|
1 |
A fast scalar multiplication on elliptic curves
박영호;한동국;오상호;이상진;임종인;주학수;
/
Korea Institute of Information Security and Cryptology
, v.12, no.2, pp.3-10,
|
|
2 |
New Cyclic Relative Difference Sets Constructed from d-Homogeneous Functions with Difference-balanced Property
김상효;노종선;
/
Korea Institute of Information Security and Cryptology
, v.12, no.2, pp.11-20,
|
|
3 |
Implementation of RSA modular exponentiator using Division Chain
김성두;정용진;
/
Korea Institute of Information Security and Cryptology
, v.12, no.2, pp.21-34,
|
|
4 |
Implementation of RSA Exponentiator Based on Radix- Modular Multiplication Algorithm
권택원;최준림;
/
Korea Institute of Information Security and Cryptology
, v.12, no.2, pp.35-44,
|
|
5 |
Semi-systolic Architecture over GF
이형목;전준철;유기영;김현성;
/
Korea Institute of Information Security and Cryptology
, v.12, no.2, pp.45-52,
|
|
6 |
An Efficient Hardware Implementation of AES Rijndael Block Cipher Algorithm
안하기;신경욱;
/
Korea Institute of Information Security and Cryptology
, v.12, no.2, pp.53-64,
|
|
7 |
Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC'98
장동훈;성재철;이상진;임종인;성수학;
/
Korea Institute of Information Security and Cryptology
, v.12, no.2, pp.65-76,
|
|
8 |
Design and Implementation of High-Speed Certification Path Discovery on Enterprise PKI
유종덕;이주남;이구연;
/
Korea Institute of Information Security and Cryptology
, v.12, no.2, pp.77-87,
|
|
9 |
A Group Key Management Architecture in Mobile Network Environments
박영호;
/
Korea Institute of Information Security and Cryptology
, v.12, no.2, pp.89-100,
|
|
10 |
A Study on Standards for Performance Evaluation of Biometric Recognition Systems
문지현;김학일;
/
Korea Institute of Information Security and Cryptology
, v.12, no.2, pp.101-110,
|
|
11 |
Integrated Security Manager with AgEnt-based vulnerability scanner automatically generating vulnerability analysis code(ISMAEL)
김수용;서정석;조상현;김한성;차성덕;
/
Korea Institute of Information Security and Cryptology
, v.12, no.2, pp.111-122,
|
|
12 |
A Study on Secure Kerberos Authentication using Trusted Authority in Network Structure
신광철;정진욱;
/
Korea Institute of Information Security and Cryptology
, v.12, no.2, pp.123-133,
|
|
13 |
A Secure Active Packet Transfer using Cryptographic Techniques
김영수;나중찬;손승원;
/
Korea Institute of Information Security and Cryptology
, v.12, no.2, pp.135-145,
|
|
14 |
On the security of SFLASH
정배은;류희수;
/
Korea Institute of Information Security and Cryptology
, v.12, no.2, pp.147-152,
|
|
15 |
A Study of Secure Mobile Multicast Architecture and Protocol based on Adaptive Service Mode
안재영;구자범;박세현;이재일;
/
Korea Institute of Information Security and Cryptology
, v.12, no.2, pp.153-172,
|
|