|
1 |
An efficient sealed-bid auction protocol
신상욱;류희수;
/
Korea Institute of Information Security and Cryptology
, v.12, no.6, pp.3-15,
|
|
2 |
The Most Efficient Extension Field For XTR
한동국;장상운;윤기순;장남수;박영호;김창한;
/
Korea Institute of Information Security and Cryptology
, v.12, no.6, pp.17-28,
|
|
3 |
SPKI/SDSI HTTP Secure Server to support Role-based Access Control & Confidential Communication
이영록;김민수;김용민;노봉남;이형효;
/
Korea Institute of Information Security and Cryptology
, v.12, no.6, pp.29-46,
|
|
4 |
A Multi-Level Access Control Scheme on Dynamic Multicast Services
신동명;박희운;최용락;
/
Korea Institute of Information Security and Cryptology
, v.12, no.6, pp.47-58,
|
|
5 |
Multiple Linear Cryptanalysis-Revisited
Choi, Jun;Hong, Deuk-Jo;Hong, Seok-Hee;Lee, Sang-Jin;Im, Jong-In;
/
Korea Institute of Information Security and Cryptology
, v.12, no.6, pp.59-69,
|
|
6 |
Hybrid Cryptosystem providing Implicit Authentication for sender
Oh, Soo-Hyun;Kwak, Jin;Won, Dong-Ho;
/
Korea Institute of Information Security and Cryptology
, v.12, no.6, pp.71-80,
|
|
7 |
Digital Signature Schemes with Restriction on Signing Capability
황정연;이동훈;임종인;
/
Korea Institute of Information Security and Cryptology
, v.12, no.6, pp.81-92,
|
|
8 |
ELKH, Efficient Group Key Management Protocol Using One-Way Function and XOR
권정옥;황정연;김현정;이동훈;임종인;
/
Korea Institute of Information Security and Cryptology
, v.12, no.6, pp.93-112,
|
|
9 |
Efficiency in the Password-based Authenticated Key Exchange
황정연;홍석희;박혜영;장상운;박영호;류희수;
/
Korea Institute of Information Security and Cryptology
, v.12, no.6, pp.113-124,
|
|
10 |
An Efficient Method Defeating Blackmailing Using Blind XTR-DSA Scheme
박혜영;한동국;이동훈;이상진;임종인;
/
Korea Institute of Information Security and Cryptology
, v.12, no.6, pp.125-135,
|
|