Showing results 4 to 19 of 19
DiLSe: Lattice-Based Secure and Dependable Data Dissemination Scheme for Social Internet of Vehicles Gulati, Amuleen; Aujla, Gagangeet Singh; Chaudhary, Rajat; Kumar, Neeraj; Obaidat, Mohammad; Benslimane, Abderrahim, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.18, no.6, pp.2520 - 2534, 2021-11 |
Enhancements of authenticated multiple key exchange protocol based on bilinear pairings Vo, Duc-Liem; Lee, Hyun-Rok; Yeun, Chan-Yeob; Kim, Kwang-Jo, COMPUTERS & ELECTRICAL ENGINEERING, v.36, pp.155 - 159, 2010-01 |
Improved batch exponentiation Chung, Byungchun; Hur, Junbeom; Kim, Heeyoul; Hong, Seong-Min; Yoon, Hyunsoo, INFORMATION PROCESSING LETTERS, v.109, no.15, pp.832 - 837, 2009-07 |
Lower bounds on generic reductions among discrete logarithm related problems = 이산 대수 관련 문제들 사이의 reduction에 대한 하계link Seo, Dong-Hee; 서동희; et al, 한국과학기술원, 2011 |
Lower bounds on generic reductions among discrete logarithm related problems = 이산 대수 관련 문제들 사이의 reduction에 대한 하계link Seo, Dong-Hee; 서동희; et al, 한국과학기술원, 2011 |
On the bit security of the weak Diffie-Hellman problem Roh, Dong-Young; Hahn, Sang-Geun, INFORMATION PROCESSING LETTERS, v.110, no.18-19, pp.799 - 802, 2010-09 |
On the bit security of the weak Diffie-Hellman problem = Weak Diffie-Hellman 문제의 비트 안전성link Roh, Dong-Young; 노동영; et al, 한국과학기술원, 2011 |
Preimage resistance of LPmkr with r = m-1 Lee, Jooyoung; Park, Je Hong, INFORMATION PROCESSING LETTERS, v.110, no.14-15, pp.602 - 608, 2010-07 |
Proposing a PKI-based electronic national identity card system in sri lanka = PKI 기반의 스리랑카 전자신분증 시스템 제안에 관한 연구link Asuramuni Sanath Wasantha Bandusiri Silva; Sanath; et al, 한국과학기술원, 2014 |
Protecting secret keys with table encoding against power analysis attacks = 부채널 전력 분석 공격에 안전한 테이블 인코딩을 기반으로 하는 비밀키 보호 기법에 관한 연구link Kim, Tae-Sung; 김태성; et al, 한국과학기술원, 2017 |
Providing Receipt-freeness in Mixnet-based Voting Protocols Lee, Byoungcheon; Boyd, Colin; Dawson, Ed; Kim, Kwangjo, 2011-05-04 |
Secure mobile device structure for trust IoT Lee, Yun Kyung; Kim, J.-N.; Lim, K.-S.; Yoon, Hyunsoo, JOURNAL OF SUPERCOMPUTING, v.74, no.12, pp.6646 - 6664, 2018-12 |
Security of permutation-based compression function lp231 Lee, Jooyoung; Kwon, Daesung, INFORMATION PROCESSING LETTERS, v.114, no.7, pp.372 - 381, 2014-07 |
Taxonomy of online game security Ki J.; Cheon J.H.; Kang J.-U.; Kim D., ELECTRONIC LIBRARY, v.22, no.1, pp.65 - 73, 2004 |
모듈라 멱승 연산의 빠른 수행을 위한 덧셈사슬 휴리스틱과 모듈라 곱셈 알고리즘들 = An addition-chain heuristics and modular multiplication algorithms for fast modular exponentiationslink 홍성민; Hong, Seong-Min; et al, 한국과학기술원, 1996 |
비대칭 피스텔 네트웍을 이용한 순열 생성기가 유사 랜덤성을 갖는 조건 분석 = Permutation generators based on unbalanced feistel network : analysis of the condition of pseudorandomnesslink 이광수; Lee, Kwang-Su; et al, 한국과학기술원, 2000 |
Discover