Results 1-10 of 187 (Search time: 0.013 seconds).
NO | Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date) |
---|---|
An Attack on Tanaka`s Non Interactive Key Sharing Scheme Park, S; Kim, Y; Lee, S; Kim, Kwangjo, IEEE International Symposium on Information Theory, v.0, no.0, pp.17 - 22, IEEE, 1995-09-17 | |
Votopia will be coming soon Kim, Kwangjo, SCIS2002, pp.0 - 0, 2002-01-31 | |
Votopia will be continued Kim, Kwangjo, Crypto2002, pp.0 - 0, 2002-08-20 | |
Result of the 1st Worldwide Internet Voting System Kim, Kwangjo, 2002년도 한국정보보호학회 학술대회, pp.219 - 224, 한국정보보호학회, 2002-11-16 | |
How to Use Exponent Permutations in Cryptography-classification and Applications Park,SW; Lee, S; Kim, Kwangjo, Proc. of International Conference on Cryptology and Information Security, 1996-12-19 | |
How to Strengthen DES against Two Robust Attacks Kim, Kwangjo; Lee, S; Park, S; Lee, D, 1995 Korea-JapanJoint Workshop onInformation Security and Cryptology (JW-ISC'95), 1995-01-24 | |
Integer Addition over GF(2) and its Cryptographic Properties Chee, S; Lee, S; Kim, Kwangjo, Third International Conference on Finite Fields and Applications, pp.11 - 14, 1995-06-11 | |
A study on Secret Sharing Scheme Using Visual Cryoptography Kim, MR; Park, JH; Park, SW; Kim, Kwangjo, SCIS97, 1997-01-29 | |
Votopia is ready to serve Kim, Kwangjo, Eurocrypt2002, pp.0 - 0, 2002-04-30 | |
BRM sequence generators based on the field GF(2n) for DSP implementations Lee, SJ; Goh, SC; Kim, Kwangjo; Lee, DK, 1995 IEEE International Symposium on Information Theory, 1995. Proceedings., IEEE, 1995-09-17 |
Discover