Digital Library
Search: "[ keyword: key ]" (222)
Multi-Server Authenticated Key Exchange Protocol
,
,
,
Vol. 13, No. 1, pp. 87-98,
Feb.
2003
10.13089/JKIISC.2003.13.1.87
Keywords: Password, Trustee, SSO, Key Exchange Protocol, authentication

Keywords: Password, Trustee, SSO, Key Exchange Protocol, authentication
A Chosen Plaintext Linear Attack On Block Cipher Cipher CIKS-1
,
,
,
,
,
,
Vol. 13, No. 1, pp. 47-58,
Feb.
2003
10.13089/JKIISC.2003.13.1.47
Keywords: block cipher, A cipher with internal key schedule, linear cryptanalysis, A chosen plaintext attack, Data-dependent permutation

Keywords: block cipher, A cipher with internal key schedule, linear cryptanalysis, A chosen plaintext attack, Data-dependent permutation
Efficiency in the Password-based Authenticated Key Exchange
,
,
,
,
,
,
Vol. 12, No. 6, pp. 113-124,
Dec.
2002
10.13089/JKIISC.2002.12.6.113
Keywords: Password-based authenticated key exchange

Keywords: Password-based authenticated key exchange
Implementation of Key Recovery Model based on XML for B2B
,
,
,
Vol. 12, No. 5, pp. 53-62,
Oct.
2002
10.13089/JKIISC.2002.12.5.53
Keywords: Key Recovery, XML Digital Signature, XML Encryption, B2B

Keywords: Key Recovery, XML Digital Signature, XML Encryption, B2B
A password-based mutual authentication and key-agreement protocol
,
,
Vol. 12, No. 5, pp. 37-44,
Oct.
2002
10.13089/JKIISC.2002.12.5.37
Keywords: ECDSA, ECDLP, ECDH, Password-based key agreement, Mutual Authentication

Keywords: ECDSA, ECDLP, ECDH, Password-based key agreement, Mutual Authentication
Design of AES Cryptographic Processor with Modular Round Key Generator
,
,
,
Vol. 12, No. 5, pp. 15-26,
Oct.
2002
10.13089/JKIISC.2002.12.5.15
Keywords: AES(Advanced Encryption Standard), Key Scheduler, block cipher, Cryptographic Processor

Keywords: AES(Advanced Encryption Standard), Key Scheduler, block cipher, Cryptographic Processor
Design of a Strong Authentication Mechanism using Public-Key based on Kerberos
,
,
Vol. 12, No. 4, pp. 67-76,
Aug.
2002
10.13089/JKIISC.2002.12.4.67
Keywords: Kerberos, Public/Private-key, Strong/Mutual Authentication, Challenge-Response

Keywords: Kerberos, Public/Private-key, Strong/Mutual Authentication, Challenge-Response
A Study on the Security analysis and Applications of Standard Key agreement protocols based on Elliptic curve cryptosystem
,
,
,
,
,
Vol. 12, No. 3, pp. 103-118,
Jun.
2002
10.13089/JKIISC.2002.12.3.103
Keywords: Key agreement protocol, Elliptic Curve Cryptosystem, Diffie-Hellman primitive, Active attack

Keywords: Key agreement protocol, Elliptic Curve Cryptosystem, Diffie-Hellman primitive, Active attack
Cellular Automata based on VLSI architecture over GF($2^m$ )
,
,
,
,
Vol. 12, No. 3, pp. 87-94,
Jun.
2002
10.13089/JKIISC.2002.12.3.87
Keywords: 공개키 암호화 시스템, 표준기저, 샐룰라 오토마타, MSB 우선 곱셈, Public-key Cryptosystem, standard basis, cellular automata, AOP(All One Polynomial), Most Significant Bit first multiplication

Keywords: 공개키 암호화 시스템, 표준기저, 샐룰라 오토마타, MSB 우선 곱셈, Public-key Cryptosystem, standard basis, cellular automata, AOP(All One Polynomial), Most Significant Bit first multiplication
Authentication and Key Agreement Protocol based on NTRU in the Mobile Communication
,
,
,
,
Vol. 12, No. 3, pp. 49-60,
Jun.
2002
10.13089/JKIISC.2002.12.3.49
Keywords: NTRU, authentication, key agreement, Mobile communication

Keywords: NTRU, authentication, key agreement, Mobile communication