Browse > Article List

논문
1 The Design and Implementation of Module supporting Trusted Channel in Secure Operating System Environment
유준석;임재덕;나재훈;손승원; / Korea Institute of Information Security and Cryptology , v.14, no.3, pp.3-12,
2 Key Exchange Protocols for Domestic Broadband Satellite Access Network
오흥룡;염흥열; / Korea Institute of Information Security and Cryptology , v.14, no.3, pp.13-25,
3 Research on Applying Code Signing Technology to National PKI
Lee, Rae;Lee, Dong-Hoon; / Korea Institute of Information Security and Cryptology , v.14, no.3, pp.27-40,
4 The Optimal Normal Elements for Massey-Omura Multiplier
김창규; / Korea Institute of Information Security and Cryptology , v.14, no.3, pp.41-48,
5 An Anonymous asymmetric public key traitor tracing scheme
최은영;이동훈;홍도원; / Korea Institute of Information Security and Cryptology , v.14, no.3, pp.49-61,
6 An Efficient Authentication Scheme for Multicast Packet using Recovery Layer
홍기훈;정수환; / Korea Institute of Information Security and Cryptology , v.14, no.3, pp.63-73,
7 Related Key Differential Attacks on 32-Round GOST
이태건;고영대;홍석희;이상진; / Korea Institute of Information Security and Cryptology , v.14, no.3, pp.75-84,
8 A Methodology for CC-based Security Requirements Analysis and Specification by using Misuse Case Model
최상수;장세진;최명길;이강수; / Korea Institute of Information Security and Cryptology , v.14, no.3, pp.85-100,
9 Dynamic Simulation on a Network Security Simulator using SSFNet
박응기;윤주범;임을규; / Korea Institute of Information Security and Cryptology , v.14, no.3, pp.101-106,
10 Impossible Differential Attack on 30-Round SHACAL-2
홍석희;김종성;김구일;이창훈;성재철;이상진; / Korea Institute of Information Security and Cryptology , v.14, no.3, pp.107-115,
11 Saturation Attacks on the reduced 5-round KASUMI
이제상;이창훈;이상진;임종인; / Korea Institute of Information Security and Cryptology , v.14, no.3, pp.118-124,
12 A Study on PKI Mechanisms with distributed CA for IEEE 802.15.3 High Rate WPAN
박정우;양대헌;송주석; / Korea Institute of Information Security and Cryptology , v.14, no.3, pp.125-135,
13 Efficient security mechanism in 3GPP-WLAN interworking
신상욱; / Korea Institute of Information Security and Cryptology , v.14, no.3, pp.137-144,
14 Secure Oblivious Transfer Protocol-based Digital Fingerprinting Against Conspiracy Attack
최재귀;박지환;김태석; / Korea Institute of Information Security and Cryptology , v.14, no.3, pp.145-153,