Browse > Article List

논문
1 A fast scalar multiplication on elliptic curves
박영호;한동국;오상호;이상진;임종인;주학수; / Korea Institute of Information Security and Cryptology , v.12, no.2, pp.3-10,
2 New Cyclic Relative Difference Sets Constructed from d-Homogeneous Functions with Difference-balanced Property
김상효;노종선; / Korea Institute of Information Security and Cryptology , v.12, no.2, pp.11-20,
3 Implementation of RSA modular exponentiator using Division Chain
김성두;정용진; / Korea Institute of Information Security and Cryptology , v.12, no.2, pp.21-34,
4 Implementation of RSA Exponentiator Based on Radix-$2^k$ Modular Multiplication Algorithm
권택원;최준림; / Korea Institute of Information Security and Cryptology , v.12, no.2, pp.35-44,
5 $AB^2$ Semi-systolic Architecture over GF$GF(2^m)$
이형목;전준철;유기영;김현성; / Korea Institute of Information Security and Cryptology , v.12, no.2, pp.45-52,
6 An Efficient Hardware Implementation of AES Rijndael Block Cipher Algorithm
안하기;신경욱; / Korea Institute of Information Security and Cryptology , v.12, no.2, pp.53-64,
7 Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC'98
장동훈;성재철;이상진;임종인;성수학; / Korea Institute of Information Security and Cryptology , v.12, no.2, pp.65-76,
8 Design and Implementation of High-Speed Certification Path Discovery on Enterprise PKI
유종덕;이주남;이구연; / Korea Institute of Information Security and Cryptology , v.12, no.2, pp.77-87,
9 A Group Key Management Architecture in Mobile Network Environments
박영호; / Korea Institute of Information Security and Cryptology , v.12, no.2, pp.89-100,
10 A Study on Standards for Performance Evaluation of Biometric Recognition Systems
문지현;김학일; / Korea Institute of Information Security and Cryptology , v.12, no.2, pp.101-110,
11 Integrated Security Manager with AgEnt-based vulnerability scanner automatically generating vulnerability analysis code(ISMAEL)
김수용;서정석;조상현;김한성;차성덕; / Korea Institute of Information Security and Cryptology , v.12, no.2, pp.111-122,
12 A Study on Secure Kerberos Authentication using Trusted Authority in Network Structure
신광철;정진욱; / Korea Institute of Information Security and Cryptology , v.12, no.2, pp.123-133,
13 A Secure Active Packet Transfer using Cryptographic Techniques
김영수;나중찬;손승원; / Korea Institute of Information Security and Cryptology , v.12, no.2, pp.135-145,
14 On the security of SFLASH
정배은;류희수; / Korea Institute of Information Security and Cryptology , v.12, no.2, pp.147-152,
15 A Study of Secure Mobile Multicast Architecture and Protocol based on Adaptive Service Mode
안재영;구자범;박세현;이재일; / Korea Institute of Information Security and Cryptology , v.12, no.2, pp.153-172,