Browse > Article List

논문
1 Efficient Bit-Parallel Multiplier for Binary Field Defind by Equally-Spaced Irreducible Polynomials
Lee, Ok-Suk;Chang, Nam-Su;Kim, Chang-Han;Hong, Seok-Hie; / Korea Institute of Information Security and Cryptology , v.18, no.2, pp.3-10,
2 Smart card based three party key exchange protocol without server's aid
Kim, Yong-Hun;Youn, Taek-Young;Park, Young-Ho; / Korea Institute of Information Security and Cryptology , v.18, no.2, pp.11-20,
3 A Study on UICC(Universal IC Card)-based Authentication Mechanism using OTP
Kang, Soo-Young;Lee, Im-Yeong; / Korea Institute of Information Security and Cryptology , v.18, no.2, pp.21-31,
4 Fast Algorithm for Polynomial Reconstruction of Fuzzy Fingerprint Vault
Choi, Woo-Yong;Lee, Sung-Ju;Chung, Yong-Wha;Moon, Ki-Young; / Korea Institute of Information Security and Cryptology , v.18, no.2, pp.33-38,
5 Performance Enhancement of Differential Power Analysis Attack with Signal Companding Methods
Ryoo, Jeong-Choon;Han, Dong-Guk;Kim, Sung-Kyoung;Kim, Hee-Seok;Kim, Tae-Hyun;Lee, Sang-Jin; / Korea Institute of Information Security and Cryptology , v.18, no.2, pp.39-47,
6 Analysis of Access Authorization Conflict for Partial Information Hiding of RDF Web Document
Kim, Jae-Hoon;Park, Seog; / Korea Institute of Information Security and Cryptology , v.18, no.2, pp.49-63,
7 Design and Implementation of the Cdma2000 EV-DO security layer supporting Hardware using FPGA
Kwon, Hwan-Woo;Lee, Ki-Man;Yang, Jong-Won;Seo, Chang-Ho;Ha, Kyung-Ju; / Korea Institute of Information Security and Cryptology , v.18, no.2, pp.65-73,
8 A Countermeasure Resistant to Fault Attacks on CRT-RSA using Fault Infective Method
Ha, Jae-Cheol;Park, Jea-Hoon;Moon, Sang-Jae; / Korea Institute of Information Security and Cryptology , v.18, no.2, pp.75-84,
9 A Code Block Cipher Method to Protect Application Programs From Reverse Engineering
Jung, Dong-Woo;Kim, Hyong-Shik;Park, Joong-Gil; / Korea Institute of Information Security and Cryptology , v.18, no.2, pp.85-96,
10 Selection of Detection Measures for Malicious Codes using Naive Estimator
Mun, Gil-Jong;Kim, Yong-Min; / Korea Institute of Information Security and Cryptology , v.18, no.2, pp.97-105,
11 Authentication Mechanism for Secure Binding Update and Fast Handover in the Generalized Hierarchical MIPv6
Park, Chang-Seop;Kang, Hyun-Sun; / Korea Institute of Information Security and Cryptology , v.18, no.2, pp.107-115,
12 Efficient Authentication Protocol for Low-Cost RFID System
Kim, Jin-Ho;Seo, Jae-Woo;Lee, Pil-Joong; / Korea Institute of Information Security and Cryptology , v.18, no.2, pp.117-128,
13 Improved Bayesian Filtering mechanism to reduce the false positives by training both Sending and Receiving e-mails
Kim, Doo-Hwan;You, Jong-Duck;Jung, Sou-Hwan; / Korea Institute of Information Security and Cryptology , v.18, no.2, pp.129-137,
14 Vulnerability and Security Requirement Analysis on Security Token and Protection Profile Development based on Common Criteria Version 3.1
Kwak, Jin;Hong, Soon-Won;Yi, Wan-Suck; / Korea Institute of Information Security and Cryptology , v.18, no.2, pp.139-150,