|
1 |
An E-Mail Protocol Providing Forward Secrecy without Using Certificated Public Keys
Kwon, Jeong-Ok;Koo, Young-Ju;Jeong, Ik-Rae;Lee, Dong-Hoon;
/
Korea Institute of Information Security and Cryptology
, v.19, no.1, pp.3-11,
|
|
2 |
Multiple Impossible Differential Cryptanalysis of Block Cipher CLEFIA and ARIA
Choi, Joon-Geun;Kim, Jong-Sung;Sung, Jae-Chul;Hong, Seok-Hie;
/
Korea Institute of Information Security and Cryptology
, v.19, no.1, pp.13-24,
|
|
3 |
Study on Weak-Key Classes for KeeLoq
Lee, Yu-Seop;Kim, Jong-Sung;Hong, Seok-Hie;
/
Korea Institute of Information Security and Cryptology
, v.19, no.1, pp.25-32,
|
|
4 |
Conditionally Traceable Pseudonym Protocol based on Oblivious Transfer
Kang, Jeon-Il;Nyang, Dae-Hun;Lee, Kyung-Hee;
/
Korea Institute of Information Security and Cryptology
, v.19, no.1, pp.33-42,
|
|
5 |
Performance Improvement of Power Attacks with Truncated Differential Cryptanalysis
Kang, Tae-Sun;Kim, Hee-Seok;Kim, Tae-Hyun;Kim, Jong-Sung;Hong, Seok-Hie;
/
Korea Institute of Information Security and Cryptology
, v.19, no.1, pp.43-51,
|
|
6 |
Collision Attacks on Crypton and mCrypton
Kim, Tae-Woong;Kim, Jong-Sung;Jeong, Ki-Tae;Sung, Jae-Chul;Lee, Sang-Jin;
/
Korea Institute of Information Security and Cryptology
, v.19, no.1, pp.53-62,
|
|
7 |
Improved Security for Fuzzy Fingerprint Vault Using Secret Sharing over a Security Token and a Server
Choi, Han-Na;Lee, Sung-Ju;Moon, Dae-Sung;Choi, Woo-Yong;Chung, Yong-Wha;Pan, Sung-Bum;
/
Korea Institute of Information Security and Cryptology
, v.19, no.1, pp.63-70,
|
|
8 |
An Efficient Method for Detecting Denial of Service Attacks Using Kernel Based Data
Chung, Man-Hyun;Cho, Jae-Ik;Chae, Soo-Young;Moon, Jong-Sub;
/
Korea Institute of Information Security and Cryptology
, v.19, no.1, pp.71-79,
|
|
9 |
A Secure and Efficient Roaming Mechanism for Centralized WLAN Environment
Park, Chang-Seop;Woo, Byung-Duk;Lim, Jeong-Mi;
/
Korea Institute of Information Security and Cryptology
, v.19, no.1, pp.81-92,
|
|
10 |
A Study on the Analysis and Detection Method for Protecting Malware Spreading via E-mail
Yang, Kyeong-Cheol;Lee, Su-Yeon;Park, Won-Hyung;Park, Kwang-Cheol;Lim, Jong-In;
/
Korea Institute of Information Security and Cryptology
, v.19, no.1, pp.93-101,
|
|
11 |
A Study on the Improvement of Effectiveness in National Cyber Security Monitoring and Control Services
Kim, Young-Jin;Lee, Su-Yeon;Kwon, Hun-Yeong;Lim, Jong-In;
/
Korea Institute of Information Security and Cryptology
, v.19, no.1, pp.103-111,
|
|
12 |
Cognitive Approach to Anti-Phishing and Anti-Pharming
Kim, Ju-Hyun;Maeng, Young-Jae;Nyang, Dae-Hun;Lee, Kyung-Hee;
/
Korea Institute of Information Security and Cryptology
, v.19, no.1, pp.113-124,
|
|
13 |
Fuzzy Fingerprint Vault using Multiple Polynomials
Moon, Dae-Sung;Choi, Woo-Yong;Moon, Ki-Young;
/
Korea Institute of Information Security and Cryptology
, v.19, no.1, pp.125-133,
|
|
14 |
An Anti-Virus Vaccine Selection Model Based on Stackelberg Game
Sung, Si-Il;Choi, In-Chan;
/
Korea Institute of Information Security and Cryptology
, v.19, no.1, pp.135-144,
|
|