|
1 |
On the Security of Rijndael-like Structures against Differential and Linear Cryptanalysis
박상우;성수학;지성택;윤이중;임종인;
/
Korea Institute of Information Security and Cryptology
, v.12, no.5, pp.3-14,
|
|
2 |
Design of AES Cryptographic Processor with Modular Round Key Generator
최병윤;박영수;전성익;
/
Korea Institute of Information Security and Cryptology
, v.12, no.5, pp.15-25,
|
|
3 |
A study on Interaction of IKE protocol engine in IPsec System
이형규;나재훈;손승원;
/
Korea Institute of Information Security and Cryptology
, v.12, no.5, pp.27-35,
|
|
4 |
A password-based mutual authentication and key-agreement protocol
박호상;정수환;
/
Korea Institute of Information Security and Cryptology
, v.12, no.5, pp.37-43,
|
|
5 |
A Fast Multiplication Method for Elliptic Curves defined on small finite fields
박영호;정수환;
/
Korea Institute of Information Security and Cryptology
, v.12, no.5, pp.45-51,
|
|
6 |
Implementation of Key Recovery Model based on XML for B2B
김주한;문기영;손승원;
/
Korea Institute of Information Security and Cryptology
, v.12, no.5, pp.53-61,
|
|
7 |
Network Anomaly Detection based on Association among Packets
오상현;이원석;
/
Korea Institute of Information Security and Cryptology
, v.12, no.5, pp.63-73,
|
|
8 |
On the SEA algorithm used in finding secure elliptic curves with an early-abort strategy
정배은;류희수;
/
Korea Institute of Information Security and Cryptology
, v.12, no.5, pp.75-85,
|
|
9 |
Amplified Boomerang Attack against Reduced-Round SHACAL
김종성;문덕재;이원일;홍석희;이상진;
/
Korea Institute of Information Security and Cryptology
, v.12, no.5, pp.87-93,
|
|
10 |
Design of RSA cryptographic circuit for small chip area using refined Montgomery algorithm
김무섭;최용제;김호원;정교일;
/
Korea Institute of Information Security and Cryptology
, v.12, no.5, pp.95-105,
|
|