|
1 |
Efficient Bit-Parallel Multiplier for Binary Field Defind by Equally-Spaced Irreducible Polynomials
Lee, Ok-Suk;Chang, Nam-Su;Kim, Chang-Han;Hong, Seok-Hie;
/
Korea Institute of Information Security and Cryptology
, v.18, no.2, pp.3-10,
|
|
2 |
Smart card based three party key exchange protocol without server's aid
Kim, Yong-Hun;Youn, Taek-Young;Park, Young-Ho;
/
Korea Institute of Information Security and Cryptology
, v.18, no.2, pp.11-20,
|
|
3 |
A Study on UICC(Universal IC Card)-based Authentication Mechanism using OTP
Kang, Soo-Young;Lee, Im-Yeong;
/
Korea Institute of Information Security and Cryptology
, v.18, no.2, pp.21-31,
|
|
4 |
Fast Algorithm for Polynomial Reconstruction of Fuzzy Fingerprint Vault
Choi, Woo-Yong;Lee, Sung-Ju;Chung, Yong-Wha;Moon, Ki-Young;
/
Korea Institute of Information Security and Cryptology
, v.18, no.2, pp.33-38,
|
|
5 |
Performance Enhancement of Differential Power Analysis Attack with Signal Companding Methods
Ryoo, Jeong-Choon;Han, Dong-Guk;Kim, Sung-Kyoung;Kim, Hee-Seok;Kim, Tae-Hyun;Lee, Sang-Jin;
/
Korea Institute of Information Security and Cryptology
, v.18, no.2, pp.39-47,
|
|
6 |
Analysis of Access Authorization Conflict for Partial Information Hiding of RDF Web Document
Kim, Jae-Hoon;Park, Seog;
/
Korea Institute of Information Security and Cryptology
, v.18, no.2, pp.49-63,
|
|
7 |
Design and Implementation of the Cdma2000 EV-DO security layer supporting Hardware using FPGA
Kwon, Hwan-Woo;Lee, Ki-Man;Yang, Jong-Won;Seo, Chang-Ho;Ha, Kyung-Ju;
/
Korea Institute of Information Security and Cryptology
, v.18, no.2, pp.65-73,
|
|
8 |
A Countermeasure Resistant to Fault Attacks on CRT-RSA using Fault Infective Method
Ha, Jae-Cheol;Park, Jea-Hoon;Moon, Sang-Jae;
/
Korea Institute of Information Security and Cryptology
, v.18, no.2, pp.75-84,
|
|
9 |
A Code Block Cipher Method to Protect Application Programs From Reverse Engineering
Jung, Dong-Woo;Kim, Hyong-Shik;Park, Joong-Gil;
/
Korea Institute of Information Security and Cryptology
, v.18, no.2, pp.85-96,
|
|
10 |
Selection of Detection Measures for Malicious Codes using Naive Estimator
Mun, Gil-Jong;Kim, Yong-Min;
/
Korea Institute of Information Security and Cryptology
, v.18, no.2, pp.97-105,
|
|
11 |
Authentication Mechanism for Secure Binding Update and Fast Handover in the Generalized Hierarchical MIPv6
Park, Chang-Seop;Kang, Hyun-Sun;
/
Korea Institute of Information Security and Cryptology
, v.18, no.2, pp.107-115,
|
|
12 |
Efficient Authentication Protocol for Low-Cost RFID System
Kim, Jin-Ho;Seo, Jae-Woo;Lee, Pil-Joong;
/
Korea Institute of Information Security and Cryptology
, v.18, no.2, pp.117-128,
|
|
13 |
Improved Bayesian Filtering mechanism to reduce the false positives by training both Sending and Receiving e-mails
Kim, Doo-Hwan;You, Jong-Duck;Jung, Sou-Hwan;
/
Korea Institute of Information Security and Cryptology
, v.18, no.2, pp.129-137,
|
|
14 |
Vulnerability and Security Requirement Analysis on Security Token and Protection Profile Development based on Common Criteria Version 3.1
Kwak, Jin;Hong, Soon-Won;Yi, Wan-Suck;
/
Korea Institute of Information Security and Cryptology
, v.18, no.2, pp.139-150,
|
|