Results 1-6 of 6 (Search time: 0.006 seconds).
NO | Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date) |
---|---|
An Attack on Tanaka`s Non Interactive Key Sharing Scheme Park, S; Kim, Y; Lee, S; Kim, Kwangjo, IEEE International Symposium on Information Theory, v.0, no.0, pp.17 - 22, IEEE, 1995-09-17 | |
How to Strengthen DES against Two Robust Attacks Kim, Kwangjo; Lee, S; Park, S; Lee, D, 1995 Korea-JapanJoint Workshop onInformation Security and Cryptology (JW-ISC'95), 1995-01-24 | |
Integer Addition over GF(2) and its Cryptographic Properties Chee, S; Lee, S; Kim, Kwangjo, Third International Conference on Finite Fields and Applications, pp.11 - 14, 1995-06-11 | |
BRM sequence generators based on the field GF(2n) for DSP implementations Lee, SJ; Goh, SC; Kim, Kwangjo; Lee, DK, 1995 IEEE International Symposium on Information Theory, 1995. Proceedings., IEEE, 1995-09-17 | |
Securing DES S-boxes against Three Robust Cryptanalysis Kim, Kwangjo; Park, S; Daiki Lee, Proceedings of the Workshop on Selected Areas in Cryptography (SAC '95), pp.145 - 157, 1995-05-18 | |
An Efficient Method to Find the Linear Expressions for Linear Cryptanalysis Lee, S; Sung, SH; Kim, Kwangjo, Japan-Korea Joint Workshop on Information Security and Cryptology (JW-ISC'95), 1995-01-24 |
Discover