Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0349-Part2 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2019-12-11 ÃÑÆäÀÌÁö 74
ÇѱÛÇ¥ÁØ¸í °ÝÀÚ ±â¹Ý ¾çÀÚ³»¼º¾ÏÈ£ - Á¦2ºÎ: ¸µ-¸®ÀÚµå(Ring-Lizard) ¾Ë°í¸®Áò
¿µ¹®Ç¥Áظí Lattice-based Post Quantum Cryptography - Part 2: Ring-Lizard Algorithm
Çѱ۳»¿ë¿ä¾à ÀÌ Ç¥ÁØÀº IND-CCA2 ¾ÈÀü¼ºÀ» °¡Áö´Â ¸µ-¸®ÀÚµå Å° ĸ½¶È­ ¹æ½ÄÀÇ Å° »ý¼º, ĸ½¶È­, µðĸ½¶È­ °úÁ¤°ú ¾Ï¡¤º¹È£È­ ¾Ë°í¸®ÁòÀÇ Å° »ý¼º, ¾Ï¡¤º¹È£È­ °úÁ¤, ´Ù¾çÇÑ ¾ÈÀü¼ºÀ» ¸¸Á·ÇÏ´Â ÆĶó¹ÌÅ͸¦ Á¦½ÃÇÏ°í ÀÖ´Ù.
¿µ¹®³»¿ë¿ä¾à The standard provides key generation, encapsulation/encryption and decapsulation/decryption mecahnism of Ring-Lizard and various parameters that can be secure in different conditions.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0349-Part2.pdf TTAK.KO-12.0349-Part2.pdf            

ÀÌÀü
ºÐ»êID¸¦ È°¿ëÇÑ ½Å¿ø°ü¸® ÇÁ·¹ÀÓ¿öÅ© Á¦2ºÎ: ½Å¿øÁõ¸í ¹× »óÈ£¿¬µ¿ ¹æ¹ý
´ÙÀ½
Ŭ¶ó¿ìµå ±â¹Ý ´ÙÁß ¹é½Å ¼­ºñ½ºÀÇ ½Ã½ºÅÛ ¿ä±¸»çÇ×