Results 1-7 of 7 (Search time: 0.004 seconds).
NO | Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date) |
---|---|
An Attack on Tanaka`s Non Interactive Key Sharing Scheme Park, S; Kim, Y; Lee, S; Kim, Kwangjo, IEEE International Symposium on Information Theory, v.0, no.0, pp.17 - 22, IEEE, 1995-09-17 | |
How to Use Exponent Permutations in Cryptography-classification and Applications Park,SW; Lee, S; Kim, Kwangjo, Proc. of International Conference on Cryptology and Information Security, 1996-12-19 | |
How to Strengthen DES against Two Robust Attacks Kim, Kwangjo; Lee, S; Park, S; Lee, D, 1995 Korea-JapanJoint Workshop onInformation Security and Cryptology (JW-ISC'95), 1995-01-24 | |
Integer Addition over GF(2) and its Cryptographic Properties Chee, S; Lee, S; Kim, Kwangjo, Third International Conference on Finite Fields and Applications, pp.11 - 14, 1995-06-11 | |
An Efficient Method to Find the Linear Expressions for Linear Cryptanalysis Lee, S; Sung, SH; Kim, Kwangjo, Japan-Korea Joint Workshop on Information Security and Cryptology (JW-ISC'95), 1995-01-24 | |
DES can be Immune to Linear Cryptanalysis Kim, Kwangjo; Lee, S; Park, S; Lee, D, Proceedings of the Workshop on Selected Areas in Cryptography SAC’94, pp.70 - 81, 1994 | |
Reconstruction of s2DES S-boxes and their Immunity to Differential Cryptanalysis Kim, Kwangjo; Park, S; Lee, S, Korea-Japan Joint Workshop on Informaion Security and Cryptology, v.0, no.0, pp.0 - 0, 1993-10 |
Discover