Browse > Article List

논문
1 Differential-Linear Cryptanalysis Using DLCT on the Block Cipher RECTANGLE
Cho, Sehee;Baek, Seungjun;Kim, Jongsung; / Korea Institute of Information Security and Cryptology , v.31, no.2, pp.123-132,
2 A Research on the Security of Drone Control Data Using Quantum Entropy-Based Random Number Generator
Kim, Tae-Wan;Lee, Se-Yoon;Jung, Seo-Woo;Wi, Han-saem;Yi, Ok-yeon; / Korea Institute of Information Security and Cryptology , v.31, no.2, pp.133-144,
3 Security Analysis of Random Number Generator in Fuchsia Operating System and Zircon Kernel
Kim, Yewon;Yeom, Yongjin;Kang, Ju-Sung; / Korea Institute of Information Security and Cryptology , v.31, no.2, pp.145-156,
4 A Study on Secure Digital Signature Algorithm for Side Channel Attack
Lee, HunHee;Hong, SeokHie; / Korea Institute of Information Security and Cryptology , v.31, no.2, pp.157-165,
5 Secure Mobile TPM Adoption for the Trusted Execution Environment
Han, Seung-Kyun;Jang, JinSoo; / Korea Institute of Information Security and Cryptology , v.31, no.2, pp.167-174,
6 A Study Protocol Reverse Engineering Research Trend and Construction of Optimal Environment for Malware Analysis
Shin, Kangsik;Jung, Dong-Jae;Choe, Min-Ji;Cho, Ho-Mook; / Korea Institute of Information Security and Cryptology , v.31, no.2, pp.175-186,
7 A Study of FPGA Hardware Trojan Detection Using Bitstream Reverse-Engineering
Cho, Mingi;Jeong, Seyeon;Kwon, Taekyoung; / Korea Institute of Information Security and Cryptology , v.31, no.2, pp.187-195,
8 A Study on the Permissibility of Search and Seizure of Mobile Messenger Data Using a USIM
Kim, Min-Dong;Lee, Hyeon-Jin;Lee, Sung Jin;Lee, Yeon-Ju;Kim, Gi-Bum; / Korea Institute of Information Security and Cryptology , v.31, no.2, pp.197-209,
9 HTTP Intrusion Detection Model Using Machine Learning in Hadoop Environment
Kim, Hyung-gi;Kim, Moon-hyun; / Korea Institute of Information Security and Cryptology , v.31, no.2, pp.211-220,
10 A Study on Decryption of Files Infected by Ragnar Locker Ransomware through Key Reuse Attack and Its Applications
Kang, Soojin;Lee, Sehoon;Kim, Soram;Kim, Daeun;Kim, Kimoon;Kim, Jongsung; / Korea Institute of Information Security and Cryptology , v.31, no.2, pp.221-231,
11 Quantitative Measures for Code Obfuscation Coverage by the Natural Language Processing
Kim, Byeong Yeon;Kim, Huy Kang; / Korea Institute of Information Security and Cryptology , v.31, no.2, pp.233-243,
12 An Empirical Study on the Vulnerability of the Modbus Protocol Suitable for the SMEs Manufacturing Enterprises in Korea
Yoo, Jung-hoon;Bae, Chun-sock;Goh, Sung-cheol; / Korea Institute of Information Security and Cryptology , v.31, no.2, pp.245-262,
13 Detecting Security Vulnerabilities in TypeScript Code with Static Taint Analysis
Moon, Taegeun;Kim, Hyoungshick; / Korea Institute of Information Security and Cryptology , v.31, no.2, pp.263-277,
14 A Study on the Application Method of Fuzz Testing to Domestic Weapon Systems Considering the Software Development Life Cycle (SDLC)
Cho, Hyun-suk;Kang, Su-jin;Shin, Yeong-seop;Cho, Kyu-tae; / Korea Institute of Information Security and Cryptology , v.31, no.2, pp.279-289,