Browse > Article List

논문
1 The Statistical Analysis of Differential Probability Using GPGPU Technology
Jo, Eunji;Kim, Seong-Gyeom;Hong, Deukjo;Sung, Jaechul;Hong, Seokhie; / Korea Institute of Information Security and Cryptology , v.29, no.3, pp.477-489,
2 Improving Non-Profiled Side-Channel Analysis Using Auto-Encoder Based Noise Reduction Preprocessing
Kwon, Donggeun;Jin, Sunghyun;Kim, HeeSeok;Hong, Seokhie; / Korea Institute of Information Security and Cryptology , v.29, no.3, pp.491-501,
3 A More Storage-Efficient Order-Revealing Encryption Scheme
Kim, Kee Sung; / Korea Institute of Information Security and Cryptology , v.29, no.3, pp.503-509,
4 Efficient Modular Reduction for NIST Prime P-256
Chang, Nam Su; / Korea Institute of Information Security and Cryptology , v.29, no.3, pp.511-514,
5 Efficient Modular Multiplication for 224-bit Prime Field
Chang, Nam Su; / Korea Institute of Information Security and Cryptology , v.29, no.3, pp.515-518,
6 An Enhancement Scheme of Dynamic Analysis for Evasive Android Malware
Ahn, Jinung;Yoon, Hongsun;Jung, Souhwan; / Korea Institute of Information Security and Cryptology , v.29, no.3, pp.519-529,
7 API Feature Based Ensemble Model for Malware Family Classification
Lee, Hyunjong;Euh, Seongyul;Hwang, Doosung; / Korea Institute of Information Security and Cryptology , v.29, no.3, pp.531-539,
8 Study on The Decryption Method and Analysis of MalangMalang Talkcafe Application Database
Kim, Giyoon;Lee, Jonghyeok;Shin, Sumin;Kim, Jongsung; / Korea Institute of Information Security and Cryptology , v.29, no.3, pp.541-547,
9 Unified Labeling and Fine-Grained Verification for Improving Ground-Truth of Malware Analysis
Oh, Sang-Jin;Park, Leo-Hyun;Kwon, Tae-Kyoung; / Korea Institute of Information Security and Cryptology , v.29, no.3, pp.549-555,
10 Software Vulnerability Prediction System Using Neural Network
Choi, Minjun;Koo, Dongyoung;Yun, Joobeom; / Korea Institute of Information Security and Cryptology , v.29, no.3, pp.557-564,
11 Cancelable Iris Templates Using Index-of-Max Hashing
Kim, Jina;Jeong, Jae Yeol;Kim, Kee Sung;Jeong, Ik Rae; / Korea Institute of Information Security and Cryptology , v.29, no.3, pp.565-577,
12 Access Control Mechanism for Industrial Control System Based Smart Contract
Cho, Minjeong;Lee, Changhoon; / Korea Institute of Information Security and Cryptology , v.29, no.3, pp.579-588,
13 Differential Privacy Technology Resistant to the Model Inversion Attack in AI Environments
Park, Cheollhee;Hong, Dowon; / Korea Institute of Information Security and Cryptology , v.29, no.3, pp.589-598,
14 STRIDE and HARM Based Cloud Network Vulnerability Detection Scheme
Jo, Jeong-Seok;Kwak, Jin; / Korea Institute of Information Security and Cryptology , v.29, no.3, pp.599-612,
15 Analysis of Security Requirements for Secure Update of IVI(In-Vehicle-Infotainment) Using Threat Modeling and Common Criteria
Kang, Soo-young;Kim, Seung-joo; / Korea Institute of Information Security and Cryptology , v.29, no.3, pp.613-628,
16 Cybersecurity Architecture for Reliable Smart Factory
Kim, HyunJin;Kim, SungJin;Kim, Yesol;Kim, Sinkyu;Shon, TaeShik; / Korea Institute of Information Security and Cryptology , v.29, no.3, pp.629-643,
17 A Study on Control System Cyber Security Education & Training Method
Kim, Kyeong-Ho;Maeng, YounJae;Jang, MoonSu;Ryou, Jae-Cheol; / Korea Institute of Information Security and Cryptology , v.29, no.3, pp.645-656,
18 A Study on Cyber Security Requirements of Ship Using Threat Modeling
Jo, Yong-Hyun;Cha, Young-Kyun; / Korea Institute of Information Security and Cryptology , v.29, no.3, pp.657-673,
19 Case Study on Security Enhancement of Smart Factory
Bae, Chun-sock;Goh, Sung-cheol; / Korea Institute of Information Security and Cryptology , v.29, no.3, pp.675-684,
20 Efficient Privacy-Preserving Metering Aggregation in Smart Grids Using Homomorphic Encryption
Koo, Dongyoung; / Korea Institute of Information Security and Cryptology , v.29, no.3, pp.685-692,