|
1 |
Role based XML Encryption for Enforcing Access Control Policy
Choi Dong-Hee;Park Seog;
/
Korea Institute of Information Security and Cryptology
, v.15, no.1, pp.3-15,
|
|
2 |
Formal Methodology for Safety Analysis of Security Protocols
Kim Il-Gon;Jeon Chul-Wuk;Kim Hyun-Seok;Choi Jin-Young;Kang In-Hye;
/
Korea Institute of Information Security and Cryptology
, v.15, no.1, pp.17-27,
|
|
3 |
Security Analysis of Software-Oriented Stream Ciphers against Algebraic Attacks
Sung Jaechul;Moon Dukjae;Im Hung-su;Chee Seongtaek;Lee Sangjin;
/
Korea Institute of Information Security and Cryptology
, v.15, no.1, pp.29-40,
|
|
4 |
Two-round ID-based Group Key Agreement Fitted for Pay-TV System
Kim Hyunjue;Nam Junghyun;Kim Seungjoo;Won Dongho;
/
Korea Institute of Information Security and Cryptology
, v.15, no.1, pp.41-55,
|
|
5 |
Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2
Kim Guil;Kim Jongsung;Hong Seokhie;Lee Sangjin;Lim Jongin;
/
Korea Institute of Information Security and Cryptology
, v.15, no.1, pp.57-66,
|
|
6 |
Cryptanalysis of Bresson-Chevassut-Essiari-Pointcheval′s Key Agreement Scheme for Low-Power Mobile Devices
Nam Junghyun;Lee Younggyo;Kim Seungioo;Won Dongho;
/
Korea Institute of Information Security and Cryptology
, v.15, no.1, pp.67-76,
|
|
7 |
Differential Related-Cipher Attacks on Block Ciphers with Flexible Number of Rounds
Sung Jaechul;Kim Jongsung;Lee Changhoon;
/
Korea Institute of Information Security and Cryptology
, v.15, no.1, pp.77-86,
|
|
8 |
Secure Index Searching Schemes for Groups
Park Hyun-A;Byun Jin-Uk;Lee Hyun-Suk;Lee Dong-Hun;
/
Korea Institute of Information Security and Cryptology
, v.15, no.1, pp.87-97,
|
|
9 |
Differential Power Analysis Attack of a Block Cipher ARIA
Seo JungKab;Kim ChangKyun;Ha JaeCheol;Moon SangJae;Park IlHwan;
/
Korea Institute of Information Security and Cryptology
, v.15, no.1, pp.99-107,
|
|