Ȩ > Ç¥ÁØÈ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ
Ç¥ÁعøÈ£ | TTAK.KO-12.0349-Part2 | ±¸Ç¥ÁعøÈ£ | |
---|---|---|---|
Á¦°³Á¤ÀÏ | 2019-12-11 | ÃÑÆäÀÌÁö | 74 |
ÇѱÛÇ¥Áظí | °ÝÀÚ ±â¹Ý ¾çÀÚ³»¼º¾ÏÈ£ - Á¦2ºÎ: ¸µ-¸®ÀÚµå(Ring-Lizard) ¾Ë°í¸®Áò | ||
¿µ¹®Ç¥Áظí | Lattice-based Post Quantum Cryptography - Part 2: Ring-Lizard Algorithm | ||
Çѱ۳»¿ë¿ä¾à | ÀÌ Ç¥ÁØÀº IND-CCA2 ¾ÈÀü¼ºÀ» °¡Áö´Â ¸µ-¸®ÀÚµå Å° ĸ½¶È ¹æ½ÄÀÇ Å° »ý¼º, ĸ½¶È, µðĸ½¶È °úÁ¤°ú ¾Ï¡¤º¹È£È ¾Ë°í¸®ÁòÀÇ Å° »ý¼º, ¾Ï¡¤º¹È£È °úÁ¤, ´Ù¾çÇÑ ¾ÈÀü¼ºÀ» ¸¸Á·ÇÏ´Â ÆĶó¹ÌÅ͸¦ Á¦½ÃÇÏ°í ÀÖ´Ù. | ||
¿µ¹®³»¿ë¿ä¾à | The standard provides key generation, encapsulation/encryption and decapsulation/decryption mecahnism of Ring-Lizard and various parameters that can be secure in different conditions. | ||
±¹Á¦Ç¥ÁØ | |||
°ü·ÃÆÄÀÏ | TTAK.KO-12.0349-Part2.pdf |