Browse > Article List

논문
1 Memory-efficient Public Key Encryption with Keyword Search in Server
Kwon, Eun-Jeong;Seo, Jae-Woo;Lee, Pil-Joong;Park, Young-Man;Lee, Hae-Gyu;Kim, Yeong-Heon;Chong, Hak-Jin; / Korea Institute of Information Security and Cryptology , v.18, no.4, pp.3-15,
2 Secure RSA with CRT Protected Against Fault Attacks without using Checking Procedure
Kim, Sung-Kyoung;Kim, Tae-Hyun;Han, Dong-Guk;Park, Young-Ho;Hong, Seok-Hie; / Korea Institute of Information Security and Cryptology , v.18, no.4, pp.17-25,
3 Security Analysis on the Full-Round SCO-1
Jeong, Ki-Tae;Lee, Chang-Hoon;Kim, Jong-Sung;Hong, Seok-Hie; / Korea Institute of Information Security and Cryptology , v.18, no.4, pp.27-35,
4 Differential Cryptanalysis of a 20-Round Reduced SMS4 Block Cipher
Kim, Tae-Hyun;Kim, Jong-Sung;Sung, Jae-Chul;Hong, Seok-Hie; / Korea Institute of Information Security and Cryptology , v.18, no.4, pp.37-44,
5 The Related-Key Attack on Grain-v1
Lee, Yu-Seop;Jung, Ki-Tae;Sung, Jae-Chul;Hong, Seok-Hie; / Korea Institute of Information Security and Cryptology , v.18, no.4, pp.45-52,
6 An Analysis of Privacy and Accuracy for Privacy-Preserving Techniques by Matrix-based Randomization
Kang, Ju-Sung;An, A-Ron;Hong, Do-Won; / Korea Institute of Information Security and Cryptology , v.18, no.4, pp.53-68,
7 Improving The Security Of Quantum Key Distribution And Quantum Authentication By Using CHSH Inequality
Heo, Jin-O;Hong, Chang-Ho;Lim, Jong-In;Yang, Hyoung-Jin; / Korea Institute of Information Security and Cryptology , v.18, no.4, pp.69-78,
8 A Secure Maintenance Scheme of Secret Data on Trusted Mobile Platform Environment
Kang, Dong-Wan;Lee, Im-Yeong;Han, Jin-Hee;Jun, Sung-Ik; / Korea Institute of Information Security and Cryptology , v.18, no.4, pp.79-91,
9 Development of Template Compensation Algorithm for Interoperable Fingerprint Recognition using Taylor Series
Jang, Ji-Hyeon;Kim, Hak-Il; / Korea Institute of Information Security and Cryptology , v.18, no.4, pp.93-102,
10 Designing Reliable P2P Transmission Mechanism Against MITM Attack
Kim, Sang-Choon;Kwon, Hyeonk-Chan;Nah, Jae-Hoon; / Korea Institute of Information Security and Cryptology , v.18, no.4, pp.103-109,
11 An Extended SAML Delegation Model Based on Multi-Agent for Secure Web Services
Kim, Kyu-Il;Won, Dong-Ho;Kim, Ung-Mo; / Korea Institute of Information Security and Cryptology , v.18, no.4, pp.111-122,
12 The Effects of Security Policies, Security Awareness and Individual Characteristics on Password Security Effectiveness
Kim, Jong-Ki;Kang, Da-Yeon; / Korea Institute of Information Security and Cryptology , v.18, no.4, pp.123-133,
13 A Study on Risk Analysis Methode Using Case-Based Reasoning
Lee, Hyeak-Ro;Ahn, Seong-Jin; / Korea Institute of Information Security and Cryptology , v.18, no.4, pp.135-141,
14 Proposal for Service Model for Internet Identity Management
Song, Jung-Hwan;Kang, Yeon-Jung;Jang, Hwan-Seok; / Korea Institute of Information Security and Cryptology , v.18, no.4, pp.143-152,
15 Image-based CAPTCHA Using Multi-Image Composition and Its Secure Operation
Kang, Jeon-Il;Maeng, Young-Je;Kim, Koon-Soon;Nyang, Dae-Hun;Lee, Kyung-Hee; / Korea Institute of Information Security and Cryptology , v.18, no.4, pp.153-166,
16 Improvement of AACS Security Framework with Access Control to Personal Contents
Kim, Dae-Youb; / Korea Institute of Information Security and Cryptology , v.18, no.4, pp.167-174,
17 Determinant Whether the Data Fragment in Unallocated Space is Compressed or Not and Decompressing of Compressed Data Fragment
Park, Bo-Ra;Lee, Sang-Jin; / Korea Institute of Information Security and Cryptology , v.18, no.4, pp.175-185,
18 Countermeasures to the Vulnerability of the Keyboard Hardware
Jeong, Tae-Young;Yim, Kang-Bin; / Korea Institute of Information Security and Cryptology , v.18, no.4, pp.187-194,