Search

Start a new search
Current filters:
Add filters:
  • Results/Page
  • Sort items by
  • In order
  • Authors/record

Results 1-6 of 6 (Search time: 0.006 seconds).

NO Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date)
1
An Attack on Tanaka`s Non Interactive Key Sharing Scheme

Park, S; Kim, Y; Lee, S; Kim, Kwangjo, IEEE International Symposium on Information Theory, v.0, no.0, pp.17 - 22, IEEE, 1995-09-17

2
How to Strengthen DES against Two Robust Attacks

Kim, Kwangjo; Lee, S; Park, S; Lee, D, 1995 Korea-JapanJoint Workshop onInformation Security and Cryptology (JW-ISC'95), 1995-01-24

3
Integer Addition over GF(2) and its Cryptographic Properties

Chee, S; Lee, S; Kim, Kwangjo, Third International Conference on Finite Fields and Applications, pp.11 - 14, 1995-06-11

4
BRM sequence generators based on the field GF(2n) for DSP implementations

Lee, SJ; Goh, SC; Kim, Kwangjo; Lee, DK, 1995 IEEE International Symposium on Information Theory, 1995. Proceedings., IEEE, 1995-09-17

5
Securing DES S-boxes against Three Robust Cryptanalysis

Kim, Kwangjo; Park, S; Daiki Lee, Proceedings of the Workshop on Selected Areas in Cryptography (SAC '95), pp.145 - 157, 1995-05-18

6
An Efficient Method to Find the Linear Expressions for Linear Cryptanalysis

Lee, S; Sung, SH; Kim, Kwangjo, Japan-Korea Joint Workshop on Information Security and Cryptology (JW-ISC'95), 1995-01-24

rss_1.0 rss_2.0 atom_1.0