スポンサーリンク
Center For Information Security Technologies (cist) Korea University | 論文
- DRBAC Model Using a WSNM for Services in i-Home(New Technologies and their Applications of the Internet IV)
- Mechanical Filter on Actuator for System Stability of 9.5mm Drive
- Security Analysis of a Multi-Receiver Identity-Based Key Encapsulation Mechanism
- Cryptanalysis of Chatterjee-Sarkar Hierarchical Identity-Based Encryption Scheme at PKC 06
- Seven New Block Cipher Structures with Provable Security against Differential Cryptanalysis
- Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function
- Weak-Key Classes of 7-Round MISTY 1 and 2 for Related-Key Amplified Boomerang Attacks
- Impossible Differential Cryptanalysis of Zodiac(Special Section on Cryptography and Information Security)
- Construction of UOWHF : Two New Parallel Methods(Symmetric Key Cryptography)(Cryptography and Information Security)
- PGV-Style Block-Cipher-Based Hash Families and Black-Box Analysis(Symmetric Key Cryptography)(Cryptography and Information Security)
- Minimum-Maximum Exclusive Weighted-Mean Filter with Adaptive Window(Digital Signal Processing)
- Linear Attack Using Multiple Linear Approximations(Symmetric Key Cryptography)(Cryptography and Information Security)
- A Genetic Optimization Approach to Operation of a Multi-head Surface Mounting Machine
- Attacking 44 Rounds of the SHACAL-2 Block Cipher Using Related-Key Rectangle Cryptanalysis
- Known-Key Attacks on Generalized Feistel Schemes with SP Round Function
- Lower urinary tract injuries diagnosed after hysterectomy : Seven-year experience at a cancer hospital
- Known-Key Attacks on Generalized Feistel Schemes with SP Round Function