Digital Library


Search: "[ keyword: key ]" (222)
    Multi-Server Authenticated Key Exchange Protocol
    , , , Vol. 13, No. 1, pp. 87-98, Feb. 2003
    10.13089/JKIISC.2003.13.1.87
    Keywords: Password, Trustee, SSO, Key Exchange Protocol, authentication

    A Chosen Plaintext Linear Attack On Block Cipher Cipher CIKS-1
    , , , , , , Vol. 13, No. 1, pp. 47-58, Feb. 2003
    10.13089/JKIISC.2003.13.1.47
    Keywords: block cipher, A cipher with internal key schedule, linear cryptanalysis, A chosen plaintext attack, Data-dependent permutation

    Efficiency in the Password-based Authenticated Key Exchange
    , , , , , , Vol. 12, No. 6, pp. 113-124, Dec. 2002
    10.13089/JKIISC.2002.12.6.113
    Keywords: Password-based authenticated key exchange

    Implementation of Key Recovery Model based on XML for B2B
    , , , Vol. 12, No. 5, pp. 53-62, Oct. 2002
    10.13089/JKIISC.2002.12.5.53
    Keywords: Key Recovery, XML Digital Signature, XML Encryption, B2B

    A password-based mutual authentication and key-agreement protocol
    , , Vol. 12, No. 5, pp. 37-44, Oct. 2002
    10.13089/JKIISC.2002.12.5.37
    Keywords: ECDSA, ECDLP, ECDH, Password-based key agreement, Mutual Authentication

    Design of AES Cryptographic Processor with Modular Round Key Generator
    , , , Vol. 12, No. 5, pp. 15-26, Oct. 2002
    10.13089/JKIISC.2002.12.5.15
    Keywords: AES(Advanced Encryption Standard), Key Scheduler, block cipher, Cryptographic Processor

    Design of a Strong Authentication Mechanism using Public-Key based on Kerberos
    , , Vol. 12, No. 4, pp. 67-76, Aug. 2002
    10.13089/JKIISC.2002.12.4.67
    Keywords: Kerberos, Public/Private-key, Strong/Mutual Authentication, Challenge-Response

    A Study on the Security analysis and Applications of Standard Key agreement protocols based on Elliptic curve cryptosystem
    , , , , , Vol. 12, No. 3, pp. 103-118, Jun. 2002
    10.13089/JKIISC.2002.12.3.103
    Keywords: Key agreement protocol, Elliptic Curve Cryptosystem, Diffie-Hellman primitive, Active attack

    Cellular Automata based on VLSI architecture over GF($2^m$)
    , , , , Vol. 12, No. 3, pp. 87-94, Jun. 2002
    10.13089/JKIISC.2002.12.3.87
    Keywords: 공개키 암호화 시스템, 표준기저, 샐룰라 오토마타, MSB 우선 곱셈, Public-key Cryptosystem, standard basis, cellular automata, AOP(All One Polynomial), Most Significant Bit first multiplication

    Authentication and Key Agreement Protocol based on NTRU in the Mobile Communication
    , , , , Vol. 12, No. 3, pp. 49-60, Jun. 2002
    10.13089/JKIISC.2002.12.3.49
    Keywords: NTRU, authentication, key agreement, Mobile communication