Browse > Article List

논문
1 Analysis of the Efficiency for Some Selected Double-Block-Length Hash Functions Based on AES/LEA
Kim, Dowon;Kim, Jongsung; / Korea Institute of Information Security and Cryptology , v.26, no.6, pp.1353-1360,
2 Authentication Mechanism Using Three-Dimensional Optical Memory
Park, CheolYong;Ryou, JaeCheol; / Korea Institute of Information Security and Cryptology , v.26, no.6, pp.1361-1373,
3 An Efficient Data Authentication Scheme for Content Centric Networking
Seo, Seog Chung; / Korea Institute of Information Security and Cryptology , v.26, no.6, pp.1375-1386,
4 Efficient ID-Based Authentication and Key Exchange Protocol
Eom, Jieun;Seo, Minhye;Park, Jong Hwan;Lee, Dong Hoon; / Korea Institute of Information Security and Cryptology , v.26, no.6, pp.1387-1399,
5 Key Recovery Algorithm from Randomly-Given Bits of Multi-Prime RSA and Prime Power RSA
Baek, Yoo-Jin; / Korea Institute of Information Security and Cryptology , v.26, no.6, pp.1401-1411,
6 Hash-Based Signature Scheme Technical Trend and Prospect
Park, Tae-hwan;Bae, Bong-jin;Kim, Ho-won; / Korea Institute of Information Security and Cryptology , v.26, no.6, pp.1413-1419,
7 Efficient Differential Trail Searching Algorithm for ARX Block Ciphers
Kim, Seojin;Kang, HyungChul;Hong, Deukjo;Sung, Jaechul;Hong, Seokhie; / Korea Institute of Information Security and Cryptology , v.26, no.6, pp.1421-1430,
8 Investigation of Masking Based Side Channel Countermeasures for LEA
Kim, ChangKyun;Park, JaeHoon;Han, Daewan;Lee, Dong Hoon; / Korea Institute of Information Security and Cryptology , v.26, no.6, pp.1431-1441,
9 Study for Balanced Encoding Method against Side Channel Analysis
Yoon, JinYeong;Kim, HanBit;Kim, HeeSeok;Hong, SeokHie; / Korea Institute of Information Security and Cryptology , v.26, no.6, pp.1443-1454,
10 Security Core Technology Implementation for MTM Hardware-Based Smart Devices
Kim, Jeong Nyeo; / Korea Institute of Information Security and Cryptology , v.26, no.6, pp.1455-1459,
11 Study on Singular Value Decomposition Signal Processing Techniques for Improving Side Channel Analysis
Bak, Geonmin;Kim, Taewon;Kim, HeeSeok;Hong, Seokhie; / Korea Institute of Information Security and Cryptology , v.26, no.6, pp.1461-1470,
12 A Study on Enhanced 3PAKE Scheme against Password Guessing Attack in Smart Home Environment
Lee, Dae-Hwi;Lee, Im-Yeong; / Korea Institute of Information Security and Cryptology , v.26, no.6, pp.1471-1481,
13 A Security Program To Protect against Keyboard-Emulating BadUSB
Choi, Byung-jun;Suh, Taeweon; / Korea Institute of Information Security and Cryptology , v.26, no.6, pp.1483-1492,
14 A Real-Time User Authenticating Method Using Behavior Pattern Through Web
Jang, Jin-gu;Moon, Jong Sub; / Korea Institute of Information Security and Cryptology , v.26, no.6, pp.1493-1504,
15 A Vulnerability Analysis of Paid Live Streaming Services Using Their Android Applications
Choi, Hyunjae;Kim, Hyoungshick; / Korea Institute of Information Security and Cryptology , v.26, no.6, pp.1505-1511,
16 Study on a Real Time Based Suspicious Transaction Detection and Analysis Model to Prevent Illegal Money Transfer Through E-Banking Channels
Yoo, Si-wan; / Korea Institute of Information Security and Cryptology , v.26, no.6, pp.1513-1526,
17 Fraud Detection System in Mobile Payment Service Using Data Mining
Han, Hee Chan;Kim, Hana;Kim, Huy Kang; / Korea Institute of Information Security and Cryptology , v.26, no.6, pp.1527-1537,
18 The Vulnerability Improvement Research Using Pseudo-Random Number Generator Scheme in EncFS
Jeong, Won-Seok;Jeong, Jaeyeol;Jeong, Ik Rae; / Korea Institute of Information Security and Cryptology , v.26, no.6, pp.1539-1550,
19 An Improved Anonymous Authentication Scheme for Remote Health Monitoring System
Park, Youngho;Noh, Si-Wan;Rhee, Kyung-Hyune; / Korea Institute of Information Security and Cryptology , v.26, no.6, pp.1551-1560,
20 Device Security Bootstrapping Mechanism on the IEEE 802.15.4-Based LoWPAN
Lee, Jong-Hoon;Park, Chang-seop; / Korea Institute of Information Security and Cryptology , v.26, no.6, pp.1561-1569,
21 Design of a Reliable Data Diode System
Kim, Dongwook;Min, Byunggil; / Korea Institute of Information Security and Cryptology , v.26, no.6, pp.1571-1582,
22 Research on Institutional and Technical Improvement Regarding on the Collection and Application of Non-Specific Personal Information
Jeon, Hoimi;Shon, Taeshik; / Korea Institute of Information Security and Cryptology , v.26, no.6, pp.1583-1592,
23 A Study on Metering Data De-identification Method for Smart Grid Privacy Protection
Lee, Donghyeok;Park, Namje; / Korea Institute of Information Security and Cryptology , v.26, no.6, pp.1593-1603,
24 Improvements of Information Security Level in Electronic Financial Infrastructure(By Analyzing Information Security Management Level)
Park, Keun-dug;Youm, Heung-youl; / Korea Institute of Information Security and Cryptology , v.26, no.6, pp.1605-1618,
25 Study on Personal Information Protection Behavior in Social Network Service Using Health Belief Model
Shin, Se-mi;Kim, Seong-jun;Kwon, Do-soon; / Korea Institute of Information Security and Cryptology , v.26, no.6, pp.1619-1637,