|
1 |
The Statistical Analysis of Differential Probability Using GPGPU Technology
Jo, Eunji;Kim, Seong-Gyeom;Hong, Deukjo;Sung, Jaechul;Hong, Seokhie;
/
Korea Institute of Information Security and Cryptology
, v.29, no.3, pp.477-489,
|
|
2 |
Improving Non-Profiled Side-Channel Analysis Using Auto-Encoder Based Noise Reduction Preprocessing
Kwon, Donggeun;Jin, Sunghyun;Kim, HeeSeok;Hong, Seokhie;
/
Korea Institute of Information Security and Cryptology
, v.29, no.3, pp.491-501,
|
|
3 |
A More Storage-Efficient Order-Revealing Encryption Scheme
Kim, Kee Sung;
/
Korea Institute of Information Security and Cryptology
, v.29, no.3, pp.503-509,
|
|
4 |
Efficient Modular Reduction for NIST Prime P-256
Chang, Nam Su;
/
Korea Institute of Information Security and Cryptology
, v.29, no.3, pp.511-514,
|
|
5 |
Efficient Modular Multiplication for 224-bit Prime Field
Chang, Nam Su;
/
Korea Institute of Information Security and Cryptology
, v.29, no.3, pp.515-518,
|
|
6 |
An Enhancement Scheme of Dynamic Analysis for Evasive Android Malware
Ahn, Jinung;Yoon, Hongsun;Jung, Souhwan;
/
Korea Institute of Information Security and Cryptology
, v.29, no.3, pp.519-529,
|
|
7 |
API Feature Based Ensemble Model for Malware Family Classification
Lee, Hyunjong;Euh, Seongyul;Hwang, Doosung;
/
Korea Institute of Information Security and Cryptology
, v.29, no.3, pp.531-539,
|
|
8 |
Study on The Decryption Method and Analysis of MalangMalang Talkcafe Application Database
Kim, Giyoon;Lee, Jonghyeok;Shin, Sumin;Kim, Jongsung;
/
Korea Institute of Information Security and Cryptology
, v.29, no.3, pp.541-547,
|
|
9 |
Unified Labeling and Fine-Grained Verification for Improving Ground-Truth of Malware Analysis
Oh, Sang-Jin;Park, Leo-Hyun;Kwon, Tae-Kyoung;
/
Korea Institute of Information Security and Cryptology
, v.29, no.3, pp.549-555,
|
|
10 |
Software Vulnerability Prediction System Using Neural Network
Choi, Minjun;Koo, Dongyoung;Yun, Joobeom;
/
Korea Institute of Information Security and Cryptology
, v.29, no.3, pp.557-564,
|
|
11 |
Cancelable Iris Templates Using Index-of-Max Hashing
Kim, Jina;Jeong, Jae Yeol;Kim, Kee Sung;Jeong, Ik Rae;
/
Korea Institute of Information Security and Cryptology
, v.29, no.3, pp.565-577,
|
|
12 |
Access Control Mechanism for Industrial Control System Based Smart Contract
Cho, Minjeong;Lee, Changhoon;
/
Korea Institute of Information Security and Cryptology
, v.29, no.3, pp.579-588,
|
|
13 |
Differential Privacy Technology Resistant to the Model Inversion Attack in AI Environments
Park, Cheollhee;Hong, Dowon;
/
Korea Institute of Information Security and Cryptology
, v.29, no.3, pp.589-598,
|
|
14 |
STRIDE and HARM Based Cloud Network Vulnerability Detection Scheme
Jo, Jeong-Seok;Kwak, Jin;
/
Korea Institute of Information Security and Cryptology
, v.29, no.3, pp.599-612,
|
|
15 |
Analysis of Security Requirements for Secure Update of IVI(In-Vehicle-Infotainment) Using Threat Modeling and Common Criteria
Kang, Soo-young;Kim, Seung-joo;
/
Korea Institute of Information Security and Cryptology
, v.29, no.3, pp.613-628,
|
|
16 |
Cybersecurity Architecture for Reliable Smart Factory
Kim, HyunJin;Kim, SungJin;Kim, Yesol;Kim, Sinkyu;Shon, TaeShik;
/
Korea Institute of Information Security and Cryptology
, v.29, no.3, pp.629-643,
|
|
17 |
A Study on Control System Cyber Security Education & Training Method
Kim, Kyeong-Ho;Maeng, YounJae;Jang, MoonSu;Ryou, Jae-Cheol;
/
Korea Institute of Information Security and Cryptology
, v.29, no.3, pp.645-656,
|
|
18 |
A Study on Cyber Security Requirements of Ship Using Threat Modeling
Jo, Yong-Hyun;Cha, Young-Kyun;
/
Korea Institute of Information Security and Cryptology
, v.29, no.3, pp.657-673,
|
|
19 |
Case Study on Security Enhancement of Smart Factory
Bae, Chun-sock;Goh, Sung-cheol;
/
Korea Institute of Information Security and Cryptology
, v.29, no.3, pp.675-684,
|
|
20 |
Efficient Privacy-Preserving Metering Aggregation in Smart Grids Using Homomorphic Encryption
Koo, Dongyoung;
/
Korea Institute of Information Security and Cryptology
, v.29, no.3, pp.685-692,
|
|