Results 11-20 of 145 (Search time: 0.0 seconds).
Issue Date | Title | Author(s) | Type |
---|---|---|---|
2006 | Security flaws of remote user access over insecure networks | 심경아 | Article |
2007 | Vulnerabilities of generalized MQV key agreement protocol without using one-way hash functions | 심경아 | Article |
2008 | Forgery attacks on the ID-based multisignature scheme without reblocking and predetermined signing order | 심경아 | Article |
2008 | Rogue-key attacks on the multi-designated verifiers signature scheme | 심경아 | Article |
2009 | Equidistribution of eisenstein series in the level aspect | Shinya Koyama | Article |
2009 | The group of units of some finite local rings II | 우성식 | Article |
2007 | Stringy Jacobi fields in Morse theory | 조용승; 홍순태 | Article |
2007 | Dividing polynomials using the resultant matrix | 우성식 | Article |
2000 | Genus minimizing in symplectic 4-manifolds | 조용승 | Article |
2009 | The group of units of some finite local rings I | 우성식 | Article |