Browse > Article List

논문
1 Efficient Formulas for Cube roots in $F_{3^m}$ for Pairing Cryptography
Cho, Young-In;Chang, Nam-Su;Kim, Chang-Han;Park, Young-Ho;Hong, Seok-Hie; / Korea Institute of Information Security and Cryptology , v.21, no.2, pp.3-11,
2 Robust Fuzzy Fingerprint Vault System against Correlation Attack
Moon, Dae-Sung;Chae, Seung-Hoon;Chung, Yong-Wha;Kim, Sung-Young;Kim, Jeong-Nyeo; / Korea Institute of Information Security and Cryptology , v.21, no.2, pp.13-25,
3 A Service Protection Scheme based on non-CAS for Mobile IPTV Service
Roh, Hyo-Sun;Jung, Sou-Hwan; / Korea Institute of Information Security and Cryptology , v.21, no.2, pp.27-35,
4 Metamorphic Malware Detection using Subgraph Matching
Kwon, Jong-Hoon;Lee, Je-Hyun;Jeong, Hyun-Cheol;Lee, Hee-Jo; / Korea Institute of Information Security and Cryptology , v.21, no.2, pp.37-47,
5 Method to Extract Communication History in Instant Messenger
Lee, Jin-Kyung;Han, Ji-Sung;Lee, Sang-Jin; / Korea Institute of Information Security and Cryptology , v.21, no.2, pp.49-60,
6 A study on an investigation procedure of digital forensics for VMware Workstation's virtual machine and a method for a corrupted image recovery
Lim, Sung-Su;Yoo, Byeong-Yeong;Park, Jung-Heum;Byun, Keun-Duck;Lee, Sang-Jin; / Korea Institute of Information Security and Cryptology , v.21, no.2, pp.61-70,
7 The Windows Physical Memory Dump Explorer for Live Forensics
Han, Ji-Sung;Lee, Sang-Jin; / Korea Institute of Information Security and Cryptology , v.21, no.2, pp.71-82,
8 Security Analysis against RVA-based DPA Countermeasure Applied to $Eta_T$ Pairing Algorithm
Seo, Seog-Chung;Han, Dong-Guk;Hong, Seok-Hie; / Korea Institute of Information Security and Cryptology , v.21, no.2, pp.83-90,
9 A Round Reduction Attack on Triple DES Using Fault Injection
Choi, Doo-Sik;Oh, Doo-Hwan;Bae, Ki-Seok;Moon, Sang-Jae;Ha, Jae-Cheol; / Korea Institute of Information Security and Cryptology , v.21, no.2, pp.91-100,
10 A Study on Building an Integration Security System Applying Virtual Clustering
Seo, Woo-Seok;Park, Dea-Woo;Jun, Moon-Seog; / Korea Institute of Information Security and Cryptology , v.21, no.2, pp.101-110,
11 A study on neutralization malicious code using Windows Crypto API and an implementation of Crypto API hooking tool
Song, Jung-Hwan;Hwang, In-Tae; / Korea Institute of Information Security and Cryptology , v.21, no.2, pp.111-117,
12 Implementation of High Performance TCP Proxy Logic against TCP Flooding Attack on Network Interface Card
Kim, Byoung-Koo;Kim, Ik-Kyun;Kim, Dae-Won;Oh, Jin-Tae;Jang, Jong-Soo;Chung, Tai-Myoung; / Korea Institute of Information Security and Cryptology , v.21, no.2, pp.119-129,
13 Optimized DES Core Implementation for Commercial FPGA Cluster System
Jung, Eun-Gu;Park, Il-Hwan; / Korea Institute of Information Security and Cryptology , v.21, no.2, pp.131-138,
14 Development of Secure Access Control System for Location Information on Smart Phone
Jang, Won-Jun;Lee, Hyung-Woo; / Korea Institute of Information Security and Cryptology , v.21, no.2, pp.139-147,
15 A Power Analysis Attack Countermeasure Not Using Masked Table for S-box of AES, ARIA and SEED
Han, Dong-Guk;Kim, Hee-Seok;Song, Ho-Geun;Lee, Ho-Sang;Hong, Seok-Hie; / Korea Institute of Information Security and Cryptology , v.21, no.2, pp.149-156,