|
1 |
Secure Steganography Using a Block Cipher
유정재;김종현;박종혁;양우일;이상진;
/
Korea Institute of Information Security and Cryptology
, v.13, no.3, pp.1-15,
|
|
2 |
A Study on Analysis and Development of Education Program in Information Security Major
양정모;이옥연;이형우;하재철;유승재;이민섭;
/
Korea Institute of Information Security and Cryptology
, v.13, no.3, pp.17-26,
|
|
3 |
Design of Serial-Parallel Multiplier for GF( )
정석원;윤중철;이선옥;
/
Korea Institute of Information Security and Cryptology
, v.13, no.3, pp.27-34,
|
|
4 |
A Random M-ary Method-Based Countermeasure against Power Analysis Attacks on ECC
안만기;하재철;이훈재;문상재;
/
Korea Institute of Information Security and Cryptology
, v.13, no.3, pp.35-43,
|
|
5 |
Design of Wireless LAM Authentication Mechanism for Fast Handoff Service based on PKI
정종민;이주남;이구연;
/
Korea Institute of Information Security and Cryptology
, v.13, no.3, pp.45-55,
|
|
6 |
A Fast Scalar Multiplication to Resist again t Power Attacks by Folding the Scalar in Half
하재철;곽동진;문상재;
/
Korea Institute of Information Security and Cryptology
, v.13, no.3, pp.57-64,
|
|
7 |
A Scalar Multiplication Method and its Hardware with resistance to SPA(Simple Power Analysis)
윤중철;정석원;임종인;
/
Korea Institute of Information Security and Cryptology
, v.13, no.3, pp.65-70,
|
|
8 |
Implementation of Real-time Wireless Remote Control System Based on Public Key Infrastructure
이문구;
/
Korea Institute of Information Security and Cryptology
, v.13, no.3, pp.71-79,
|
|
9 |
The host-based Intrusion Detection System with Audit Correlation
황현욱;김민수;노봉남;
/
Korea Institute of Information Security and Cryptology
, v.13, no.3, pp.81-90,
|
|
10 |
Secure Electronic Trading System for Online Game-Items
정윤경;기준백;천정희;
/
Korea Institute of Information Security and Cryptology
, v.13, no.3, pp.91-99,
|
|
11 |
Tree-based Group Key Agreement Protocol using Pairing
이상원;천정희;김용대;
/
Korea Institute of Information Security and Cryptology
, v.13, no.3, pp.101-110,
|
|
12 |
Proxy Signatures based on XTR Cryptosystem
이재욱;전동호;최영근;김순자;
/
Korea Institute of Information Security and Cryptology
, v.13, no.3, pp.111-117,
|
|
13 |
Impossible Differential Cryptanalysis for Block Cipher Structures
김종성;홍석희;이상진;임종인;은희천;
/
Korea Institute of Information Security and Cryptology
, v.13, no.3, pp.119-127,
|
|
14 |
More Efficient Hierarchical ID-based Cryptosystem
김태구;염대현;이필중;
/
Korea Institute of Information Security and Cryptology
, v.13, no.3, pp.129-134,
|
|
15 |
An Aggregate Detection of Event Correlation using Fuzzy Control
김용민;
/
Korea Institute of Information Security and Cryptology
, v.13, no.3, pp.135-144,
|
|