shigetomi, Akira Otsuka, Takahide Ogawa, Hideki Imai
2002An Attack on a Protocol for Certified Delivery.
José R. M. Monteiro, Ricardo Dahab
2002An Efficient Dynamic and Distributed Cryptographic Accumulator.
Michael T. Goodrich, Roberto Tamassia, Jasminka Hasic
2002Automated Analysis of Some Security Mechanisms of SCEP.
Fabio Martinelli, Marinella Petrocchi, Anna Vaccarelli
2002Certification of Public Keys within an Identity Based System.
Liqun Chen, Keith Harrison, Andrew Moss, David Soldera, Nigel P. Smart
2002Comments to the UNCITRAL Model Law on Electronic Signatures.
Apollònia Martínez Nadal, Josep-Lluís Ferrer-Gomila
2002Comparative Analysis of the Hardware Implementations of Hash Functions SHA-1 and SHA-512.
Tim Grembowski, Roar Lien, Kris Gaj, Nghi Nguyen, Peter Bellows, Jaroslav Flidr, Tom Lehman, Brian Schott
2002Conditional Cryptographic Delegation for P2P Data Sharing.
Yuji Watanabe, Masayuki Numao
2002Efficient Bit Serial Multiplication Using Optimal Normal Bases of Type II in GF (2
Soonhak Kwon, Heuisu Ryu
2002Efficient Mental Card Shuffling via Optimised Arbitrary-Sized Benes Permutation Network.
Wai Han Soo, Azman Samsudin, Alwyn Goh
2002Exclusion-Freeness in Multi-party Exchange Protocols.
Nicolás González-Deleito, Olivier Markowitch
2002Fast Software Implementations of SC2000.
Helger Lipmaa
2002Fingerprinting Concatenated Codes with Efficient Identification.
Marcel Fernandez, Miguel Soriano
2002Implementation of Chosen-Ciphertext Attacks against PGP and GnuPG.
Kahil Jallad, Jonathan Katz, Bruce Schneier
2002Information Security, 5th International Conference, ISC 2002 Sao Paulo, Brazil, September 30 - October 2, 2002, Proceedings
Agnes Hui Chan, Virgil D. Gligor
2002Intrusion Detection with Support Vector Machines and Generative Models.
John S. Baras, Maben Rabi
2002Inversion/Division Systolic Architecture for Public-Key Cryptosystems in GF(2
Nam-Yeun Kim, Dae-Ghon Kho, Kee-Young Yoo
2002Oblivious Counter and Majority Protocol.
Hiroaki Kikuchi
2002On Optimal Hash Tree Traversal for Interval Time-Stamping.
Helger Lipmaa
2002On the Difficulty of Protecting Private Keys in Software.
Taekyoung Kwon
2002Parallelizable Elliptic Curve Point Multiplication Method with Resistance against Side-Channel Attacks.
Bodo Möller
2002Password Authenticated Key Exchange Based on RSA for Imbalanced Wireless Networks.
Feng Zhu, Duncan S. Wong, Agnes Hui Chan, Robbie Ye
2002Proofs of Knowledge for Non-monotone Discrete-Log Formulae and Applications.
Emmanuel Bresson, Jacques Stern
2002Quantifying Privacy Leakage through Answering Database Queries.
Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang, Jeremy K.-P. Chen
2002Real-Time Intruder Tracing through Self-Replication.
Heejin Jang, Sangwook Kim
2002Receipt-Free Sealed-Bid Auction.
Masayuki Abe, Koutarou Suzuki
2002Role-Based Access Control for E-commerce Sea-of-Data Applications.
Guillermo Navarro, Sergi Robles, Joan Borrell
2002Small and High-Speed Hardware Architectures for the 3GPP Standard Cipher KASUMI.
Akashi Satoh, Sumio Morioka
2002Traceability Schemes for Signed Documents.
Shoko Yonezawa, Goichiro Hanaoka, Junji Shikata, Hideki Imai