Browse > Article List

논문
1 Role based XML Encryption for Enforcing Access Control Policy
Choi Dong-Hee;Park Seog; / Korea Institute of Information Security and Cryptology , v.15, no.1, pp.3-15,
2 Formal Methodology for Safety Analysis of Security Protocols
Kim Il-Gon;Jeon Chul-Wuk;Kim Hyun-Seok;Choi Jin-Young;Kang In-Hye; / Korea Institute of Information Security and Cryptology , v.15, no.1, pp.17-27,
3 Security Analysis of Software-Oriented Stream Ciphers against Algebraic Attacks
Sung Jaechul;Moon Dukjae;Im Hung-su;Chee Seongtaek;Lee Sangjin; / Korea Institute of Information Security and Cryptology , v.15, no.1, pp.29-40,
4 Two-round ID-based Group Key Agreement Fitted for Pay-TV System
Kim Hyunjue;Nam Junghyun;Kim Seungjoo;Won Dongho; / Korea Institute of Information Security and Cryptology , v.15, no.1, pp.41-55,
5 Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2
Kim Guil;Kim Jongsung;Hong Seokhie;Lee Sangjin;Lim Jongin; / Korea Institute of Information Security and Cryptology , v.15, no.1, pp.57-66,
6 Cryptanalysis of Bresson-Chevassut-Essiari-Pointcheval′s Key Agreement Scheme for Low-Power Mobile Devices
Nam Junghyun;Lee Younggyo;Kim Seungioo;Won Dongho; / Korea Institute of Information Security and Cryptology , v.15, no.1, pp.67-76,
7 Differential Related-Cipher Attacks on Block Ciphers with Flexible Number of Rounds
Sung Jaechul;Kim Jongsung;Lee Changhoon; / Korea Institute of Information Security and Cryptology , v.15, no.1, pp.77-86,
8 Secure Index Searching Schemes for Groups
Park Hyun-A;Byun Jin-Uk;Lee Hyun-Suk;Lee Dong-Hun; / Korea Institute of Information Security and Cryptology , v.15, no.1, pp.87-97,
9 Differential Power Analysis Attack of a Block Cipher ARIA
Seo JungKab;Kim ChangKyun;Ha JaeCheol;Moon SangJae;Park IlHwan; / Korea Institute of Information Security and Cryptology , v.15, no.1, pp.99-107,