|
1 |
Side-Channel Attacks on AES Based on Meet-in-the-Middle Technique
Kim, Jong-Sung;Hong, Seok-Hie;Lee, Sang-Jin;
/
Korea Institute of Information Security and Cryptology
, v.19, no.2, pp.3-9,
|
|
2 |
Power analysis attacks against NTRU and their countermeasures
Song, Jeong-Eun;Han, Dong-Guk;Lee, Mun-Kyu;Choi, Doo-Ho;
/
Korea Institute of Information Security and Cryptology
, v.19, no.2, pp.11-21,
|
|
3 |
On the Weight and Nonlinearity of Quadratic Rotation Symmetric Boolean Functions
Kim, Hyeon-Jin;Jung, Chang-Ho;Park, Il-Hwan;
/
Korea Institute of Information Security and Cryptology
, v.19, no.2, pp.23-30,
|
|
4 |
Public Key Encryption with Keyword Search in Multi-Receiver Setting
Rhee, Hyun-Sook;Park, Jong-Hwan;Rhee, Dong-Hoon;
/
Korea Institute of Information Security and Cryptology
, v.19, no.2, pp.31-38,
|
|
5 |
Security Analysis of AES for Related-Key Rectangle Attacks
Kim, Jong-Sung;Hong, Seok-Hie;Lee, Chang-Hoon;
/
Korea Institute of Information Security and Cryptology
, v.19, no.2, pp.39-48,
|
|
6 |
Efficient Bit-Parallel Shifted Polynomial Basis Multipliers for All Irreducible Trinomial
Chang, Nam-Su;Kim, Chang-Han;Hong, Seok-Hie;Park, Young-Ho;
/
Korea Institute of Information Security and Cryptology
, v.19, no.2, pp.49-61,
|
|
7 |
Improved Key-Recovery Attacks on HMAC/NMAC-MD4
Kang, Jin-Keon;Lee, Je-Sang;Sung, Jae-Chul;Hong, Seok-Hie;Ryu, Heui-Su;
/
Korea Institute of Information Security and Cryptology
, v.19, no.2, pp.63-74,
|
|
8 |
An Empirical Study of Security for API in Windows Systems
Choi, Young-Han;Kim, Hyoung-Chun;Oh, Hyung-Geun;Lee, Do-Hoon;
/
Korea Institute of Information Security and Cryptology
, v.19, no.2, pp.75-82,
|
|
9 |
Design of Classification Methodology of Malicious Code in Windows Environment
Seo, Hee-Suk;Choi, Joong-Sup;Chu, Pill-Hwan;
/
Korea Institute of Information Security and Cryptology
, v.19, no.2, pp.83-92,
|
|
10 |
Improved AKA Protocol for Efficient Management of Authentication Data in 3GPP Network
Kim, Doo-Hwan;Jung, Sou-Hwan;
/
Korea Institute of Information Security and Cryptology
, v.19, no.2, pp.93-103,
|
|
11 |
A Low-weight Authentication Protocol using RFID for IPTV Users
Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho;
/
Korea Institute of Information Security and Cryptology
, v.19, no.2, pp.105-115,
|
|
12 |
Security Management Model for Protecting Personal Information for the Customer Contact Center
Kwon, Young-Kwan;Youm, Heung-Youl;
/
Korea Institute of Information Security and Cryptology
, v.19, no.2, pp.117-125,
|
|
13 |
An Empirical Study on Factors Affecting the University Students' Software Piracy Intention
Jeon, Jin-Hwan;Kim, Jong-Ki;
/
Korea Institute of Information Security and Cryptology
, v.19, no.2, pp.127-140,
|
|
14 |
A Simple Program of Domestic IT Product Evaluation Service
Go, Woong;Lee, Dong-Bum;Kwak, Jin;
/
Korea Institute of Information Security and Cryptology
, v.19, no.2, pp.141-153,
|
|
15 |
Design and Implementation of Efficient DRM System for Contents Streaming based on H.264
Jung, Yoon-Hyun;Oh, Soo-Hyun;
/
Korea Institute of Information Security and Cryptology
, v.19, no.2, pp.155-163,
|
|
16 |
Revisiting Path-Key Establishment of Random Key Predistribution for Wireless Sensor Networks
Kwon, Tae-Kyoung;Lee, Jong-Hyup;Song, Joo-Seok;
/
Korea Institute of Information Security and Cryptology
, v.19, no.2, pp.165-169,
|
|