홈 editorial content online
Volume 14 (2012)
No 1
Volume 13 (2011)
No 1
Volume 12 (2010)
No 1
Volume 11 (2009)
No 1, No 2
Volume 10 (2008)
No 1, No 2
Volume 9 (2006)
No 1, No 2
Volume 8 (2005)
No 1, No 2
Volume 7 (2004)
No 1, No 2
Volume 6 (2003)
No 1, No 2
Volume 5 (2002)
No 1, No 2
Volume 4 (2001)
No 1, No 2
Volume 3 (2000)
No 1
Volume 2 (1999)
No 1
Volume 1 (1998)
No 1

(2005 / vol.8 / no.1)
Title:    Author:   
  A New Lattice Attack on NTRU Cryptosystem
Pages 197-205, Daewan Han
    
  Quantum key distribution based on conference key agreement
Pages 189-195, Dong Pyo Chi, Sora Choi, Soojoon Lee
    
  An Authenticated Certificateless Public Key Encryption Scheme
Pages 177-187, Young-Ran Lee, Hyang-Sook Lee
    
  Cryptanalysis of ElGamal Type Digital Signature Schemes Using Integer Decomposition
Pages 167-175, Ikkwon Yie
    
  A Property for Cryptography based on Infinite Groups
Pages 155-166, Eonkyung Lee
    
  Secure quantum communication for secret sharing
Pages 145-154, Dong Pyo Chi, Sora Choi, Jaewan Kim, Soojoon Lee
    
  Algebraic Attacks on Stream Ciphers (survey)
Pages 133-143, Dong Hoon Lee
    
  A New {ID}-based Signature with Batch Verification
Pages 119-131, Jung Hee Cheon, Yongdae Kim,Hyo Jin Yoon
    
  Integral Cryptanalysis and Higher Order Differential Attack
Pages 101-118, Yongjin Yeom
    
  Compression for Trace Zero Subgroups of Elliptic Curves
Pages 93-100, A. Silverberg
  
  Efficient mechanism for the setup of UE-initiated tunnels in 3GPP-WLAN interworking
Pages 77-85, Sang Uk Shin
    
  On fairness in online purchase of physical goods (Extended Abstract)
Pages 87-92, Jun-Bum Shin
    
  The Condition of XSL for a Block Cipher
Pages 69-75, Bon Wook Koo, Hwanseok Jang, Junghwan Song
    
  Differential Power Attack and Masking Method
Pages 53-67, Yoo-Jin Baek, Mi-Jung Noh
    
  Accountable Signatures
Pages 29-43, Jung Hee Cheon, Woo-Hwan Kim, Hyojin Yoon
    
  Privacy-Enhanced Public-Key Certificate]{Privacy-Enhanced Public-Key Certificate: How to Embed an Individual's Sensitive Information into a Certificate
Pages 21-28, Seungjoo Kim, Dongho Won
    
  Decomposition of an integer for efficient implementation of Elliptic Curve Cryptosystem
Pages 45-51, Young-Ho Park
    
  Design of block ciphers and coding theory
Pages 13-20, Daesung Kwon, Soo Hak Sung, Jung Hwan Song, Sangwoo Park
    
  Security frameworks for pseudorandom number generators
Pages 1-11, Ju-Sung Kang