Browse > Article List

논문
1 Security Analysis of Blockchain Systems: Case Study of Cryptocurrencies
Lee, Sungbum;Lee, Boohyung;Myung, Sein;Lee, Jong-Hyouk; / Korea Institute of Information Security and Cryptology , v.28, no.1, pp.5-14,
2 Calculating the Approximate Probability of Differentials for ARX-Based Cipher Using SAT Solver
Lee, HoChang;Kim, Seojin;Kang, HyungChul;Hong, Deukjo;Sung, Jaechul;Hong, Seokhie; / Korea Institute of Information Security and Cryptology , v.28, no.1, pp.15-24,
3 High-Speed Implementation and Efficient Memory Usage of Min-Entropy Estimation Algorithms in NIST SP 800-90B
Kim, Wontae;Yeom, Yongjin;Kang, Ju-Sung; / Korea Institute of Information Security and Cryptology , v.28, no.1, pp.25-39,
4 Optimal Implementation of Format Preserving Encryption Algorithm FEA in Various Environments
Park, Cheolhee;Jeong, Sooyong;Hong, Dowon;Seo, Changho; / Korea Institute of Information Security and Cryptology , v.28, no.1, pp.41-51,
5 Automated Formal Verification of Korean Standard Block Cipher Using Cryptol
Choi, Won-bin;Kim, Seung-joo; / Korea Institute of Information Security and Cryptology , v.28, no.1, pp.53-60,
6 An Approach to Constructing an Efficient Entropy Source on Multicore Processor
Kim, SeongGyeom;Lee, SeungJoon;Kang, HyungChul;Hong, Deukjo;Sung, Jaechul;Hong, Seokhie; / Korea Institute of Information Security and Cryptology , v.28, no.1, pp.61-71,
7 An Implementation of Supersingular Isogeny Diffie-Hellman and Its Application to Mobile Security Product
Yoon, Kisoon;Lee, Jun Yeong;Kim, Suhri;Kwon, Jihoon;Park, Young-Ho; / Korea Institute of Information Security and Cryptology , v.28, no.1, pp.73-83,
8 An Efficient Quadratic Projection-Based Iris Recognition: Performance Improvements of Iris Recognition Using Dual QML
Kwon, Taeyean;Noh, Geontae;Jeong, Ik Rae; / Korea Institute of Information Security and Cryptology , v.28, no.1, pp.85-93,
9 A Study on Mobile Forensic Data Acquisition Method Based on Manufacturer's Backup Mobile App
Choi, Jaewon;Kim, Seung-joo; / Korea Institute of Information Security and Cryptology , v.28, no.1, pp.95-110,
10 Study on Remote Data Acquisition Methods Using OAuth Protocol of Android Operating System
Nam, Gi-hoon;Gong, Seong-hyeon;Seok, Byoung-jin;Lee, Changhoon; / Korea Institute of Information Security and Cryptology , v.28, no.1, pp.111-122,
11 An Experimental Environment for Simulation of Stealthy Deception Attack in CPS Using PLCitM (PLC in the Middle)
Chang, Yeop;Lee, Woomyo;shin, Hyeok-Ki;Kim, Sinkyu; / Korea Institute of Information Security and Cryptology , v.28, no.1, pp.123-133,
12 Threat Modeling and Risk Analysis: PS4 Remote Play with PC
Kim, Hye Min;Kim, Huy Kang; / Korea Institute of Information Security and Cryptology , v.28, no.1, pp.135-143,
13 A System for SSL/TLS Vulnerability Detection of Servers
Cho, Sungwon;Choi, Hyunsang;Heo, Gyu;Cho, Sanghyun;Kim, Young-Gab; / Korea Institute of Information Security and Cryptology , v.28, no.1, pp.145-153,
14 How to Cope with Ransomware in the Healthcare Industry
Jeon, In-seok;Kim, Dong-won;Han, Keun-hee; / Korea Institute of Information Security and Cryptology , v.28, no.1, pp.155-165,
15 Method for Inferring Format Information of Data Field from CAN Trace
Ji, Cheongmin;Kim, Jimin;Hong, Manpyo; / Korea Institute of Information Security and Cryptology , v.28, no.1, pp.167-177,
16 Randomness Based Fuzzing Test Case Evaluation for Vulnerability Analysis of Industrial Control System
Kim, SungJin;Shon, Taeshik; / Korea Institute of Information Security and Cryptology , v.28, no.1, pp.179-186,
17 Factors that Affect the Intention of Password Security Behavior
Lee, Dong-Hee;Kim, Tae-Sung;Jun, Hyo-Jung; / Korea Institute of Information Security and Cryptology , v.28, no.1, pp.187-198,
18 An Analysis on Intention to Use Information Service for Personal Information Breach
Kim, Taek-Young;Jun, Hyo-Jung;Kim, Tae-Sung; / Korea Institute of Information Security and Cryptology , v.28, no.1, pp.199-213,
19 A Study on the Damage Cost Estimation Model for Personal Information Leakage in Korea
Lim, Gyoo Gun;Liu, Mei Na;Lee, Jung Mi; / Korea Institute of Information Security and Cryptology , v.28, no.1, pp.215-227,
20 IP-CCTV Risk Decision Model Using AHP (Cloud Computing Based)
Jung, Sung-hoo;Lee, Kyung-ho; / Korea Institute of Information Security and Cryptology , v.28, no.1, pp.229-239,
21 Design and Analysis a Robust Recommender System Exploiting the Effect of Social Trust Clusters
Noh, Giseop;Oh, Hayoung;Lee, Jaehoon; / Korea Institute of Information Security and Cryptology , v.28, no.1, pp.241-248,
22 A Study on the Framework of Comparing New Cybersecurity Workforce Development Policy Based on the ATE Programs of U.S.
Hong, Soonjwa; / Korea Institute of Information Security and Cryptology , v.28, no.1, pp.249-267,
23 An Empirical Study of Relationship between Information Security Investment and Information Security Incidents : A Focus on Information Security Training, Awareness and Education Service Sector
Lee, Hansol;Chai, Sangmi; / Korea Institute of Information Security and Cryptology , v.28, no.1, pp.269-281,