Browse > Article List

논문
1 Side-Channel Attacks on AES Based on Meet-in-the-Middle Technique
Kim, Jong-Sung;Hong, Seok-Hie;Lee, Sang-Jin; / Korea Institute of Information Security and Cryptology , v.19, no.2, pp.3-9,
2 Power analysis attacks against NTRU and their countermeasures
Song, Jeong-Eun;Han, Dong-Guk;Lee, Mun-Kyu;Choi, Doo-Ho; / Korea Institute of Information Security and Cryptology , v.19, no.2, pp.11-21,
3 On the Weight and Nonlinearity of Quadratic Rotation Symmetric Boolean Functions
Kim, Hyeon-Jin;Jung, Chang-Ho;Park, Il-Hwan; / Korea Institute of Information Security and Cryptology , v.19, no.2, pp.23-30,
4 Public Key Encryption with Keyword Search in Multi-Receiver Setting
Rhee, Hyun-Sook;Park, Jong-Hwan;Rhee, Dong-Hoon; / Korea Institute of Information Security and Cryptology , v.19, no.2, pp.31-38,
5 Security Analysis of AES for Related-Key Rectangle Attacks
Kim, Jong-Sung;Hong, Seok-Hie;Lee, Chang-Hoon; / Korea Institute of Information Security and Cryptology , v.19, no.2, pp.39-48,
6 Efficient Bit-Parallel Shifted Polynomial Basis Multipliers for All Irreducible Trinomial
Chang, Nam-Su;Kim, Chang-Han;Hong, Seok-Hie;Park, Young-Ho; / Korea Institute of Information Security and Cryptology , v.19, no.2, pp.49-61,
7 Improved Key-Recovery Attacks on HMAC/NMAC-MD4
Kang, Jin-Keon;Lee, Je-Sang;Sung, Jae-Chul;Hong, Seok-Hie;Ryu, Heui-Su; / Korea Institute of Information Security and Cryptology , v.19, no.2, pp.63-74,
8 An Empirical Study of Security for API in Windows Systems
Choi, Young-Han;Kim, Hyoung-Chun;Oh, Hyung-Geun;Lee, Do-Hoon; / Korea Institute of Information Security and Cryptology , v.19, no.2, pp.75-82,
9 Design of Classification Methodology of Malicious Code in Windows Environment
Seo, Hee-Suk;Choi, Joong-Sup;Chu, Pill-Hwan; / Korea Institute of Information Security and Cryptology , v.19, no.2, pp.83-92,
10 Improved AKA Protocol for Efficient Management of Authentication Data in 3GPP Network
Kim, Doo-Hwan;Jung, Sou-Hwan; / Korea Institute of Information Security and Cryptology , v.19, no.2, pp.93-103,
11 A Low-weight Authentication Protocol using RFID for IPTV Users
Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho; / Korea Institute of Information Security and Cryptology , v.19, no.2, pp.105-115,
12 Security Management Model for Protecting Personal Information for the Customer Contact Center
Kwon, Young-Kwan;Youm, Heung-Youl; / Korea Institute of Information Security and Cryptology , v.19, no.2, pp.117-125,
13 An Empirical Study on Factors Affecting the University Students' Software Piracy Intention
Jeon, Jin-Hwan;Kim, Jong-Ki; / Korea Institute of Information Security and Cryptology , v.19, no.2, pp.127-140,
14 A Simple Program of Domestic IT Product Evaluation Service
Go, Woong;Lee, Dong-Bum;Kwak, Jin; / Korea Institute of Information Security and Cryptology , v.19, no.2, pp.141-153,
15 Design and Implementation of Efficient DRM System for Contents Streaming based on H.264
Jung, Yoon-Hyun;Oh, Soo-Hyun; / Korea Institute of Information Security and Cryptology , v.19, no.2, pp.155-163,
16 Revisiting Path-Key Establishment of Random Key Predistribution for Wireless Sensor Networks
Kwon, Tae-Kyoung;Lee, Jong-Hyup;Song, Joo-Seok; / Korea Institute of Information Security and Cryptology , v.19, no.2, pp.165-169,