Browse > Article List

논문
1 An Anonymous Rights Trading System using group signature schemes
주학수;김대엽;이동훈; / Korea Institute of Information Security and Cryptology , v.14, no.1, pp.3-13,
2 Secure Steganographic Algorithm against Statistical analyses
유정재;오승철;이광수;이상진;박일환; / Korea Institute of Information Security and Cryptology , v.14, no.1, pp.15-23,
3 An assurance level and product type based evaluation effort model for CC evaluation
Choi, Sang-Soo;Choi, Seung;Lee, Wan-Seok;Lee, Kang-Soo; / Korea Institute of Information Security and Cryptology , v.14, no.1, pp.25-34,
4 A Study on the Covert Channel Detection in the TCP/IP Header based on the Support Vector Machine
손태식;서정우;서정택;문종섭;최홍민; / Korea Institute of Information Security and Cryptology , v.14, no.1, pp.35-45,
5 Chosen Message Attack Against Goldreich-Goldwasser-Halevi's Lattice Based Signature Scheme
DaeHun Nyang; / Korea Institute of Information Security and Cryptology , v.14, no.1, pp.47-57,
6 Efficient Password-based Group Key Exchange Protocol
황정연;최규영;이동훈;백종명; / Korea Institute of Information Security and Cryptology , v.14, no.1, pp.59-69,
7 Algebraic Attacks on Summation Generators
Lee, Dong-Hoon;Kim, Jae-Heon;Han, Jae-Woo;Hong, Jin;Moon, Duk-Jae; / Korea Institute of Information Security and Cryptology , v.14, no.1, pp.71-77,
8 Design of a Secure and Fast Handoff Method for Mobile If with AAA Infrastructure
김현곤; / Korea Institute of Information Security and Cryptology , v.14, no.1, pp.79-89,
9 Improved Result on the Pseudorandomness of SPN-type transformations
이원일; / Korea Institute of Information Security and Cryptology , v.14, no.1, pp.91-99,
10 Construction of UOWHF based on Block Cipher
이원일; / Korea Institute of Information Security and Cryptology , v.14, no.1, pp.101-111,
11 An Algorithm For Reducing Round Bound of Parallel Exponentiation
김윤정; / Korea Institute of Information Security and Cryptology , v.14, no.1, pp.113-119,