Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of the Korea Institute of Information Security and Cryptology
Journal Basic Information
Journal DOI :
Korea Institutes of Information Security and Cryptology
Editor in Chief :
Volume & Issues
Volume 6, Issue 4 - Dec 1996
Volume 6, Issue 3 - Sep 1996
Volume 6, Issue 1 - Mar 1996
Selecting the target year
Performance Improvement In Broadband Networks Using Forward Error Correction For Cell Loss Recovery
Lim Hyo-Taek ; Song Joo-Seok ;
Journal of the Korea Institute of Information Security and Cryptology, volume 6, issue 3, 1996, Pages 3~10
We present a method to recover consecutive cell losses using forward error correction(FEC) in ATM networks. Our method recovers up to 18 consecutive cell losses. Also, we present the performance estimation of the FEC technique using the interleaving in ATM networks. Performance estimation shows an outstanding reduction in cell loss rate.
On the Correlation Immune Functions and their Nonlinearity
Sung, Soo-Hak ; Chee, Seong-Taek ; Lee, Sang-Jin ; Kim, Kwang-Jo ;
Journal of the Korea Institute of Information Security and Cryptology, volume 6, issue 3, 1996, Pages 11~22
In this paper, we consider the relationship between the nonlinearity and correlation immunity of functions suggested in , . For the analysis of such functions, we present a simple method of generating the same set of functions, which makes us possible to construct correlation immune functions with controllable correlation immunity and nonlinearity.
Applied to Satellite Network of Modified Diffie-Hellman Scheme
Park, Jeong-Hyun ; Lee, Sang-Ho ;
Journal of the Korea Institute of Information Security and Cryptology, volume 6, issue 3, 1996, Pages 23~30
This paper presented a key distribution scheme based on the Yacobi scheme that does not use the secret key provided by key distribution center as a power, but uses instead a random number generated by the user. The scheme is independent of the exposure of the secret key. Then this paper described modified Diffie-Hellman schemes based on the discrete logarithm and prime resolution into factors. The modified DH scheme was applied to point-to-multicasting, and broadcasting networks via satellite.
Generallization of Semi-bent functions and their Construction Method
Park, Sang-Woo ; Chee, Seong-Taek ; Kim, Kwang-Jo ;
Journal of the Korea Institute of Information Security and Cryptology, volume 6, issue 3, 1996, Pages 31~40
In [4, 12], Chee et al. proposed a new class of cryptographic primitive, 'semi-bent functions', which exists on only odd dimensional vector spaces . In this paper, we discuss new notion of generalized semi-bent functions which can be defined on any vector spaces. And we suggest systematic methods for constructing generalized semi-bent functions and analyse their cryptographic properties. In addition, we show that SUC fulfilling Boolean functions can be found on any dimensional vector spaces.
Implementation of the Authorization Model for the Database Server of BADA-III system
Kim, Young-Kyun ; Cho, Ok-Ja ;
Journal of the Korea Institute of Information Security and Cryptology, volume 6, issue 3, 1996, Pages 41~56
Database servers that are used to provide multimedia information services in World Wide Web(WWW) environment have to support the access control mechanism that allows authorized users to access the constructed databases. In this paper, we define an authorization model as well as authorization policies to enforce the proper access control on databases in the BADA-III object-oriented database server and propose an access evaluation algorithm. Also we implement this model and the algorithm in the BADA-III database server. Considering the service environment of the WWW, we expect that database service providers can simply and effectively protect their data using the proposed model.
Proposal of ID-Based Cryptosystems Integrating Digital Signature and Key Distribution
Ha, Jae-Cheol ; Moon, Sang-Jae ;
Journal of the Korea Institute of Information Security and Cryptology, volume 6, issue 3, 1996, Pages 57~70
It would be desirable in network to implement an efficient asymmetric key cryptosystem which can not only solve the public key authentication problem but also integrate digital signature and key distribution, We propose two ID-based key distribution systems integrated with digital signature, and analyze them in computation and implementation. The first is based on the EIGamal-typed signature scheme, and the second is based on the RSA scheme, Both can be employed in one-pass and interactive key distribution systems.
A Rate Allocation Algorithm with Virtually Reduced Feedback Delay
Song, Joo-Seok ;
Journal of the Korea Institute of Information Security and Cryptology, volume 6, issue 3, 1996, Pages 71~86
In this paper we propose an explicit rate allocation algorithm for ATM(Asynchronous Transfer Mode) Networks using the available bit rate(ABR) class of service and study the performance of this algorithm. We examine the behavior of ABR traffic with the suggested algorithm, and demonstrate that the algorithm is fair and maintains network efficiency with low cell loss rate. The simulation results show substantial improvements in fairness and efficiency over the existing algorithms.