References in periodicals archive ?
Yiu, "Identity Based Threshold Ring Signature," Information Security and Cryptology - ICISC 2004, pp.218-232, Dec 2-3, 2004.
Lu, "Cryptanalysis of reduced versions of the HIGHT block cipher from CHES 2006," in Information security and cryptology (ICISC 2007),vol.
Sanders, "Efficient group signatures in the standard model," in Information Security and Cryptology: ICISC 2012, pp.
Karroumi, "Protecting white-box AES with dual ciphers," in Proceedings of the 13th International Conference on Information Security and Cryptology (ICISC 11), K.
Yang, "Truncated differential attacks on 8-round CRYPTON," in Proceedings of the Information Security and Cryptology Conference (ICISC '03), vol.
Information Security and Cryptology," ICISC'03, LNCS, Vol.
 Wenling Wu, Wentao Zhang and Dengguo Feng, "Integral Cryptanalysis of Reduced FOX Block Cipher," Information Security and Cryptology - ICISC 2005, LNCS, vol.
He was the Program Committee Chairman of the 8th International Conference on Information Security and Cryptology (ICISC 2005).
His current research areas include cryptography and theoretical computer science and Cryptology (ICISC 2005).
Sarkar, "Trading time for space: Towards an efficient ibe scheme with short(er) public parameters in the standard model," ICISC, Vol.
Kim, "Receipt-Free Electronic Voting Scheme with a Tamper-Resistant Randomizer," ICISC 2002, LNCS 2587, Springer, pp.
He was an Editor-in-Chief at Korea Institute of Information Security and Cryptology (KIISC, 2002), Program Co-Chair of ICISC (International Conference on Information Security and Cryptology) Program Committee.
Acronyms browser ?
Full browser ?
- ICIS Chemical Business Americas