Browse > Article List

논문
1 On the Security of Rijndael-like Structures against Differential and Linear Cryptanalysis
박상우;성수학;지성택;윤이중;임종인; / Korea Institute of Information Security and Cryptology , v.12, no.5, pp.3-14,
2 Design of AES Cryptographic Processor with Modular Round Key Generator
최병윤;박영수;전성익; / Korea Institute of Information Security and Cryptology , v.12, no.5, pp.15-25,
3 A study on Interaction of IKE protocol engine in IPsec System
이형규;나재훈;손승원; / Korea Institute of Information Security and Cryptology , v.12, no.5, pp.27-35,
4 A password-based mutual authentication and key-agreement protocol
박호상;정수환; / Korea Institute of Information Security and Cryptology , v.12, no.5, pp.37-43,
5 A Fast Multiplication Method for Elliptic Curves defined on small finite fields
박영호;정수환; / Korea Institute of Information Security and Cryptology , v.12, no.5, pp.45-51,
6 Implementation of Key Recovery Model based on XML for B2B
김주한;문기영;손승원; / Korea Institute of Information Security and Cryptology , v.12, no.5, pp.53-61,
7 Network Anomaly Detection based on Association among Packets
오상현;이원석; / Korea Institute of Information Security and Cryptology , v.12, no.5, pp.63-73,
8 On the SEA algorithm used in finding secure elliptic curves with an early-abort strategy
정배은;류희수; / Korea Institute of Information Security and Cryptology , v.12, no.5, pp.75-85,
9 Amplified Boomerang Attack against Reduced-Round SHACAL
김종성;문덕재;이원일;홍석희;이상진; / Korea Institute of Information Security and Cryptology , v.12, no.5, pp.87-93,
10 Design of RSA cryptographic circuit for small chip area using refined Montgomery algorithm
김무섭;최용제;김호원;정교일; / Korea Institute of Information Security and Cryptology , v.12, no.5, pp.95-105,