Browse > Article List

논문
1 Self Re-Encryption Protocol (SREP) providing Strong Privacy for Low-Cost RFID System
Park Jeong-Su;Choi Eun-Young;Lee Su-Mi;Lee Dong-Hoon; / Korea Institute of Information Security and Cryptology , v.16, no.4, pp.3-12,
2 Tag Identification Time Reduction Scheme of Back-End Server for Secure RFID Privacy Protection Protocol
Yeo Sang-Soo;Kim Soon-Seok;Kim Sung-Kwon; / Korea Institute of Information Security and Cryptology , v.16, no.4, pp.13-26,
3 2-Subset Difference Scheme for Broadcast Encryption
Jang Ji-Yong;Song Joo-Seok;Nyang Dae-Hun; / Korea Institute of Information Security and Cryptology , v.16, no.4, pp.27-32,
4 A Novel Redundant Binary Montgomery Multiplier and Hardware Architecture
Lim Dae-Sung;Chang Nam-Su;Ji Sung-Yeon;Kim Sung-Kyoung;Lee Sang-Jin;Koo Bon-Seok; / Korea Institute of Information Security and Cryptology , v.16, no.4, pp.33-41,
5 Secure Component Composition for Practical Systems
Lee Eun-Young; / Korea Institute of Information Security and Cryptology , v.16, no.4, pp.43-57,
6 Development of Side Channel Attack Analysis Tool on Smart Card
Han Dong-Ho;Park Jea-Hoon;Ha Jae-Cheol;Lee Sung-Jae;Moon Sang-Jae; / Korea Institute of Information Security and Cryptology , v.16, no.4, pp.59-68,
7 An Efficient Method of Forensics Evidence Collection at the Time of Infringement Occurrence
Choi Yoon-Ho;Park Jong-Ho;Kim Sang-Kon;Kang Yu;Choe Jin-Gi;Moon Ho-Gun;Rhee Myung-Su;Seo Seung-Woo; / Korea Institute of Information Security and Cryptology , v.16, no.4, pp.69-81,
8 A New Parallel Multiplier for Type II Optimal Normal Basis
Kim Chang-Han;Jang Sang-Woon;Lim Jong-In;Ji Sung-Yeon; / Korea Institute of Information Security and Cryptology , v.16, no.4, pp.83-89,
9 Analysis of Level of Difficulty of Fingerprint Database by matching Orientation field
Park Noh-Jun;Moon Ji-Hyun;Kim Hak-Il; / Korea Institute of Information Security and Cryptology , v.16, no.4, pp.91-103,
10 Statistical Analysis for Assessment of Fingerprint Sensors
Nam Jung-Woo;Kim Hak-Il; / Korea Institute of Information Security and Cryptology , v.16, no.4, pp.105-118,
11 A Voter Verifiable Receipt in Electronic Voting with Improved Reliability
Lee Kwang-Woo;Lee Yun-Ho;Won Dong-Ho;Kim Seung-Joo; / Korea Institute of Information Security and Cryptology , v.16, no.4, pp.119-126,
12 Design of a Security System to Defeat Abnormal IPSec Traffic in IPv6 Networks
Kim Ka-Eul;Ko Kwang-Sun;Gyeong Gye-Hyeon;Kang Seong-Goo;Eom Young-Ik; / Korea Institute of Information Security and Cryptology , v.16, no.4, pp.127-138,
13 Secure Authenticated key Exchange Protocol using Signcryption Scheme
Kim Rack-Hyun;Youm Heung-Youl; / Korea Institute of Information Security and Cryptology , v.16, no.4, pp.139-146,