Browse > Article List

논문
1 An ID-based entity-authentication and authenicated key exchange protocol with ECDSA
박영호;박호상;정수환; / Korea Institute of Information Security and Cryptology , v.12, no.1, pp.3-10,
2 On Design of the Recoverable Cryptosystem in Public Key Infrastructure
최희봉;오수현;홍순좌;원동호; / Korea Institute of Information Security and Cryptology , v.12, no.1, pp.11-20,
3 New Cyclic Difference Sets with Singer Parameters Constructed from d-Homogeneous Functions
노종선; / Korea Institute of Information Security and Cryptology , v.12, no.1, pp.21-32,
4 A Method to Enhance the Security of ZKIP with Weak Keys and Its Application
양대헌; / Korea Institute of Information Security and Cryptology , v.12, no.1, pp.33-42,
5 McEliece Type PKC Based on Algebraic Geometry Code over Hyperelliptic Curve
강보경;한상근; / Korea Institute of Information Security and Cryptology , v.12, no.1, pp.43-54,
6 A Practical Approach Defeating Blackmailing XTR-version Identification protocol
한동국;박혜영;박영호;김창한;임종인; / Korea Institute of Information Security and Cryptology , v.12, no.1, pp.55-66,
7 New Block Encryption Algorithm FRACTAL with Provable Security against DC and LC
김명환;이인석;백유진;김우환;강성우; / Korea Institute of Information Security and Cryptology , v.12, no.1, pp.67-80,
8 An improved method of scalar multiplication on Elliptic Curve Cryptosystems over Small Fields of Odd Characteristic
김용호;박영호;이상진;황정연;김창한;임종인; / Korea Institute of Information Security and Cryptology , v.12, no.1, pp.81-88,