Browse by Subject Cryptography

Showing results 1 to 19 of 19

1
A Noise-Shaped Signaling Method for Vehicle-to-Everything Security

Park, Dongryul; Ahn, Jangyong; Choe, Chungjae; Woo, Seongho; Ahn, Seungyoung; Choi, Junsung, IEEE ACCESS, v.9, pp.75385 - 75397, 2021-05

2
CAFE: A Virtualization-Based Approach to Protecting Sensitive Cloud Application Logic Confidentiality

Park, Sungjin; Kim, Chung Hwan; Rhee, Junghwan; Won, Jong-Jin; Han, Taisook; Xu, Dongyan, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.17, no.4, pp.883 - 897, 2020-07

3
CREMON: Cryptography Embedded on the Convolutional Neural Network Accelerator

Choi, Yeongjae; Sim, Jaehyeong; Kim, Lee-Sup, IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, v.67, no.12, pp.3337 - 3341, 2020-12

4
DiLSe: Lattice-Based Secure and Dependable Data Dissemination Scheme for Social Internet of Vehicles

Gulati, Amuleen; Aujla, Gagangeet Singh; Chaudhary, Rajat; Kumar, Neeraj; Obaidat, Mohammad; Benslimane, Abderrahim, IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, v.18, no.6, pp.2520 - 2534, 2021-11

5
Enhancements of authenticated multiple key exchange protocol based on bilinear pairings

Vo, Duc-Liem; Lee, Hyun-Rok; Yeun, Chan-Yeob; Kim, Kwang-Jo, COMPUTERS & ELECTRICAL ENGINEERING, v.36, pp.155 - 159, 2010-01

6
Improved batch exponentiation

Chung, Byungchun; Hur, Junbeom; Kim, Heeyoul; Hong, Seong-Min; Yoon, Hyunsoo, INFORMATION PROCESSING LETTERS, v.109, no.15, pp.832 - 837, 2009-07

7
Lower bounds on generic reductions among discrete logarithm related problems = 이산 대수 관련 문제들 사이의 reduction에 대한 하계link

Seo, Dong-Hee; 서동희; et al, 한국과학기술원, 2011

8
Lower bounds on generic reductions among discrete logarithm related problems = 이산 대수 관련 문제들 사이의 reduction에 대한 하계link

Seo, Dong-Hee; 서동희; et al, 한국과학기술원, 2011

9
On the bit security of the weak Diffie-Hellman problem

Roh, Dong-Young; Hahn, Sang-Geun, INFORMATION PROCESSING LETTERS, v.110, no.18-19, pp.799 - 802, 2010-09

10
On the bit security of the weak Diffie-Hellman problem = Weak Diffie-Hellman 문제의 비트 안전성link

Roh, Dong-Young; 노동영; et al, 한국과학기술원, 2011

11
Preimage resistance of LPmkr with r = m-1

Lee, Jooyoung; Park, Je Hong, INFORMATION PROCESSING LETTERS, v.110, no.14-15, pp.602 - 608, 2010-07

12
Proposing a PKI-based electronic national identity card system in sri lanka = PKI 기반의 스리랑카 전자신분증 시스템 제안에 관한 연구link

Asuramuni Sanath Wasantha Bandusiri Silva; Sanath; et al, 한국과학기술원, 2014

13
Protecting secret keys with table encoding against power analysis attacks = 부채널 전력 분석 공격에 안전한 테이블 인코딩을 기반으로 하는 비밀키 보호 기법에 관한 연구link

Kim, Tae-Sung; 김태성; et al, 한국과학기술원, 2017

14
Providing Receipt-freeness in Mixnet-based Voting Protocols

Lee, Byoungcheon; Boyd, Colin; Dawson, Ed; Kim, Kwangjo, 2011-05-04

15
Secure mobile device structure for trust IoT

Lee, Yun Kyung; Kim, J.-N.; Lim, K.-S.; Yoon, Hyunsoo, JOURNAL OF SUPERCOMPUTING, v.74, no.12, pp.6646 - 6664, 2018-12

16
Security of permutation-based compression function lp231

Lee, Jooyoung; Kwon, Daesung, INFORMATION PROCESSING LETTERS, v.114, no.7, pp.372 - 381, 2014-07

17
Taxonomy of online game security

Ki J.; Cheon J.H.; Kang J.-U.; Kim D., ELECTRONIC LIBRARY, v.22, no.1, pp.65 - 73, 2004

18
모듈라 멱승 연산의 빠른 수행을 위한 덧셈사슬 휴리스틱과 모듈라 곱셈 알고리즘들 = An addition-chain heuristics and modular multiplication algorithms for fast modular exponentiationslink

홍성민; Hong, Seong-Min; et al, 한국과학기술원, 1996

19
비대칭 피스텔 네트웍을 이용한 순열 생성기가 유사 랜덤성을 갖는 조건 분석 = Permutation generators based on unbalanced feistel network : analysis of the condition of pseudorandomnesslink

이광수; Lee, Kwang-Su; et al, 한국과학기술원, 2000

rss_1.0 rss_2.0 atom_1.0