Search

Start a new search
Current filters:
Add filters:
  • Results/Page
  • Sort items by
  • In order
  • Authors/record

Results 1-7 of 7 (Search time: 0.004 seconds).

NO Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date)
1
An Attack on Tanaka`s Non Interactive Key Sharing Scheme

Park, S; Kim, Y; Lee, S; Kim, Kwangjo, IEEE International Symposium on Information Theory, v.0, no.0, pp.17 - 22, IEEE, 1995-09-17

2
How to Use Exponent Permutations in Cryptography-classification and Applications

Park,SW; Lee, S; Kim, Kwangjo, Proc. of International Conference on Cryptology and Information Security, 1996-12-19

3
How to Strengthen DES against Two Robust Attacks

Kim, Kwangjo; Lee, S; Park, S; Lee, D, 1995 Korea-JapanJoint Workshop onInformation Security and Cryptology (JW-ISC'95), 1995-01-24

4
Integer Addition over GF(2) and its Cryptographic Properties

Chee, S; Lee, S; Kim, Kwangjo, Third International Conference on Finite Fields and Applications, pp.11 - 14, 1995-06-11

5
An Efficient Method to Find the Linear Expressions for Linear Cryptanalysis

Lee, S; Sung, SH; Kim, Kwangjo, Japan-Korea Joint Workshop on Information Security and Cryptology (JW-ISC'95), 1995-01-24

6
DES can be Immune to Linear Cryptanalysis

Kim, Kwangjo; Lee, S; Park, S; Lee, D, Proceedings of the Workshop on Selected Areas in Cryptography SAC’94, pp.70 - 81, 1994

7
Reconstruction of s2DES S-boxes and their Immunity to Differential Cryptanalysis

Kim, Kwangjo; Park, S; Lee, S, Korea-Japan Joint Workshop on Informaion Security and Cryptology, v.0, no.0, pp.0 - 0, 1993-10

Discover

rss_1.0 rss_2.0 atom_1.0