|
1 |
Improved Group Key Exchange Scheme Secure Against Session-State Reveal Attacks
Kim, Ki-Tak;Kwon, Jeong-Ok;Hong, Do-Won;Lee, Dong-Hoon;
/
Korea Institute of Information Security and Cryptology
, v.18, no.3, pp.3-8,
|
|
2 |
TinyECCK : Efficient Implementation of Elliptic Curve Cryptosystem over GF on 8-bit Micaz Mote
Seo, Seog-Chung;Han, Dong-Guk;Hong, Seok-Hie;
/
Korea Institute of Information Security and Cryptology
, v.18, no.3, pp.9-21,
|
|
3 |
High-Speed Implementations of Block Ciphers on Graphics Processing Units Using CUDA Library
Yeom, Yong-Jin;Cho, Yong-Kuk;
/
Korea Institute of Information Security and Cryptology
, v.18, no.3, pp.23-32,
|
|
4 |
Efficient Finite Field Arithmetic Architectures for Pairing Based Cryptosystems
Chang, Nam-Su;Kim, Tae-Hyun;Kim, Chang-Han;Han, Dong-Guk;Kim, Ho-Won;
/
Korea Institute of Information Security and Cryptology
, v.18, no.3, pp.33-44,
|
|
5 |
Design of an Operator Architecture for Finite Fields in Constrained Environments
Jung, Seok-Won;
/
Korea Institute of Information Security and Cryptology
, v.18, no.3, pp.45-50,
|
|
6 |
The Security Problem Analysis for Reversibility of Transformed Biometric Information Data on Eigenvector-based face Authentication
Kim, Koon-Soon;Kang, Jeon-Il;Nyang, Dae-Hun;Lee, Kyung-Hee;
/
Korea Institute of Information Security and Cryptology
, v.18, no.3, pp.51-59,
|
|
7 |
Quality Assessment of Fingerprint Images and Correlation with Recognition Performance
Shin, Yong-Nyuo;Sung, Won-Je;Jung, Soon-Won;
/
Korea Institute of Information Security and Cryptology
, v.18, no.3, pp.61-68,
|
|
8 |
A High-speed Masking Method to protect ARIA against Side Channel Analysis
Kim, Hee-Seok;Kim, Tae-Hyun;Ryoo, Jeong-Choon;Han, Dong-Guk;Hong, Seok-Hie;
/
Korea Institute of Information Security and Cryptology
, v.18, no.3, pp.69-77,
|
|
9 |
A Multiple Pattern Matching Scheme to Improve Rule Application Performance
Lee, Jae-Kook;Kim, Hyong-Shik;
/
Korea Institute of Information Security and Cryptology
, v.18, no.3, pp.79-88,
|
|
10 |
Analysis of an Intrinsic Vulnerability on Keyboard Security
Yim, Kang-Bin;Bae, Kwang-Jin;
/
Korea Institute of Information Security and Cryptology
, v.18, no.3, pp.89-95,
|
|
11 |
Mutual Authentication Scheme of Mobile Routers Using Temporary Certificate in MANEMO
Roh, Hyo-Sun;Jung, Sou-Hwan;
/
Korea Institute of Information Security and Cryptology
, v.18, no.3, pp.97-107,
|
|
12 |
Performance Evaluation of VoIP Security Protocols
Shin, Young-Chan;Kim, Kyu-Young;Kim, Min-Young;Kim, Joong-Man;Won, Yoo-Jae;Ryou, Jae-Cheol;
/
Korea Institute of Information Security and Cryptology
, v.18, no.3, pp.109-120,
|
|
13 |
A Study for Rule Integration in Vulnerability Assessment and Intrusion Detection using Meaning Based Vulnerability Identification Method
Kim, Hyung-Jong;Jung, Tae-In;
/
Korea Institute of Information Security and Cryptology
, v.18, no.3, pp.121-129,
|
|
14 |
An Empirical Study on Factors Affecting the Maturity of Information Security Policy
Choi, Myeong-Gil;Hwang, Won-Joo;Kim, Myoung-Soo;
/
Korea Institute of Information Security and Cryptology
, v.18, no.3, pp.131-142,
|
|
15 |
Information Hiding and Detection in MS Office 2007 file
Park, Bo-Ra;Park, Jung-Heum;Lee, Sang-Jin;
/
Korea Institute of Information Security and Cryptology
, v.18, no.3, pp.143-154,
|
|
16 |
Digital Video Watermarking Using Frame Division And 3D Wavelet Transform
Kim, Kwang-Il;Cui, Jizhe;Kim, Jong-Weon;Choi, Jong-Uk;
/
Korea Institute of Information Security and Cryptology
, v.18, no.3, pp.155-162,
|
|