Digital Library
Search: "[ keyword: Pairing ]" (14)
An Anonymous Authentication in the Hierarchy for VANET
배경진,
이영경,
김종현,
이동훈,
Vol. 28, No. 3, pp. 563-577,
May.
2018
10.13089/JKIISC.2018.28.3.563
Keywords: VANET, authentication, Conditional Privacy, IBS, pairing-free, VANET, authentication, Conditional Privacy, IBS, pairing-free
10.13089/JKIISC.2018.28.3.563
Keywords: VANET, authentication, Conditional Privacy, IBS, pairing-free, VANET, authentication, Conditional Privacy, IBS, pairing-free
A generating method of CM parameters of pairing-friendly abelian surfaces using Brezing-Weng family
Kisoon Yoon,
Young-Ho Park,
Nam Su Chang,
Vol. 25, No. 3, pp. 567-572,
Jun.
2015
10.13089/JKIISC.2015.25.3.567
Keywords: abelian variety, Brezing-Weng method, pairing-based cryptography, complex multiplication
10.13089/JKIISC.2015.25.3.567
Keywords: abelian variety, Brezing-Weng method, pairing-based cryptography, complex multiplication
An Improved One Round Authenticated Group Key Agreement
Ho-Hee Kim,
Soon-Ja Kim,
Vol. 23, No. 1, pp. 3-10,
Feb.
2013
10.13089/JKIISC.2013.23.1.3
Keywords: Bilinear Pairings, AGKA
10.13089/JKIISC.2013.23.1.3
Keywords: Bilinear Pairings, AGKA
A Ternary Tree-based Authenticated Group Key Agreement For Dynamic Peer Group
Ho-Hee Kim,
Soon-Ja Kim,
Vol. 22, No. 6, pp. 1253-1264,
Dec.
2012
10.13089/JKIISC.2012.22.6.1253
Keywords: Ternary Tree, Bilinear Pairings
10.13089/JKIISC.2012.22.6.1253
Keywords: Ternary Tree, Bilinear Pairings
Efficient Fault Injection Attack to the Miller Algorithm in the Pairing Computation using Affine Coordinate System
Ki-Seok Bae,
Jea-Hoon Park,
Gyo-Yong Sohn,
Jae-Cheol Ha,
Sang-Jae Moon,
Vol. 21, No. 3, pp. 11-26,
Jun.
2011
10.13089/JKIISC.2011.21.3.11
Keywords: Pairing computation, Miller algorithm, Fault injection attack
10.13089/JKIISC.2011.21.3.11
Keywords: Pairing computation, Miller algorithm, Fault injection attack
Security Analysis against RVA-based DPA Countermeasure Applied to $Eta_T$ Pairing Algorithm
Seog-Chung Seo,
Dong-Guk Han,
Seok-Hie Hong,
Vol. 21, No. 2, pp. 83-90,
Apr.
2011
10.13089/JKIISC.2011.21.2.83
Keywords:$Eta_T$ Pairing, Efficient Countermeasure, DPA
10.13089/JKIISC.2011.21.2.83
Keywords:
Efficient Hardware Implementation of ${\eta}_T$ Pairing Based Cryptography
Dong-Geoon Lee,
Chul-Hee Lee,
Doo-Ho Choi,
Chul-Su Kim,
Eun-Young Choi,
Ho-Won Kim,
Vol. 20, No. 1, pp. 3-16,
Feb.
2010
10.13089/JKIISC.2010.20.1.3
Keywords:${\eta}_T$ pairing, Eta-T pairing, finite field arithmetic, hardware coprocessor, FPGA, Elliptic curve
10.13089/JKIISC.2010.20.1.3
Keywords:
Credential Forging Attack against Privacy Enhancing Credential System in Nakazato-Wang-Yamamura '07
Dae-Hun Nyang,
Kyung-Hee Lee,
Vol. 18, No. 5, pp. 195-199,
Oct.
2008
10.13089/JKIISC.2008.18.5.195
Keywords: cryptanalysis, Anonymity, Credential, bilinear pairing
10.13089/JKIISC.2008.18.5.195
Keywords: cryptanalysis, Anonymity, Credential, bilinear pairing
Efficient Finite Field Arithmetic Architectures for Pairing Based Cryptosystems
Nam-Su Chang,
Tae-Hyun Kim,
Chang-Han Kim,
Dong-Guk Han,
Ho-Won Kim,
Vol. 18, No. 3, pp. 33-44,
Jun.
2008
10.13089/JKIISC.2008.18.3.33
Keywords: Pairing based cryptosystems, finite field arithmetic, Bit-Serial Multiplier
10.13089/JKIISC.2008.18.3.33
Keywords: Pairing based cryptosystems, finite field arithmetic, Bit-Serial Multiplier
Two-round ID-based Group Key Agreement Fitted for Pay-TV System
Kim Hyunjue,
Nam Junghyun,
Kim Seungjoo,
Won Dongho,
Vol. 15, No. 1, pp. 41-56,
Feb.
2005
10.13089/JKIISC.2005.15.1.41
Keywords: Group key agreement protocol, Pay-TV system, Pairing, CDH assumption, BDDH assumption
10.13089/JKIISC.2005.15.1.41
Keywords: Group key agreement protocol, Pay-TV system, Pairing, CDH assumption, BDDH assumption