|
1 |
Efficient Formulas for Cube roots in for Pairing Cryptography
Cho, Young-In;Chang, Nam-Su;Kim, Chang-Han;Park, Young-Ho;Hong, Seok-Hie;
/
Korea Institute of Information Security and Cryptology
, v.21, no.2, pp.3-11,
|
|
2 |
Robust Fuzzy Fingerprint Vault System against Correlation Attack
Moon, Dae-Sung;Chae, Seung-Hoon;Chung, Yong-Wha;Kim, Sung-Young;Kim, Jeong-Nyeo;
/
Korea Institute of Information Security and Cryptology
, v.21, no.2, pp.13-25,
|
|
3 |
A Service Protection Scheme based on non-CAS for Mobile IPTV Service
Roh, Hyo-Sun;Jung, Sou-Hwan;
/
Korea Institute of Information Security and Cryptology
, v.21, no.2, pp.27-35,
|
|
4 |
Metamorphic Malware Detection using Subgraph Matching
Kwon, Jong-Hoon;Lee, Je-Hyun;Jeong, Hyun-Cheol;Lee, Hee-Jo;
/
Korea Institute of Information Security and Cryptology
, v.21, no.2, pp.37-47,
|
|
5 |
Method to Extract Communication History in Instant Messenger
Lee, Jin-Kyung;Han, Ji-Sung;Lee, Sang-Jin;
/
Korea Institute of Information Security and Cryptology
, v.21, no.2, pp.49-60,
|
|
6 |
A study on an investigation procedure of digital forensics for VMware Workstation's virtual machine and a method for a corrupted image recovery
Lim, Sung-Su;Yoo, Byeong-Yeong;Park, Jung-Heum;Byun, Keun-Duck;Lee, Sang-Jin;
/
Korea Institute of Information Security and Cryptology
, v.21, no.2, pp.61-70,
|
|
7 |
The Windows Physical Memory Dump Explorer for Live Forensics
Han, Ji-Sung;Lee, Sang-Jin;
/
Korea Institute of Information Security and Cryptology
, v.21, no.2, pp.71-82,
|
|
8 |
Security Analysis against RVA-based DPA Countermeasure Applied to Pairing Algorithm
Seo, Seog-Chung;Han, Dong-Guk;Hong, Seok-Hie;
/
Korea Institute of Information Security and Cryptology
, v.21, no.2, pp.83-90,
|
|
9 |
A Round Reduction Attack on Triple DES Using Fault Injection
Choi, Doo-Sik;Oh, Doo-Hwan;Bae, Ki-Seok;Moon, Sang-Jae;Ha, Jae-Cheol;
/
Korea Institute of Information Security and Cryptology
, v.21, no.2, pp.91-100,
|
|
10 |
A Study on Building an Integration Security System Applying Virtual Clustering
Seo, Woo-Seok;Park, Dea-Woo;Jun, Moon-Seog;
/
Korea Institute of Information Security and Cryptology
, v.21, no.2, pp.101-110,
|
|
11 |
A study on neutralization malicious code using Windows Crypto API and an implementation of Crypto API hooking tool
Song, Jung-Hwan;Hwang, In-Tae;
/
Korea Institute of Information Security and Cryptology
, v.21, no.2, pp.111-117,
|
|
12 |
Implementation of High Performance TCP Proxy Logic against TCP Flooding Attack on Network Interface Card
Kim, Byoung-Koo;Kim, Ik-Kyun;Kim, Dae-Won;Oh, Jin-Tae;Jang, Jong-Soo;Chung, Tai-Myoung;
/
Korea Institute of Information Security and Cryptology
, v.21, no.2, pp.119-129,
|
|
13 |
Optimized DES Core Implementation for Commercial FPGA Cluster System
Jung, Eun-Gu;Park, Il-Hwan;
/
Korea Institute of Information Security and Cryptology
, v.21, no.2, pp.131-138,
|
|
14 |
Development of Secure Access Control System for Location Information on Smart Phone
Jang, Won-Jun;Lee, Hyung-Woo;
/
Korea Institute of Information Security and Cryptology
, v.21, no.2, pp.139-147,
|
|
15 |
A Power Analysis Attack Countermeasure Not Using Masked Table for S-box of AES, ARIA and SEED
Han, Dong-Guk;Kim, Hee-Seok;Song, Ho-Geun;Lee, Ho-Sang;Hong, Seok-Hie;
/
Korea Institute of Information Security and Cryptology
, v.21, no.2, pp.149-156,
|
|