Browse > Article List

논문
1 An E-Mail Protocol Providing Forward Secrecy without Using Certificated Public Keys
Kwon, Jeong-Ok;Koo, Young-Ju;Jeong, Ik-Rae;Lee, Dong-Hoon; / Korea Institute of Information Security and Cryptology , v.19, no.1, pp.3-11,
2 Multiple Impossible Differential Cryptanalysis of Block Cipher CLEFIA and ARIA
Choi, Joon-Geun;Kim, Jong-Sung;Sung, Jae-Chul;Hong, Seok-Hie; / Korea Institute of Information Security and Cryptology , v.19, no.1, pp.13-24,
3 Study on Weak-Key Classes for KeeLoq
Lee, Yu-Seop;Kim, Jong-Sung;Hong, Seok-Hie; / Korea Institute of Information Security and Cryptology , v.19, no.1, pp.25-32,
4 Conditionally Traceable Pseudonym Protocol based on Oblivious Transfer
Kang, Jeon-Il;Nyang, Dae-Hun;Lee, Kyung-Hee; / Korea Institute of Information Security and Cryptology , v.19, no.1, pp.33-42,
5 Performance Improvement of Power Attacks with Truncated Differential Cryptanalysis
Kang, Tae-Sun;Kim, Hee-Seok;Kim, Tae-Hyun;Kim, Jong-Sung;Hong, Seok-Hie; / Korea Institute of Information Security and Cryptology , v.19, no.1, pp.43-51,
6 Collision Attacks on Crypton and mCrypton
Kim, Tae-Woong;Kim, Jong-Sung;Jeong, Ki-Tae;Sung, Jae-Chul;Lee, Sang-Jin; / Korea Institute of Information Security and Cryptology , v.19, no.1, pp.53-62,
7 Improved Security for Fuzzy Fingerprint Vault Using Secret Sharing over a Security Token and a Server
Choi, Han-Na;Lee, Sung-Ju;Moon, Dae-Sung;Choi, Woo-Yong;Chung, Yong-Wha;Pan, Sung-Bum; / Korea Institute of Information Security and Cryptology , v.19, no.1, pp.63-70,
8 An Efficient Method for Detecting Denial of Service Attacks Using Kernel Based Data
Chung, Man-Hyun;Cho, Jae-Ik;Chae, Soo-Young;Moon, Jong-Sub; / Korea Institute of Information Security and Cryptology , v.19, no.1, pp.71-79,
9 A Secure and Efficient Roaming Mechanism for Centralized WLAN Environment
Park, Chang-Seop;Woo, Byung-Duk;Lim, Jeong-Mi; / Korea Institute of Information Security and Cryptology , v.19, no.1, pp.81-92,
10 A Study on the Analysis and Detection Method for Protecting Malware Spreading via E-mail
Yang, Kyeong-Cheol;Lee, Su-Yeon;Park, Won-Hyung;Park, Kwang-Cheol;Lim, Jong-In; / Korea Institute of Information Security and Cryptology , v.19, no.1, pp.93-101,
11 A Study on the Improvement of Effectiveness in National Cyber Security Monitoring and Control Services
Kim, Young-Jin;Lee, Su-Yeon;Kwon, Hun-Yeong;Lim, Jong-In; / Korea Institute of Information Security and Cryptology , v.19, no.1, pp.103-111,
12 Cognitive Approach to Anti-Phishing and Anti-Pharming
Kim, Ju-Hyun;Maeng, Young-Jae;Nyang, Dae-Hun;Lee, Kyung-Hee; / Korea Institute of Information Security and Cryptology , v.19, no.1, pp.113-124,
13 Fuzzy Fingerprint Vault using Multiple Polynomials
Moon, Dae-Sung;Choi, Woo-Yong;Moon, Ki-Young; / Korea Institute of Information Security and Cryptology , v.19, no.1, pp.125-133,
14 An Anti-Virus Vaccine Selection Model Based on Stackelberg Game
Sung, Si-Il;Choi, In-Chan; / Korea Institute of Information Security and Cryptology , v.19, no.1, pp.135-144,