Browse > Article List

논문
1 Modification of Finite Field Based S-box and Its Transform Domain Analysis
Jin, Seok-Yong;Baek, Jong-Min;Song, Hong-Yeop; / Korea Institute of Information Security and Cryptology , v.17, no.3, pp.3-15,
2 Improvement in efficiency on ID-based Delegation Network
Youn, Taek-Young;Jeong, Sang-Tae;Park, Young-Ho; / Korea Institute of Information Security and Cryptology , v.17, no.3, pp.17-25,
3 Analysis for the difficulty of the vector decomposition problem
Kwon, Sae-Ran;Lee, Hyang-Sook; / Korea Institute of Information Security and Cryptology , v.17, no.3, pp.27-33,
4 On the Optimal Key Size of the Even-Mansour Cipher in the Random Function Oracle Model
Sung, Jae-Chul; / Korea Institute of Information Security and Cryptology , v.17, no.3, pp.35-42,
5 A Hybrid Modeling Method for RCS Worm Simulation
Kim, Jung-Sik;Park, Jin-Ho;Cho, Jae-Ik;Choi, Kyoung-Ho;Im, Eul-Gyu; / Korea Institute of Information Security and Cryptology , v.17, no.3, pp.43-53,
6 Certificate Issuing using Proxy Signature and Threshold Signature in Self-initialized Ad Hoc Network
Kang, Jeon-Il;Choi, Young-Geun;Kim, Koon-Soon;Nyang, Dae-Hun; / Korea Institute of Information Security and Cryptology , v.17, no.3, pp.55-67,
7 An Effective Anonymization Management under Delete Operation of Secure Database
Byun, Chang-Woo;Kim, Jae-Whan;Lee, Hyang-Jin;Kang, Yeon-Jung;Park, Seog; / Korea Institute of Information Security and Cryptology , v.17, no.3, pp.69-80,
8 A UMTS Key Agreement Protocol Providing Privacy and Perfect Forward Secrecy
Kim, Dae-Young;Cui, Yong-Gang;Kim, Sana-Jin;Oh, Hee-Kuck; / Korea Institute of Information Security and Cryptology , v.17, no.3, pp.81-90,
9 Authentication Mechanism for Secure Fast Handover in HMIPv6
Kim, Min-Kyoung;Kang, Hyun-Sun;Park, Chang-Seop; / Korea Institute of Information Security and Cryptology , v.17, no.3, pp.91-100,
10 Efficient Non-Cryptographic Protocols for Public key Authentication in Wireless Sensor Network
Mohaisen, Abedelaziz;Maeng, Young-Jae;Nyang, Dae-Hun; / Korea Institute of Information Security and Cryptology , v.17, no.3, pp.101-108,
11 Guess-and-Determine Attack on the Variant of Self Shrinking Generator
Lee, Dong-Hoon;Han, Jae-Woo;Park, Sang-Woo;Park, Je-Hong; / Korea Institute of Information Security and Cryptology , v.17, no.3, pp.109-116,
12 A Blinding-Based Scalar Multiplication Algorithm Secure against Power Analysis Attacks
Kim, Chang-Kyun;Ha, Jae-Cheol;Moon, Sang-Jae; / Korea Institute of Information Security and Cryptology , v.17, no.3, pp.117-121,