이전페이지 이동
  A New Lattice Attack on NTRU Cryptosystem    
2005, Vol.8, No.1, Pages 197-205, Daewan Han
 
  Quantum key distribution based on conference key agreement    
2005, Vol.8, No.1, Pages 189-195, Dong Pyo Chi, Sora Choi, Soojoon Lee
 
  An Authenticated Certificateless Public Key Encryption Scheme    
2005, Vol.8, No.1, Pages 177-187, Young-Ran Lee, Hyang-Sook Lee
 
  Cryptanalysis of ElGamal Type Digital Signature Schemes Using Integer Decomposition    
2005, Vol.8, No.1, Pages 167-175, Ikkwon Yie
 
  A Property for Cryptography based on Infinite Groups    
2005, Vol.8, No.1, Pages 155-166, Eonkyung Lee
 
  Secure quantum communication for secret sharing    
2005, Vol.8, No.1, Pages 145-154, Dong Pyo Chi, Sora Choi, Jaewan Kim, Soojoon Lee
 
  Algebraic Attacks on Stream Ciphers (survey)    
2005, Vol.8, No.1, Pages 133-143, Dong Hoon Lee
 
  A New {ID}-based Signature with Batch Verification    
2005, Vol.8, No.1, Pages 119-131, Jung Hee Cheon, Yongdae Kim,Hyo Jin Yoon
 
  Integral Cryptanalysis and Higher Order Differential Attack    
2005, Vol.8, No.1, Pages 101-118, Yongjin Yeom
 
  Compression for Trace Zero Subgroups of Elliptic Curves    
2005, Vol.8, No.1, Pages 93-100, A. Silverberg
 
  Efficient mechanism for the setup of UE-initiated tunnels in 3GPP-WLAN interworking    
2005, Vol.8, No.1, Pages 77-85, Sang Uk Shin
 
  On fairness in online purchase of physical goods (Extended Abstract)    
2005, Vol.8, No.1, Pages 87-92, Jun-Bum Shin
 
  The Condition of XSL for a Block Cipher    
2005, Vol.8, No.1, Pages 69-75, Bon Wook Koo, Hwanseok Jang, Junghwan Song
 
  Differential Power Attack and Masking Method    
2005, Vol.8, No.1, Pages 53-67, Yoo-Jin Baek, Mi-Jung Noh
 
  Accountable Signatures    
2005, Vol.8, No.1, Pages 29-43, Jung Hee Cheon, Woo-Hwan Kim, Hyojin Yoon
 
  Privacy-Enhanced Public-Key Certificate]{Privacy-Enhanced Public-Key Certificate: How to Embed an Individual's Sensitive Information into a Certificate    
2005, Vol.8, No.1, Pages 21-28, Seungjoo Kim, Dongho Won
 
  Decomposition of an integer for efficient implementation of Elliptic Curve Cryptosystem    
2005, Vol.8, No.1, Pages 45-51, Young-Ho Park
 
  Design of block ciphers and coding theory    
2005, Vol.8, No.1, Pages 13-20, Daesung Kwon, Soo Hak Sung, Jung Hwan Song, Sangwoo Park
 
  Security frameworks for pseudorandom number generators    
2005, Vol.8, No.1, Pages 1-11, Ju-Sung Kang
 
PC버전
Information Center for Mathematical Sciences KAIST
305-701 대전광역시 유성구 대학로 291 (구성동373-1)
한국과학기술원(KAIST) 수리과학정보센터
전화 042-350-8195~6 / 팩스 042-350-5722
e-mail : mathnet@mathnet.or.kr
Copyright (C) 2011. ICMS All Rights Reserved.