Search

Start a new search
Current filters:
Add filters:
  • Results/Page
  • Sort items by
  • In order
  • Authors/record

Results 1-10 of 186 (Search time: 0.006 seconds).

NO Title, Author(s) (Publication Title, Volume Issue, Page, Issue Date)
1
An Attack on Tanaka`s Non Interactive Key Sharing Scheme

Park, S; Kim, Y; Lee, S; Kim, Kwangjo, IEEE International Symposium on Information Theory, v.0, no.0, pp.17 - 22, IEEE, 1995-09-17

2
Votopia will be coming soon

Kim, Kwangjo, SCIS2002, pp.0 - 0, 2002-01-31

3
Votopia will be continued

Kim, Kwangjo, Crypto2002, pp.0 - 0, 2002-08-20

4
Result of the 1st Worldwide Internet Voting System

Kim, Kwangjo, 2002년도 한국정보보호학회 학술대회, pp.219 - 224, 한국정보보호학회, 2002-11-16

5
How to Use Exponent Permutations in Cryptography-classification and Applications

Park,SW; Lee, S; Kim, Kwangjo, Proc. of International Conference on Cryptology and Information Security, 1996-12-19

6
How to Strengthen DES against Two Robust Attacks

Kim, Kwangjo; Lee, S; Park, S; Lee, D, 1995 Korea-JapanJoint Workshop onInformation Security and Cryptology (JW-ISC'95), 1995-01-24

7
Integer Addition over GF(2) and its Cryptographic Properties

Chee, S; Lee, S; Kim, Kwangjo, Third International Conference on Finite Fields and Applications, pp.11 - 14, 1995-06-11

8
A study on Secret Sharing Scheme Using Visual Cryoptography

Kim, MR; Park, JH; Park, SW; Kim, Kwangjo, SCIS97, 1997-01-29

9
Votopia is ready to serve

Kim, Kwangjo, Eurocrypt2002, pp.0 - 0, 2002-04-30

10
BRM sequence generators based on the field GF(2n) for DSP implementations

Lee, SJ; Goh, SC; Kim, Kwangjo; Lee, DK, 1995 IEEE International Symposium on Information Theory, 1995. Proceedings., IEEE, 1995-09-17

rss_1.0 rss_2.0 atom_1.0