Digital Library


Search: "[ keyword: Pairing ]" (14)
    An Anonymous Authentication in the Hierarchy for VANET
    배경진, 이영경, 김종현, 이동훈, Vol. 28, No. 3, pp. 563-577, May. 2018
    10.13089/JKIISC.2018.28.3.563
    Keywords: VANET, authentication, Conditional Privacy, IBS, pairing-free, VANET, authentication, Conditional Privacy, IBS, pairing-free

    A generating method of CM parameters of pairing-friendly abelian surfaces using Brezing-Weng family
    Kisoon Yoon, Young-Ho Park, Nam Su Chang, Vol. 25, No. 3, pp. 567-572, Jun. 2015
    10.13089/JKIISC.2015.25.3.567
    Keywords: abelian variety, Brezing-Weng method, pairing-based cryptography, complex multiplication

    An Improved One Round Authenticated Group Key Agreement
    Ho-Hee Kim, Soon-Ja Kim, Vol. 23, No. 1, pp. 3-10, Feb. 2013
    10.13089/JKIISC.2013.23.1.3
    Keywords: Bilinear Pairings, AGKA

    A Ternary Tree-based Authenticated Group Key Agreement For Dynamic Peer Group
    Ho-Hee Kim, Soon-Ja Kim, Vol. 22, No. 6, pp. 1253-1264, Dec. 2012
    10.13089/JKIISC.2012.22.6.1253
    Keywords: Ternary Tree, Bilinear Pairings

    Efficient Fault Injection Attack to the Miller Algorithm in the Pairing Computation using Affine Coordinate System
    Ki-Seok Bae, Jea-Hoon Park, Gyo-Yong Sohn, Jae-Cheol Ha, Sang-Jae Moon, Vol. 21, No. 3, pp. 11-26, Jun. 2011
    10.13089/JKIISC.2011.21.3.11
    Keywords: Pairing computation, Miller algorithm, Fault injection attack

    Security Analysis against RVA-based DPA Countermeasure Applied to $Eta_T$ Pairing Algorithm
    Seog-Chung Seo, Dong-Guk Han, Seok-Hie Hong, Vol. 21, No. 2, pp. 83-90, Apr. 2011
    10.13089/JKIISC.2011.21.2.83
    Keywords: $Eta_T$ Pairing, Efficient Countermeasure, DPA

    Efficient Hardware Implementation of ${\eta}_T$ Pairing Based Cryptography
    Dong-Geoon Lee, Chul-Hee Lee, Doo-Ho Choi, Chul-Su Kim, Eun-Young Choi, Ho-Won Kim, Vol. 20, No. 1, pp. 3-16, Feb. 2010
    10.13089/JKIISC.2010.20.1.3
    Keywords: ${\eta}_T$ pairing, Eta-T pairing, finite field arithmetic, hardware coprocessor, FPGA, Elliptic curve

    Credential Forging Attack against Privacy Enhancing Credential System in Nakazato-Wang-Yamamura '07
    Dae-Hun Nyang, Kyung-Hee Lee, Vol. 18, No. 5, pp. 195-199, Oct. 2008
    10.13089/JKIISC.2008.18.5.195
    Keywords: cryptanalysis, Anonymity, Credential, bilinear pairing

    Efficient Finite Field Arithmetic Architectures for Pairing Based Cryptosystems
    Nam-Su Chang, Tae-Hyun Kim, Chang-Han Kim, Dong-Guk Han, Ho-Won Kim, Vol. 18, No. 3, pp. 33-44, Jun. 2008
    10.13089/JKIISC.2008.18.3.33
    Keywords: Pairing based cryptosystems, finite field arithmetic, Bit-Serial Multiplier

    Two-round ID-based Group Key Agreement Fitted for Pay-TV System
    Kim Hyunjue, Nam Junghyun, Kim Seungjoo, Won Dongho, Vol. 15, No. 1, pp. 41-56, Feb. 2005
    10.13089/JKIISC.2005.15.1.41
    Keywords: Group key agreement protocol, Pay-TV system, Pairing, CDH assumption, BDDH assumption