Digital Library
Search: "[ keyword: cryptography ]" (15)
Threshold Encryption Scheme based on Cocks` IBE Scheme
Dae Youb Kim The KIPS Transactions:PartC,
Vol. 19, No. 4, pp. 225-230,
Aug.
2012
10.3745/KIPSTC.2012.19.4.225

A Study on the Encrypted Scheme Using Key Management Method Based on the Random Number Rearrangement for the Effective E-Document Management
Tae Wook Kim , Kyung Sang Sung , Jung Jae Kim , Byoung Muk Min , Hae Seok Oh The KIPS Transactions:PartC,
Vol. 16, No. 5, pp. 575-582,
Oct.
2009
10.3745/KIPSTC.2009.16.5.575

Secret Information Protection Scheme for Device in Home Network
Young Jae Maeng , Jeon Il Kang , Abedelaziz Mohaisen , Dae Hun Nyang , Kyung Hee Lee The KIPS Transactions:PartC,
Vol. 14, No. 4, pp. 341-348,
Aug.
2007
10.3745/KIPSTC.2007.14.4.341

A Study of Java-based PKI System for Secure Authentication on Mobile Devices
Byeong Seon Choi , Sang Kuk Kim , Cheol Joo Chae , Jae Kwang Lee The KIPS Transactions:PartC,
Vol. 14, No. 4, pp. 331-340,
Aug.
2007
10.3745/KIPSTC.2007.14.4.331

Design of the Encryption Module for File System in the Solaris Kernel
Seung Ju Jang The KIPS Transactions:PartC,
Vol. 12, No. 2, pp. 201-206,
Apr.
2005
10.3745/KIPSTC.2005.12.2.201

The Key Management System using the Secret Sharing Scheme Applicable to Smart Card
Young Seol Son , Dong Hoon Lee The KIPS Transactions:PartC,
Vol. 11, No. 5, pp. 585-594,
Oct.
2004
10.3745/KIPSTC.2004.11.5.585

The Reliable Communication Method for Self-Sovereign Identity Ecosystems
Gyu Hyun Chio, Geun-Hyung Kim KIPS Transactions on Computer and Communication Systems,
Vol. 11, No. 3, pp. 91-98,
Mar.
2022
https://doi.org/10.3745/KTCCS.2022.11.3.91
Keywords: Self-sovereign Identity, Decentralized Identifier, Public-key cryptography, DID Auth, DIDComm

Keywords: Self-sovereign Identity, Decentralized Identifier, Public-key cryptography, DID Auth, DIDComm
Design of the Security Cryptography File System Based on the Dynamic Linking Module on the Linux O.S
Jang Seung Ju , Lee Jeong Bae The KIPS Transactions:PartC,
Vol. 10, No. 7, pp. 929-936,
Dec.
2003
10.3745/KIPSTC.2003.10.7.929

Design of a Lightweight Security Protocol Using Post Quantum Cryptography
Kyung Bae Jang, Min Joo Sim, Hwa Jeong Seo KIPS Transactions on Computer and Communication Systems,
Vol. 9, No. 8, pp. 165-170,
Aug.
2020
https://doi.org/10.3745/KTCCS.2020.9.8.165
Keywords: IoT, information protection, Lightweight Security Protocol, RSA, ECC, Quantum Computer, NIST Post Quantum Cryptography Standardization, Code-Based Cryptography, ROLLO

Keywords: IoT, information protection, Lightweight Security Protocol, RSA, ECC, Quantum Computer, NIST Post Quantum Cryptography Standardization, Code-Based Cryptography, ROLLO
Implementation of a LSB - First Digit - Serial Multiplier for Finite Fields GF ( 2m )
Chang Hoon Kim, Chun Pyo Hong, Jong Jung Woo The KIPS Transactions:PartA,
Vol. 9, No. 3, pp. 281-286,
Sep.
2002
10.3745/KIPSTA.2002.9.3.281
