|
1 |
An Anonymous Rights Trading System using group signature schemes
주학수;김대엽;이동훈;
/
Korea Institute of Information Security and Cryptology
, v.14, no.1, pp.3-13,
|
|
2 |
Secure Steganographic Algorithm against Statistical analyses
유정재;오승철;이광수;이상진;박일환;
/
Korea Institute of Information Security and Cryptology
, v.14, no.1, pp.15-23,
|
|
3 |
An assurance level and product type based evaluation effort model for CC evaluation
Choi, Sang-Soo;Choi, Seung;Lee, Wan-Seok;Lee, Kang-Soo;
/
Korea Institute of Information Security and Cryptology
, v.14, no.1, pp.25-34,
|
|
4 |
A Study on the Covert Channel Detection in the TCP/IP Header based on the Support Vector Machine
손태식;서정우;서정택;문종섭;최홍민;
/
Korea Institute of Information Security and Cryptology
, v.14, no.1, pp.35-45,
|
|
5 |
Chosen Message Attack Against Goldreich-Goldwasser-Halevi's Lattice Based Signature Scheme
DaeHun Nyang;
/
Korea Institute of Information Security and Cryptology
, v.14, no.1, pp.47-57,
|
|
6 |
Efficient Password-based Group Key Exchange Protocol
황정연;최규영;이동훈;백종명;
/
Korea Institute of Information Security and Cryptology
, v.14, no.1, pp.59-69,
|
|
7 |
Algebraic Attacks on Summation Generators
Lee, Dong-Hoon;Kim, Jae-Heon;Han, Jae-Woo;Hong, Jin;Moon, Duk-Jae;
/
Korea Institute of Information Security and Cryptology
, v.14, no.1, pp.71-77,
|
|
8 |
Design of a Secure and Fast Handoff Method for Mobile If with AAA Infrastructure
김현곤;
/
Korea Institute of Information Security and Cryptology
, v.14, no.1, pp.79-89,
|
|
9 |
Improved Result on the Pseudorandomness of SPN-type transformations
이원일;
/
Korea Institute of Information Security and Cryptology
, v.14, no.1, pp.91-99,
|
|
10 |
Construction of UOWHF based on Block Cipher
이원일;
/
Korea Institute of Information Security and Cryptology
, v.14, no.1, pp.101-111,
|
|
11 |
An Algorithm For Reducing Round Bound of Parallel Exponentiation
김윤정;
/
Korea Institute of Information Security and Cryptology
, v.14, no.1, pp.113-119,
|
|