Browse > Article List

논문
1 Simple Power Analysis against RSA Based on Frequency Components
Jung, Ji-hyuk;Yoon, Ji-Won; / Korea Institute of Information Security and Cryptology , v.31, no.1, pp.1-9,
2 Analysis of Security Vulnerability in U2U Authentication Using MEC in IoD Environment
Choi, Jae Hyun;Lee, Sang Hoon;Jeong, Ik Rae;Byun, Jin Wook; / Korea Institute of Information Security and Cryptology , v.31, no.1, pp.11-17,
3 On the Use of Odd-Degree Isogenies for Implementing SIDH-Based Cryptography
Kim, Suhri;Yoon, Kisoon;Park, Young-Ho; / Korea Institute of Information Security and Cryptology , v.31, no.1, pp.19-30,
4 A Study on Systematic Firmware Security Analysis Method for IoT Devices
Kim, Yejun;Gim, Jeonghyeon;Kim, Seungjoo; / Korea Institute of Information Security and Cryptology , v.31, no.1, pp.31-49,
5 Analysis of Deep Learning Model Vulnerability According to Input Mutation
Kim, Jaeuk;Park, Leo Hyun;Kwon, Taekyoung; / Korea Institute of Information Security and Cryptology , v.31, no.1, pp.51-59,
6 Acquiring Credential and Analyzing Artifacts of Wire Messenger on Windows
Shin, Sumin;Kim, Soram;Youn, Byungchul;Kim, Jongsung; / Korea Institute of Information Security and Cryptology , v.31, no.1, pp.61-71,
7 Analysis of Malicious Behavior Towards Android Storage Vulnerability and Defense Technique Based on Trusted Execution Environment
Kim, Minkyu;Park, Jungsoo;Shim, Hyunseok;Jung, Souhwan; / Korea Institute of Information Security and Cryptology , v.31, no.1, pp.73-81,
8 Sleep Deprivation Attack Detection Based on Clustering in Wireless Sensor Network
Kim, Suk-young;Moon, Jong-sub; / Korea Institute of Information Security and Cryptology , v.31, no.1, pp.83-97,
9 A Study on the National Cryptographic Policy : About the Right to Access the Cryptographic
Kim, Dong-hoon;Kwon, Hun-yeong;Hong, Seokhie; / Korea Institute of Information Security and Cryptology , v.31, no.1, pp.99-109,
10 A Study on the Implementation of Defense Technology Master Data Management System for Defense Technology Security
Park, Heungsoon;Kim, Seyong;Kwon, Hyukjin; / Korea Institute of Information Security and Cryptology , v.31, no.1, pp.111-122,