|
1 |
An ID-based entity-authentication and authenicated key exchange protocol with ECDSA
박영호;박호상;정수환;
/
Korea Institute of Information Security and Cryptology
, v.12, no.1, pp.3-10,
|
|
2 |
On Design of the Recoverable Cryptosystem in Public Key Infrastructure
최희봉;오수현;홍순좌;원동호;
/
Korea Institute of Information Security and Cryptology
, v.12, no.1, pp.11-20,
|
|
3 |
New Cyclic Difference Sets with Singer Parameters Constructed from d-Homogeneous Functions
노종선;
/
Korea Institute of Information Security and Cryptology
, v.12, no.1, pp.21-32,
|
|
4 |
A Method to Enhance the Security of ZKIP with Weak Keys and Its Application
양대헌;
/
Korea Institute of Information Security and Cryptology
, v.12, no.1, pp.33-42,
|
|
5 |
McEliece Type PKC Based on Algebraic Geometry Code over Hyperelliptic Curve
강보경;한상근;
/
Korea Institute of Information Security and Cryptology
, v.12, no.1, pp.43-54,
|
|
6 |
A Practical Approach Defeating Blackmailing XTR-version Identification protocol
한동국;박혜영;박영호;김창한;임종인;
/
Korea Institute of Information Security and Cryptology
, v.12, no.1, pp.55-66,
|
|
7 |
New Block Encryption Algorithm FRACTAL with Provable Security against DC and LC
김명환;이인석;백유진;김우환;강성우;
/
Korea Institute of Information Security and Cryptology
, v.12, no.1, pp.67-80,
|
|
8 |
An improved method of scalar multiplication on Elliptic Curve Cryptosystems over Small Fields of Odd Characteristic
김용호;박영호;이상진;황정연;김창한;임종인;
/
Korea Institute of Information Security and Cryptology
, v.12, no.1, pp.81-88,
|
|