|
1 |
Public Key Encryption with Equality Test with Designated Tester
Lee, Young-Min;Koo, Woo-Kwon;Rhee, Hyun-Sook;Lee, Dong-Hoon;
/
Korea Institute of Information Security and Cryptology
, v.21, no.5, pp.3-13,
|
|
2 |
Differential Fault Analysis on Block Cipher ARIA-128
Park, Se-Hyun;Jeong, Ki-Tae;Lee, Yu-Seop;Sung, Jae-Chul;Hong, Seok-Hie;
/
Korea Institute of Information Security and Cryptology
, v.21, no.5, pp.15-25,
|
|
3 |
A Key Recovery Attack on HMAC using Fault Injection Attack
Jeong, Ki-Tae;Lee, Yu-Seop;Sung, Jae-Chul;Hong, Seok-Hie;
/
Korea Institute of Information Security and Cryptology
, v.21, no.5, pp.27-33,
|
|
4 |
Correlation Power Analysis Attacks on the Software based Salsa20/12 Stream Cipher
Park, Young-Goo;Bae, Ki-Seok;Moon, Sang-Jae;Lee, Hoon-Jae;Ha, Jae-Cheul;Ahn, Mahn-Ki;
/
Korea Institute of Information Security and Cryptology
, v.21, no.5, pp.35-45,
|
|
5 |
Efficient implementation of AES CTR Mode for a Mobile Environment
Park, Jin-Hyung;Paik, Jung-Ha;Lee, Dong-Hoon;
/
Korea Institute of Information Security and Cryptology
, v.21, no.5, pp.47-58,
|
|
6 |
Three Phase Dynamic Current Mode Logic against Power Analysis Attack
Kim, Hyun-Min;Kim, Hee-Seok;Hong, Seok-Hee;
/
Korea Institute of Information Security and Cryptology
, v.21, no.5, pp.59-69,
|
|
7 |
Hash-based Authentication Protocol for RFID Applicable to Desynchronization between the Server and Tag with efficient searching method
Kwon, Hye-Jin;Kim, Hae-Mun;Jeong, Seon-Yeong;Kim, Soon-Ja;
/
Korea Institute of Information Security and Cryptology
, v.21, no.5, pp.71-82,
|
|
8 |
Practical and Secure Yoking-Proof Protocol for RFID
Ham, Hyoung-Min;Song, Joo-Seok;
/
Korea Institute of Information Security and Cryptology
, v.21, no.5, pp.83-94,
|
|
9 |
A Study on Smart Grid and Cyber Security Strategy
Lee, Sang-Keun;
/
Korea Institute of Information Security and Cryptology
, v.21, no.5, pp.95-108,
|
|
10 |
A Study on Roles of CERT and ISAC for enhancing the Security of Smart Mobile Office
Lee, Keun-Young;Park, Tae-Hyoung;Lim, Jong-In;
/
Korea Institute of Information Security and Cryptology
, v.21, no.5, pp.109-127,
|
|
11 |
A Study of Online User Identification Based on One-Time Password with Guaranteeing Unlinkability
Kim, Jung-Dong;Cho, Kwan-Tae;Lee, Dong-Hoon;
/
Korea Institute of Information Security and Cryptology
, v.21, no.5, pp.129-139,
|
|
12 |
Profile Management System for Contact Information Privacy in Social Network Service
Youn, Taek-Young;Hong, Do-Won;
/
Korea Institute of Information Security and Cryptology
, v.21, no.5, pp.141-148,
|
|
13 |
A study on the algorithms to achieve the data privacy based on some anonymity measures
Kang, Ju-Sung;Kang, Jin-Young;Yi, Ok-Yeon;Hong, Do-Won;
/
Korea Institute of Information Security and Cryptology
, v.21, no.5, pp.149-160,
|
|
14 |
An Enhanced Forward Security on JK-RFID Authentication Protocol
Jeon, Dong-Ho;Choi, Seoung-Un;Kim, Soon-Ja;
/
Korea Institute of Information Security and Cryptology
, v.21, no.5, pp.161-168,
|
|
15 |
A Framework and Guidelines for Personal Data Breach Notification Act
Lee, Chung-Hun;Ko, Yu-Mi;Kim, Beom-Soo;
/
Korea Institute of Information Security and Cryptology
, v.21, no.5, pp.169-179,
|
|
16 |
Anonymous Qualification Verifying Method on Web Environment
Lee, Yun-Kyung;Hwang, Jung-Yeon;Chung, Byung-Ho;Kim, Jeong-Nyeo;
/
Korea Institute of Information Security and Cryptology
, v.21, no.5, pp.181-195,
|
|
17 |
A Study on Critical Success Factors for Implementing Governance of Personal Information Protection
Kim, Jung-Duk;Hwang, Soo-Ha;
/
Korea Institute of Information Security and Cryptology
, v.21, no.5, pp.197-203,
|
|