Browse > Article List

논문
1 Improved Group Key Exchange Scheme Secure Against Session-State Reveal Attacks
Kim, Ki-Tak;Kwon, Jeong-Ok;Hong, Do-Won;Lee, Dong-Hoon; / Korea Institute of Information Security and Cryptology , v.18, no.3, pp.3-8,
2 TinyECCK : Efficient Implementation of Elliptic Curve Cryptosystem over GF$(2^m)$ on 8-bit Micaz Mote
Seo, Seog-Chung;Han, Dong-Guk;Hong, Seok-Hie; / Korea Institute of Information Security and Cryptology , v.18, no.3, pp.9-21,
3 High-Speed Implementations of Block Ciphers on Graphics Processing Units Using CUDA Library
Yeom, Yong-Jin;Cho, Yong-Kuk; / Korea Institute of Information Security and Cryptology , v.18, no.3, pp.23-32,
4 Efficient Finite Field Arithmetic Architectures for Pairing Based Cryptosystems
Chang, Nam-Su;Kim, Tae-Hyun;Kim, Chang-Han;Han, Dong-Guk;Kim, Ho-Won; / Korea Institute of Information Security and Cryptology , v.18, no.3, pp.33-44,
5 Design of an Operator Architecture for Finite Fields in Constrained Environments
Jung, Seok-Won; / Korea Institute of Information Security and Cryptology , v.18, no.3, pp.45-50,
6 The Security Problem Analysis for Reversibility of Transformed Biometric Information Data on Eigenvector-based face Authentication
Kim, Koon-Soon;Kang, Jeon-Il;Nyang, Dae-Hun;Lee, Kyung-Hee; / Korea Institute of Information Security and Cryptology , v.18, no.3, pp.51-59,
7 Quality Assessment of Fingerprint Images and Correlation with Recognition Performance
Shin, Yong-Nyuo;Sung, Won-Je;Jung, Soon-Won; / Korea Institute of Information Security and Cryptology , v.18, no.3, pp.61-68,
8 A High-speed Masking Method to protect ARIA against Side Channel Analysis
Kim, Hee-Seok;Kim, Tae-Hyun;Ryoo, Jeong-Choon;Han, Dong-Guk;Hong, Seok-Hie; / Korea Institute of Information Security and Cryptology , v.18, no.3, pp.69-77,
9 A Multiple Pattern Matching Scheme to Improve Rule Application Performance
Lee, Jae-Kook;Kim, Hyong-Shik; / Korea Institute of Information Security and Cryptology , v.18, no.3, pp.79-88,
10 Analysis of an Intrinsic Vulnerability on Keyboard Security
Yim, Kang-Bin;Bae, Kwang-Jin; / Korea Institute of Information Security and Cryptology , v.18, no.3, pp.89-95,
11 Mutual Authentication Scheme of Mobile Routers Using Temporary Certificate in MANEMO
Roh, Hyo-Sun;Jung, Sou-Hwan; / Korea Institute of Information Security and Cryptology , v.18, no.3, pp.97-107,
12 Performance Evaluation of VoIP Security Protocols
Shin, Young-Chan;Kim, Kyu-Young;Kim, Min-Young;Kim, Joong-Man;Won, Yoo-Jae;Ryou, Jae-Cheol; / Korea Institute of Information Security and Cryptology , v.18, no.3, pp.109-120,
13 A Study for Rule Integration in Vulnerability Assessment and Intrusion Detection using Meaning Based Vulnerability Identification Method
Kim, Hyung-Jong;Jung, Tae-In; / Korea Institute of Information Security and Cryptology , v.18, no.3, pp.121-129,
14 An Empirical Study on Factors Affecting the Maturity of Information Security Policy
Choi, Myeong-Gil;Hwang, Won-Joo;Kim, Myoung-Soo; / Korea Institute of Information Security and Cryptology , v.18, no.3, pp.131-142,
15 Information Hiding and Detection in MS Office 2007 file
Park, Bo-Ra;Park, Jung-Heum;Lee, Sang-Jin; / Korea Institute of Information Security and Cryptology , v.18, no.3, pp.143-154,
16 Digital Video Watermarking Using Frame Division And 3D Wavelet Transform
Kim, Kwang-Il;Cui, Jizhe;Kim, Jong-Weon;Choi, Jong-Uk; / Korea Institute of Information Security and Cryptology , v.18, no.3, pp.155-162,