Ç¥ÁØÈ­ Âü¿©¾È³»

TTAÀÇ Ç¥ÁØÇöȲ

Ȩ > Ç¥ÁØÈ­ °³¿ä > TTAÀÇ Ç¥ÁØÇöȲ

Ç¥ÁعøÈ£ TTAK.KO-12.0349-Part2 ±¸Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2019-12-11 ÃÑÆäÀÌÁö 74
ÇѱÛÇ¥ÁØ¸í °ÝÀÚ ±â¹Ý ¾çÀÚ³»¼º¾ÏÈ£ - Á¦2ºÎ: ¸µ-¸®ÀÚµå(Ring-Lizard) ¾Ë°í¸®Áò
¿µ¹®Ç¥Áظí Lattice-based Post Quantum Cryptography - Part 2: Ring-Lizard Algorithm
Çѱ۳»¿ë¿ä¾à ÀÌ Ç¥ÁØÀº IND-CCA2 ¾ÈÀü¼ºÀ» °¡Áö´Â ¸µ-¸®ÀÚµå Å° ĸ½¶È­ ¹æ½ÄÀÇ Å° »ý¼º, ĸ½¶È­, µðĸ½¶È­ °úÁ¤°ú ¾Ï¡¤º¹È£È­ ¾Ë°í¸®ÁòÀÇ Å° »ý¼º, ¾Ï¡¤º¹È£È­ °úÁ¤, ´Ù¾çÇÑ ¾ÈÀü¼ºÀ» ¸¸Á·ÇÏ´Â ÆĶó¹ÌÅ͸¦ Á¦½ÃÇÏ°í ÀÖ´Ù.
¿µ¹®³»¿ë¿ä¾à The standard provides key generation, encapsulation/encryption and decapsulation/decryption mecahnism of Ring-Lizard and various parameters that can be secure in different conditions.
±¹Á¦Ç¥ÁØ
°ü·ÃÆÄÀÏ TTAK.KO-12.0349-Part2.pdf TTAK.KO-12.0349-Part2.pdf            

ÀÌÀü
°ÝÀÚ ±â¹Ý ¾çÀÚ³»¼º¾ÏÈ£ - Á¦1ºÎ: ÀϹÝ
´ÙÀ½
µ¥ÀÌÅÍ ºñ½Äº°È­ ¿ë¾î Á¤ÀÇ ¹× ó¸® °úÁ¤