Browse > Article List

논문
1 A Study On Performance Evaluation of Cryptographic Module and Security Functional Requirements of Secure UAV
Kim, Yongdae;Kim, Deokjin;Yi, Eunkyoung;Lee, Sangwook; / Korea Institute of Information Security and Cryptology , v.32, no.5, pp.737-750,
2 A White Box Implementation of Lightweight Block Cipher PIPO
Ham, Eunji;Lee, Youngdo;Yoon, Kisoon; / Korea Institute of Information Security and Cryptology , v.32, no.5, pp.751-763,
3 Ephemeral Key Reuse Attack of the SABER Algorithm by Meta-PKE Structure
Lee, Changwon;Jeon, Chanho;Kim, Suhri;Hong, Seokhie; / Korea Institute of Information Security and Cryptology , v.32, no.5, pp.765-777,
4 An Efficient LWE-Based Reusable Fuzzy Extractor
Kim, Juon;Lee, Kwangsu;Lee, Dong Hoon; / Korea Institute of Information Security and Cryptology , v.32, no.5, pp.779-790,
5 A Study on Countermeasures through Messenger Phishing Experience Analysis
Nam, Sowon;Lee, Haksun;Lee, Sangjin; / Korea Institute of Information Security and Cryptology , v.32, no.5, pp.791-805,
6 SITM Attacks on Skinny-128-384 and Romulus-N
Park, Jonghyun;Kim, Jongsung; / Korea Institute of Information Security and Cryptology , v.32, no.5, pp.807-816,
7 Model Type Inference Attack Using Output of Black-Box AI Model
An, Yoonsoo;Choi, Daeseon; / Korea Institute of Information Security and Cryptology , v.32, no.5, pp.817-826,
8 Analysis of the Password Leaking in Virtual Keyboard
Yang, Hee-dong;Lee, Man-hee; / Korea Institute of Information Security and Cryptology , v.32, no.5, pp.827-835,
9 Effecient Techniques to Block Copyright Infringement Illegal Streaming Sites
Kim, Chan-hee;Yu, Ho-jei;Kim, Seo-yeon;Oh, Soo-hyun; / Korea Institute of Information Security and Cryptology , v.32, no.5, pp.837-844,
10 Vulnerability analysis for AppLock Application
Hong, Pyo-gil;Kim, Dohyun; / Korea Institute of Information Security and Cryptology , v.32, no.5, pp.845-853,
11 Reverse Engineering of Deep Learning Network Secret Information Through Side Channel Attack
Park, Sujin;Lee, Juheon;Kim, HeeSeok; / Korea Institute of Information Security and Cryptology , v.32, no.5, pp.855-867,
12 Malicious Code Injection Vulnerability Analysis in the Deflate Algorithm
Kim, Jung-hoon; / Korea Institute of Information Security and Cryptology , v.32, no.5, pp.869-879,
13 A General Acoustic Drone Detection Using Noise Reduction Preprocessing
Kang, Hae Young;Lee, Kyung-ho; / Korea Institute of Information Security and Cryptology , v.32, no.5, pp.881-890,
14 A Proposal for Drone Entity Identification and Secure Information Provision Technology Using Quantum Entropy Chip-Based Cryptographic Module in WLAN Environment
Jung, Seowoo;Yun, Seunghwan;Yi, Okyeon; / Korea Institute of Information Security and Cryptology , v.32, no.5, pp.891-898,
15 A Private Key Management Guideline For Secure Blockchain-Based Services
Noh, Siwan;Rhee, Kyung-Hyune; / Korea Institute of Information Security and Cryptology , v.32, no.5, pp.899-914,
16 Combination Key Generation Scheme Robust to Updates of Personal Information
Jang, Hobin;Noh, Geontae;Jeong, Ik Rae;Chun, Ji Young; / Korea Institute of Information Security and Cryptology , v.32, no.5, pp.915-932,
17 CNN-Based Malware Detection Using Opcode Frequency-Based Image
Ko, Seok Min;Yang, JaeHyeok;Choi, WonJun;Kim, TaeGuen; / Korea Institute of Information Security and Cryptology , v.32, no.5, pp.933-943,
18 Method of Similarity Hash-Based Malware Family Classification
Kim, Yun-jeong;Kim, Moon-sun;Lee, Man-hee; / Korea Institute of Information Security and Cryptology , v.32, no.5, pp.945-954,
19 Network Security Protocol Performance Analysis in IoT Environment
Kang, Dong-hee;Lim, Jae-Deok; / Korea Institute of Information Security and Cryptology , v.32, no.5, pp.955-963,
20 Electromagnetic and Thermal Information Utilization System to Improve The Success Rate of Laser Fault Injection Attack
Mun, HyeWon;Ji, Jae-deok;Han, Dong-Guk; / Korea Institute of Information Security and Cryptology , v.32, no.5, pp.965-973,
21 Adversarial Example Detection Based on Symbolic Representation of Image
Park, Sohee;Kim, Seungjoo;Yoon, Hayeon;Choi, Daeseon; / Korea Institute of Information Security and Cryptology , v.32, no.5, pp.975-986,
22 Novel Deep Learning-Based Profiling Side-Channel Analysis on the Different-Device
Woo, Ji-Eun;Han, Dong-Guk; / Korea Institute of Information Security and Cryptology , v.32, no.5, pp.987-995,
23 A Study on Robustness Evaluation and Improvement of AI Model for Malware Variation Analysis
Lee, Eun-gyu;Jeong, Si-on;Lee, Hyun-woo;Lee, Tea-jin; / Korea Institute of Information Security and Cryptology , v.32, no.5, pp.997-1008,
24 A Multiclass Classification of the Security Severity Level of Multi-Source Event Log Based on Natural Language Processing
Seo, Yangjin; / Korea Institute of Information Security and Cryptology , v.32, no.5, pp.1009-1017,
25 Trustworthy AI Framework for Malware Response
Shin, Kyounga;Lee, Yunho;Bae, ByeongJu;Lee, Soohang;Hong, Heeju;Choi, Youngjin;Lee, Sangjin; / Korea Institute of Information Security and Cryptology , v.32, no.5, pp.1019-1034,