Search

Start a new search
Current filters:
Add filters:
  • Results/Page
  • Sort items by
  • In order
  • Authors/record

Results 31-40 of 88 (Search time: 0.007 seconds).

NO Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date)
31
Improved ID-based Authenticated Group Key Agreement Secure Against Impersonation Attack by Insider

Asano, Tomoyuki; Park, Hyewon; Asano, Tomoyuki; Kim, Kwangjo; 박, 혜원; 김, 광조, 정보보호학회논문지, Vol.19, No.5, 2009-10-01

32
Compact representation of domain parameters of hyperelliptic curve cryptosystems

Zhang, Fangguo; Liu, Shengli; Kim, Kwangjo, INFORMATION SECURITY AND PRIVACY BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.2384, pp.203 - 213, 2002-06

33
Yet another forward secure signature from bilinear pairings

Vo, Duc-Liem; Kim, Kwangjo, INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2005 BOOK SERIES: LECTURE NOTES IN COMPUTER SCIENCE, v.3935, pp.441 - 455, 2006-02

34
Remarks on the unknown key share attacks

Baek, Joonsang; Kim, Kwangjo, IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, v.E83A, no.12, pp.2766 - 2769, 2000-12

35
ID-Based Blind Signature and Ring Signature from Pairings

Zhang, Fangguo; Kim, Kwangjo, Lecture Notes in Computer Science, Vol.2501, pp.629-637, 2002

36
Mobile RFID applications and security challenges

Konidala, D.M.; Kim, Kwangjo, LECTURE NOTES IN COMPUTER SCIENCE (INCLUDING SUBSERIES LECTURE NOTES IN ARTIFICIAL INTELLIGENCE AND LECTURE NOTES IN BIOINFORMATICS), v.4296 LNCS, no.0, pp.194 - 205, 2006-11

37
Improving bounds for the number of correlation immune Boolean functions

Park, SM; Lee, S; Sung, SH; Kim, Kwangjo, INFORMATION PROCESSING LETTERS, v.61, no.4, pp.209 - 212, 1997-02

38
On Generating Cryptographically Desirable Substitutions

Kim, Kwangjo; Tsutomu Matsumoto; Hideki Imai, TRANSACTIONS OF THE IEICE , v.73, no.7, pp.1031 - 1035, 1990-01

39
A RECURSIVE CONSTRUCTION METHOD OF S-BOXES SATISFYING STRICT AVALANCHE CRITERION

Kim, Kwangjo; Matsumoto, Tsutomu; Imai, Hideki, LECTURE NOTES IN COMPUTER SCIENCE, v.537, pp.564 - 574, 1991-01

40
On the Construction of Cryptographically Strong Boolean Functions with Desirable Trade-off

REN Kui; PARK Jaemin; Kim, Kwangjo, JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE A, v.6A, no.5, pp.358 - 364, 2005-05

rss_1.0 rss_2.0 atom_1.0