|
1 |
Analysis of the Efficiency for Some Selected Double-Block-Length Hash Functions Based on AES/LEA
Kim, Dowon;Kim, Jongsung;
/
Korea Institute of Information Security and Cryptology
, v.26, no.6, pp.1353-1360,
|
|
2 |
Authentication Mechanism Using Three-Dimensional Optical Memory
Park, CheolYong;Ryou, JaeCheol;
/
Korea Institute of Information Security and Cryptology
, v.26, no.6, pp.1361-1373,
|
|
3 |
An Efficient Data Authentication Scheme for Content Centric Networking
Seo, Seog Chung;
/
Korea Institute of Information Security and Cryptology
, v.26, no.6, pp.1375-1386,
|
|
4 |
Efficient ID-Based Authentication and Key Exchange Protocol
Eom, Jieun;Seo, Minhye;Park, Jong Hwan;Lee, Dong Hoon;
/
Korea Institute of Information Security and Cryptology
, v.26, no.6, pp.1387-1399,
|
|
5 |
Key Recovery Algorithm from Randomly-Given Bits of Multi-Prime RSA and Prime Power RSA
Baek, Yoo-Jin;
/
Korea Institute of Information Security and Cryptology
, v.26, no.6, pp.1401-1411,
|
|
6 |
Hash-Based Signature Scheme Technical Trend and Prospect
Park, Tae-hwan;Bae, Bong-jin;Kim, Ho-won;
/
Korea Institute of Information Security and Cryptology
, v.26, no.6, pp.1413-1419,
|
|
7 |
Efficient Differential Trail Searching Algorithm for ARX Block Ciphers
Kim, Seojin;Kang, HyungChul;Hong, Deukjo;Sung, Jaechul;Hong, Seokhie;
/
Korea Institute of Information Security and Cryptology
, v.26, no.6, pp.1421-1430,
|
|
8 |
Investigation of Masking Based Side Channel Countermeasures for LEA
Kim, ChangKyun;Park, JaeHoon;Han, Daewan;Lee, Dong Hoon;
/
Korea Institute of Information Security and Cryptology
, v.26, no.6, pp.1431-1441,
|
|
9 |
Study for Balanced Encoding Method against Side Channel Analysis
Yoon, JinYeong;Kim, HanBit;Kim, HeeSeok;Hong, SeokHie;
/
Korea Institute of Information Security and Cryptology
, v.26, no.6, pp.1443-1454,
|
|
10 |
Security Core Technology Implementation for MTM Hardware-Based Smart Devices
Kim, Jeong Nyeo;
/
Korea Institute of Information Security and Cryptology
, v.26, no.6, pp.1455-1459,
|
|
11 |
Study on Singular Value Decomposition Signal Processing Techniques for Improving Side Channel Analysis
Bak, Geonmin;Kim, Taewon;Kim, HeeSeok;Hong, Seokhie;
/
Korea Institute of Information Security and Cryptology
, v.26, no.6, pp.1461-1470,
|
|
12 |
A Study on Enhanced 3PAKE Scheme against Password Guessing Attack in Smart Home Environment
Lee, Dae-Hwi;Lee, Im-Yeong;
/
Korea Institute of Information Security and Cryptology
, v.26, no.6, pp.1471-1481,
|
|
13 |
A Security Program To Protect against Keyboard-Emulating BadUSB
Choi, Byung-jun;Suh, Taeweon;
/
Korea Institute of Information Security and Cryptology
, v.26, no.6, pp.1483-1492,
|
|
14 |
A Real-Time User Authenticating Method Using Behavior Pattern Through Web
Jang, Jin-gu;Moon, Jong Sub;
/
Korea Institute of Information Security and Cryptology
, v.26, no.6, pp.1493-1504,
|
|
15 |
A Vulnerability Analysis of Paid Live Streaming Services Using Their Android Applications
Choi, Hyunjae;Kim, Hyoungshick;
/
Korea Institute of Information Security and Cryptology
, v.26, no.6, pp.1505-1511,
|
|
16 |
Study on a Real Time Based Suspicious Transaction Detection and Analysis Model to Prevent Illegal Money Transfer Through E-Banking Channels
Yoo, Si-wan;
/
Korea Institute of Information Security and Cryptology
, v.26, no.6, pp.1513-1526,
|
|
17 |
Fraud Detection System in Mobile Payment Service Using Data Mining
Han, Hee Chan;Kim, Hana;Kim, Huy Kang;
/
Korea Institute of Information Security and Cryptology
, v.26, no.6, pp.1527-1537,
|
|
18 |
The Vulnerability Improvement Research Using Pseudo-Random Number Generator Scheme in EncFS
Jeong, Won-Seok;Jeong, Jaeyeol;Jeong, Ik Rae;
/
Korea Institute of Information Security and Cryptology
, v.26, no.6, pp.1539-1550,
|
|
19 |
An Improved Anonymous Authentication Scheme for Remote Health Monitoring System
Park, Youngho;Noh, Si-Wan;Rhee, Kyung-Hyune;
/
Korea Institute of Information Security and Cryptology
, v.26, no.6, pp.1551-1560,
|
|
20 |
Device Security Bootstrapping Mechanism on the IEEE 802.15.4-Based LoWPAN
Lee, Jong-Hoon;Park, Chang-seop;
/
Korea Institute of Information Security and Cryptology
, v.26, no.6, pp.1561-1569,
|
|
21 |
Design of a Reliable Data Diode System
Kim, Dongwook;Min, Byunggil;
/
Korea Institute of Information Security and Cryptology
, v.26, no.6, pp.1571-1582,
|
|
22 |
Research on Institutional and Technical Improvement Regarding on the Collection and Application of Non-Specific Personal Information
Jeon, Hoimi;Shon, Taeshik;
/
Korea Institute of Information Security and Cryptology
, v.26, no.6, pp.1583-1592,
|
|
23 |
A Study on Metering Data De-identification Method for Smart Grid Privacy Protection
Lee, Donghyeok;Park, Namje;
/
Korea Institute of Information Security and Cryptology
, v.26, no.6, pp.1593-1603,
|
|
24 |
Improvements of Information Security Level in Electronic Financial Infrastructure(By Analyzing Information Security Management Level)
Park, Keun-dug;Youm, Heung-youl;
/
Korea Institute of Information Security and Cryptology
, v.26, no.6, pp.1605-1618,
|
|
25 |
Study on Personal Information Protection Behavior in Social Network Service Using Health Belief Model
Shin, Se-mi;Kim, Seong-jun;Kwon, Do-soon;
/
Korea Institute of Information Security and Cryptology
, v.26, no.6, pp.1619-1637,
|
|