Results 11-20 of 187 (Search time: 0.007 seconds).
NO | Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date) |
---|---|
Securing DES S-boxes against Three Robust Cryptanalysis Kim, Kwangjo; Park, S; Daiki Lee, Proceedings of the Workshop on Selected Areas in Cryptography (SAC '95), pp.145 - 157, 1995-05-18 | |
An Efficient Method to Find the Linear Expressions for Linear Cryptanalysis Lee, S; Sung, SH; Kim, Kwangjo, Japan-Korea Joint Workshop on Information Security and Cryptology (JW-ISC'95), 1995-01-24 | |
Semi-bent functions and strict uncorrelated criterion revisited Park, SW; Chee, S; Kim, Kwangjo, International Conference on Cryptology and Information Security, pp.104 - 109, 1996-12-19 | |
DES can be Immune to Linear Cryptanalysis Kim, Kwangjo; Lee, S; Park, S; Lee, D, Proceedings of the Workshop on Selected Areas in Cryptography SAC’94, pp.70 - 81, 1994 | |
Extension of Votopia to Mobile Voting Lee, H; Vo, DL; Kim, Kwangjo, 2002년도 한국정보보호학회 학술대회, pp.225 - 229, 한국정보보호학회, 2002-11-16 | |
ID-Based Distributed 'Magic Ink' Signature Xie, Y; Zhang, F; Kim, Kwangjo, 2003년도 한국정보보호학회영남지부, pp.19 - 23, 한국정보보호학회영남지부, 2003-02-21 | |
Strong Proxy Signature and its Applications Lee, B; Kim, H; Kim, Kwangjo, SCIS2001, pp.603 - 608, 2001-01 | |
A Capability-based Privacy-preserving Scheme for Pervasive Computing Environments Konidala, D.M; Duc, D.N; Lee, DongMan; Kim, Kwangjo, Pervasive Computing and Communications Workshops, 2005, pp.136 - 140, 2005-03 | |
Provably-Secure Identification Scheme based on Braid Group Kim, Z; Kim, Kwangjo, SCIS04, pp.29 - 34, 2004-01 | |
Wireless Authentication Protocols Preserving User Anonymity Park, J; Go, J; Kim, Kwangjo, SCIS2001, pp.159 - 164, 2001-01 |
Discover