Browse > Article List

논문
1 An efficient sealed-bid auction protocol
신상욱;류희수; / Korea Institute of Information Security and Cryptology , v.12, no.6, pp.3-15,
2 The Most Efficient Extension Field For XTR
한동국;장상운;윤기순;장남수;박영호;김창한; / Korea Institute of Information Security and Cryptology , v.12, no.6, pp.17-28,
3 SPKI/SDSI HTTP Secure Server to support Role-based Access Control & Confidential Communication
이영록;김민수;김용민;노봉남;이형효; / Korea Institute of Information Security and Cryptology , v.12, no.6, pp.29-46,
4 A Multi-Level Access Control Scheme on Dynamic Multicast Services
신동명;박희운;최용락; / Korea Institute of Information Security and Cryptology , v.12, no.6, pp.47-58,
5 Multiple Linear Cryptanalysis-Revisited
Choi, Jun;Hong, Deuk-Jo;Hong, Seok-Hee;Lee, Sang-Jin;Im, Jong-In; / Korea Institute of Information Security and Cryptology , v.12, no.6, pp.59-69,
6 Hybrid Cryptosystem providing Implicit Authentication for sender
Oh, Soo-Hyun;Kwak, Jin;Won, Dong-Ho; / Korea Institute of Information Security and Cryptology , v.12, no.6, pp.71-80,
7 Digital Signature Schemes with Restriction on Signing Capability
황정연;이동훈;임종인; / Korea Institute of Information Security and Cryptology , v.12, no.6, pp.81-92,
8 ELKH, Efficient Group Key Management Protocol Using One-Way Function and XOR
권정옥;황정연;김현정;이동훈;임종인; / Korea Institute of Information Security and Cryptology , v.12, no.6, pp.93-112,
9 Efficiency in the Password-based Authenticated Key Exchange
황정연;홍석희;박혜영;장상운;박영호;류희수; / Korea Institute of Information Security and Cryptology , v.12, no.6, pp.113-124,
10 An Efficient Method Defeating Blackmailing Using Blind XTR-DSA Scheme
박혜영;한동국;이동훈;이상진;임종인; / Korea Institute of Information Security and Cryptology , v.12, no.6, pp.125-135,