|
1 |
Modification of Finite Field Based S-box and Its Transform Domain Analysis
Jin, Seok-Yong;Baek, Jong-Min;Song, Hong-Yeop;
/
Korea Institute of Information Security and Cryptology
, v.17, no.3, pp.3-15,
|
|
2 |
Improvement in efficiency on ID-based Delegation Network
Youn, Taek-Young;Jeong, Sang-Tae;Park, Young-Ho;
/
Korea Institute of Information Security and Cryptology
, v.17, no.3, pp.17-25,
|
|
3 |
Analysis for the difficulty of the vector decomposition problem
Kwon, Sae-Ran;Lee, Hyang-Sook;
/
Korea Institute of Information Security and Cryptology
, v.17, no.3, pp.27-33,
|
|
4 |
On the Optimal Key Size of the Even-Mansour Cipher in the Random Function Oracle Model
Sung, Jae-Chul;
/
Korea Institute of Information Security and Cryptology
, v.17, no.3, pp.35-42,
|
|
5 |
A Hybrid Modeling Method for RCS Worm Simulation
Kim, Jung-Sik;Park, Jin-Ho;Cho, Jae-Ik;Choi, Kyoung-Ho;Im, Eul-Gyu;
/
Korea Institute of Information Security and Cryptology
, v.17, no.3, pp.43-53,
|
|
6 |
Certificate Issuing using Proxy Signature and Threshold Signature in Self-initialized Ad Hoc Network
Kang, Jeon-Il;Choi, Young-Geun;Kim, Koon-Soon;Nyang, Dae-Hun;
/
Korea Institute of Information Security and Cryptology
, v.17, no.3, pp.55-67,
|
|
7 |
An Effective Anonymization Management under Delete Operation of Secure Database
Byun, Chang-Woo;Kim, Jae-Whan;Lee, Hyang-Jin;Kang, Yeon-Jung;Park, Seog;
/
Korea Institute of Information Security and Cryptology
, v.17, no.3, pp.69-80,
|
|
8 |
A UMTS Key Agreement Protocol Providing Privacy and Perfect Forward Secrecy
Kim, Dae-Young;Cui, Yong-Gang;Kim, Sana-Jin;Oh, Hee-Kuck;
/
Korea Institute of Information Security and Cryptology
, v.17, no.3, pp.81-90,
|
|
9 |
Authentication Mechanism for Secure Fast Handover in HMIPv6
Kim, Min-Kyoung;Kang, Hyun-Sun;Park, Chang-Seop;
/
Korea Institute of Information Security and Cryptology
, v.17, no.3, pp.91-100,
|
|
10 |
Efficient Non-Cryptographic Protocols for Public key Authentication in Wireless Sensor Network
Mohaisen, Abedelaziz;Maeng, Young-Jae;Nyang, Dae-Hun;
/
Korea Institute of Information Security and Cryptology
, v.17, no.3, pp.101-108,
|
|
11 |
Guess-and-Determine Attack on the Variant of Self Shrinking Generator
Lee, Dong-Hoon;Han, Jae-Woo;Park, Sang-Woo;Park, Je-Hong;
/
Korea Institute of Information Security and Cryptology
, v.17, no.3, pp.109-116,
|
|
12 |
A Blinding-Based Scalar Multiplication Algorithm Secure against Power Analysis Attacks
Kim, Chang-Kyun;Ha, Jae-Cheol;Moon, Sang-Jae;
/
Korea Institute of Information Security and Cryptology
, v.17, no.3, pp.117-121,
|
|