Browse > Article List

논문
1 Public Key Encryption with Equality Test with Designated Tester
Lee, Young-Min;Koo, Woo-Kwon;Rhee, Hyun-Sook;Lee, Dong-Hoon; / Korea Institute of Information Security and Cryptology , v.21, no.5, pp.3-13,
2 Differential Fault Analysis on Block Cipher ARIA-128
Park, Se-Hyun;Jeong, Ki-Tae;Lee, Yu-Seop;Sung, Jae-Chul;Hong, Seok-Hie; / Korea Institute of Information Security and Cryptology , v.21, no.5, pp.15-25,
3 A Key Recovery Attack on HMAC using Fault Injection Attack
Jeong, Ki-Tae;Lee, Yu-Seop;Sung, Jae-Chul;Hong, Seok-Hie; / Korea Institute of Information Security and Cryptology , v.21, no.5, pp.27-33,
4 Correlation Power Analysis Attacks on the Software based Salsa20/12 Stream Cipher
Park, Young-Goo;Bae, Ki-Seok;Moon, Sang-Jae;Lee, Hoon-Jae;Ha, Jae-Cheul;Ahn, Mahn-Ki; / Korea Institute of Information Security and Cryptology , v.21, no.5, pp.35-45,
5 Efficient implementation of AES CTR Mode for a Mobile Environment
Park, Jin-Hyung;Paik, Jung-Ha;Lee, Dong-Hoon; / Korea Institute of Information Security and Cryptology , v.21, no.5, pp.47-58,
6 Three Phase Dynamic Current Mode Logic against Power Analysis Attack
Kim, Hyun-Min;Kim, Hee-Seok;Hong, Seok-Hee; / Korea Institute of Information Security and Cryptology , v.21, no.5, pp.59-69,
7 Hash-based Authentication Protocol for RFID Applicable to Desynchronization between the Server and Tag with efficient searching method
Kwon, Hye-Jin;Kim, Hae-Mun;Jeong, Seon-Yeong;Kim, Soon-Ja; / Korea Institute of Information Security and Cryptology , v.21, no.5, pp.71-82,
8 Practical and Secure Yoking-Proof Protocol for RFID
Ham, Hyoung-Min;Song, Joo-Seok; / Korea Institute of Information Security and Cryptology , v.21, no.5, pp.83-94,
9 A Study on Smart Grid and Cyber Security Strategy
Lee, Sang-Keun; / Korea Institute of Information Security and Cryptology , v.21, no.5, pp.95-108,
10 A Study on Roles of CERT and ISAC for enhancing the Security of Smart Mobile Office
Lee, Keun-Young;Park, Tae-Hyoung;Lim, Jong-In; / Korea Institute of Information Security and Cryptology , v.21, no.5, pp.109-127,
11 A Study of Online User Identification Based on One-Time Password with Guaranteeing Unlinkability
Kim, Jung-Dong;Cho, Kwan-Tae;Lee, Dong-Hoon; / Korea Institute of Information Security and Cryptology , v.21, no.5, pp.129-139,
12 Profile Management System for Contact Information Privacy in Social Network Service
Youn, Taek-Young;Hong, Do-Won; / Korea Institute of Information Security and Cryptology , v.21, no.5, pp.141-148,
13 A study on the algorithms to achieve the data privacy based on some anonymity measures
Kang, Ju-Sung;Kang, Jin-Young;Yi, Ok-Yeon;Hong, Do-Won; / Korea Institute of Information Security and Cryptology , v.21, no.5, pp.149-160,
14 An Enhanced Forward Security on JK-RFID Authentication Protocol
Jeon, Dong-Ho;Choi, Seoung-Un;Kim, Soon-Ja; / Korea Institute of Information Security and Cryptology , v.21, no.5, pp.161-168,
15 A Framework and Guidelines for Personal Data Breach Notification Act
Lee, Chung-Hun;Ko, Yu-Mi;Kim, Beom-Soo; / Korea Institute of Information Security and Cryptology , v.21, no.5, pp.169-179,
16 Anonymous Qualification Verifying Method on Web Environment
Lee, Yun-Kyung;Hwang, Jung-Yeon;Chung, Byung-Ho;Kim, Jeong-Nyeo; / Korea Institute of Information Security and Cryptology , v.21, no.5, pp.181-195,
17 A Study on Critical Success Factors for Implementing Governance of Personal Information Protection
Kim, Jung-Duk;Hwang, Soo-Ha; / Korea Institute of Information Security and Cryptology , v.21, no.5, pp.197-203,