Search

Start a new search
Current filters:
Add filters:
  • Results/Page
  • Sort items by
  • In order
  • Authors/record

Results 11-20 of 187 (Search time: 0.007 seconds).

NO Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date)
11
Securing DES S-boxes against Three Robust Cryptanalysis

Kim, Kwangjo; Park, S; Daiki Lee, Proceedings of the Workshop on Selected Areas in Cryptography (SAC '95), pp.145 - 157, 1995-05-18

12
An Efficient Method to Find the Linear Expressions for Linear Cryptanalysis

Lee, S; Sung, SH; Kim, Kwangjo, Japan-Korea Joint Workshop on Information Security and Cryptology (JW-ISC'95), 1995-01-24

13
Semi-bent functions and strict uncorrelated criterion revisited

Park, SW; Chee, S; Kim, Kwangjo, International Conference on Cryptology and Information Security, pp.104 - 109, 1996-12-19

14
DES can be Immune to Linear Cryptanalysis

Kim, Kwangjo; Lee, S; Park, S; Lee, D, Proceedings of the Workshop on Selected Areas in Cryptography SAC’94, pp.70 - 81, 1994

15
Extension of Votopia to Mobile Voting

Lee, H; Vo, DL; Kim, Kwangjo, 2002년도 한국정보보호학회 학술대회, pp.225 - 229, 한국정보보호학회, 2002-11-16

16
ID-Based Distributed 'Magic Ink' Signature

Xie, Y; Zhang, F; Kim, Kwangjo, 2003년도 한국정보보호학회영남지부, pp.19 - 23, 한국정보보호학회영남지부, 2003-02-21

17
Strong Proxy Signature and its Applications

Lee, B; Kim, H; Kim, Kwangjo, SCIS2001, pp.603 - 608, 2001-01

18
A Capability-based Privacy-preserving Scheme for Pervasive Computing Environments

Konidala, D.M; Duc, D.N; Lee, DongMan; Kim, Kwangjo, Pervasive Computing and Communications Workshops, 2005, pp.136 - 140, 2005-03

19
Provably-Secure Identification Scheme based on Braid Group

Kim, Z; Kim, Kwangjo, SCIS04, pp.29 - 34, 2004-01

20
Wireless Authentication Protocols Preserving User Anonymity

Park, J; Go, J; Kim, Kwangjo, SCIS2001, pp.159 - 164, 2001-01

rss_1.0 rss_2.0 atom_1.0