Digital Library


Search: "[ keyword: cryptography ]" (66)
    A Study on Efficient Signing Methods and Optimal Parameters Proposal for SeaSign Implementation
    , Vol. 34, No. 2, pp. 167-177, Apr. 2024
    10.13089/JKIISC.2024.34.2.167

    Analysis on Decryption Failure Probability of TiGER
    , , , Vol. 34, No. 2, pp. 157-166, Apr. 2024
    10.13089/JKIISC.2024.34.2.157

    Security Analysis on Multivariate Quadratic Based Digital SignaturesUsing Sparse Matrices
    , , Vol. 34, No. 1, pp. 1-9, Feb. 2024
    https://doi.org/10.13089/JKIISC.2024.34.1.1

    Security Analysis on TiGER KEM in KpqC Round 1 Competition Using Meet-LWE Attack
    , , , Vol. 33, No. 5, pp. 709-719, Oct. 2023
    10.13089/JKIISC.2023.33.5.709

    Analysis of Research Trends in Homomorphic Encryption Using Bibliometric Analysis
    , , Vol. 33, No. 4, pp. 601-608, Aug. 2023
    10.13089/JKIISC.2023.33.4.601

    Implementing M-SIDH: Performance and Efficiency Evaluation
    , , Vol. 33, No. 4, pp. 591-599, Aug. 2023
    10.13089/JKIISC.2023.33.4.591

    Precise Max-Pooling on Fully Homomorphic Encryption
    , Vol. 33, No. 3, pp. 375-381, Jun. 2023
    10.13089/JKIISC.2023.33.3.375

    A Study on Creating WBC-AES Dummy LUT as a Countermeasure against DCA
    , , , , Vol. 33, No. 3, pp. 363-374, Jun. 2023
    10.13089/JKIISC.2023.33.3.363

    A High Speed Optimized Implementation of Lightweight CryptographyTinyJAMBU on Internet of Things Processor 8-Bit AVR
    , , , , Vol. 33, No. 2, pp. 183-191, Apr. 2023
    10.13089/JKIISC.2023.33.2.183

    , , Vol. 32, No. 6, pp. 1045-1057, Dec. 2022
    10.13089/JKIISC.2022.32.6.1045