ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAK.KO-12.0349-Part2 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2019-12-11 ÃÑ ÆäÀÌÁö 74
ÇÑ±Û Ç¥ÁØ¸í °ÝÀÚ ±â¹Ý ¾çÀÚ³»¼º¾ÏÈ£ - Á¦2ºÎ: ¸µ-¸®ÀÚµå(Ring-Lizard) ¾Ë°í¸®Áò
¿µ¹® Ç¥Áظí Lattice-based Post Quantum Cryptography - Part 2: Ring-Lizard Algorithm
ÇÑ±Û ³»¿ë¿ä¾à ÀÌ Ç¥ÁØÀº IND-CCA2 ¾ÈÀü¼ºÀ» °¡Áö´Â ¸µ-¸®ÀÚµå Å° ĸ½¶È­ ¹æ½ÄÀÇ Å° »ý¼º, ĸ½¶È­, µðĸ½¶È­ °úÁ¤°ú ¾Ï¡¤º¹È£È­ ¾Ë°í¸®ÁòÀÇ Å° »ý¼º, ¾Ï¡¤º¹È£È­ °úÁ¤, ´Ù¾çÇÑ ¾ÈÀü¼ºÀ» ¸¸Á·ÇÏ´Â ÆĶó¹ÌÅ͸¦ Á¦½ÃÇÏ°í ÀÖ´Ù.
¿µ¹® ³»¿ë¿ä¾à The standard provides key generation, encapsulation/encryption and decapsulation/decryption mecahnism of Ring-Lizard and various parameters that can be secure in different conditions.
°ü·Ã IPR È®¾à¼­    [È®¾à¼­ º¸±â]
°ü·ÃÆÄÀÏ    TTAK.KO-12.0349-Part2.pdf TTAK.KO-12.0349-Part2.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
°ÝÀÚ ±â¹Ý ¾çÀÚ³»¼º¾ÏÈ£ - Á¦2ºÎ: ¸µ-¸®ÀÚµå(Ring-Lizard) ¾Ë°í¸®Áò TTAK.KO-12.0349-Part2 2019-12-11 Á¦Á¤ À¯È¿ 2019-034
TTAK.KO-12.0349-Part2.pdf