|
1 |
A Study On Performance Evaluation of Cryptographic Module and Security Functional Requirements of Secure UAV
Kim, Yongdae;Kim, Deokjin;Yi, Eunkyoung;Lee, Sangwook;
/
Korea Institute of Information Security and Cryptology
, v.32, no.5, pp.737-750,
|
|
2 |
A White Box Implementation of Lightweight Block Cipher PIPO
Ham, Eunji;Lee, Youngdo;Yoon, Kisoon;
/
Korea Institute of Information Security and Cryptology
, v.32, no.5, pp.751-763,
|
|
3 |
Ephemeral Key Reuse Attack of the SABER Algorithm by Meta-PKE Structure
Lee, Changwon;Jeon, Chanho;Kim, Suhri;Hong, Seokhie;
/
Korea Institute of Information Security and Cryptology
, v.32, no.5, pp.765-777,
|
|
4 |
An Efficient LWE-Based Reusable Fuzzy Extractor
Kim, Juon;Lee, Kwangsu;Lee, Dong Hoon;
/
Korea Institute of Information Security and Cryptology
, v.32, no.5, pp.779-790,
|
|
5 |
A Study on Countermeasures through Messenger Phishing Experience Analysis
Nam, Sowon;Lee, Haksun;Lee, Sangjin;
/
Korea Institute of Information Security and Cryptology
, v.32, no.5, pp.791-805,
|
|
6 |
SITM Attacks on Skinny-128-384 and Romulus-N
Park, Jonghyun;Kim, Jongsung;
/
Korea Institute of Information Security and Cryptology
, v.32, no.5, pp.807-816,
|
|
7 |
Model Type Inference Attack Using Output of Black-Box AI Model
An, Yoonsoo;Choi, Daeseon;
/
Korea Institute of Information Security and Cryptology
, v.32, no.5, pp.817-826,
|
|
8 |
Analysis of the Password Leaking in Virtual Keyboard
Yang, Hee-dong;Lee, Man-hee;
/
Korea Institute of Information Security and Cryptology
, v.32, no.5, pp.827-835,
|
|
9 |
Effecient Techniques to Block Copyright Infringement Illegal Streaming Sites
Kim, Chan-hee;Yu, Ho-jei;Kim, Seo-yeon;Oh, Soo-hyun;
/
Korea Institute of Information Security and Cryptology
, v.32, no.5, pp.837-844,
|
|
10 |
Vulnerability analysis for AppLock Application
Hong, Pyo-gil;Kim, Dohyun;
/
Korea Institute of Information Security and Cryptology
, v.32, no.5, pp.845-853,
|
|
11 |
Reverse Engineering of Deep Learning Network Secret Information Through Side Channel Attack
Park, Sujin;Lee, Juheon;Kim, HeeSeok;
/
Korea Institute of Information Security and Cryptology
, v.32, no.5, pp.855-867,
|
|
12 |
Malicious Code Injection Vulnerability Analysis in the Deflate Algorithm
Kim, Jung-hoon;
/
Korea Institute of Information Security and Cryptology
, v.32, no.5, pp.869-879,
|
|
13 |
A General Acoustic Drone Detection Using Noise Reduction Preprocessing
Kang, Hae Young;Lee, Kyung-ho;
/
Korea Institute of Information Security and Cryptology
, v.32, no.5, pp.881-890,
|
|
14 |
A Proposal for Drone Entity Identification and Secure Information Provision Technology Using Quantum Entropy Chip-Based Cryptographic Module in WLAN Environment
Jung, Seowoo;Yun, Seunghwan;Yi, Okyeon;
/
Korea Institute of Information Security and Cryptology
, v.32, no.5, pp.891-898,
|
|
15 |
A Private Key Management Guideline For Secure Blockchain-Based Services
Noh, Siwan;Rhee, Kyung-Hyune;
/
Korea Institute of Information Security and Cryptology
, v.32, no.5, pp.899-914,
|
|
16 |
Combination Key Generation Scheme Robust to Updates of Personal Information
Jang, Hobin;Noh, Geontae;Jeong, Ik Rae;Chun, Ji Young;
/
Korea Institute of Information Security and Cryptology
, v.32, no.5, pp.915-932,
|
|
17 |
CNN-Based Malware Detection Using Opcode Frequency-Based Image
Ko, Seok Min;Yang, JaeHyeok;Choi, WonJun;Kim, TaeGuen;
/
Korea Institute of Information Security and Cryptology
, v.32, no.5, pp.933-943,
|
|
18 |
Method of Similarity Hash-Based Malware Family Classification
Kim, Yun-jeong;Kim, Moon-sun;Lee, Man-hee;
/
Korea Institute of Information Security and Cryptology
, v.32, no.5, pp.945-954,
|
|
19 |
Network Security Protocol Performance Analysis in IoT Environment
Kang, Dong-hee;Lim, Jae-Deok;
/
Korea Institute of Information Security and Cryptology
, v.32, no.5, pp.955-963,
|
|
20 |
Electromagnetic and Thermal Information Utilization System to Improve The Success Rate of Laser Fault Injection Attack
Mun, HyeWon;Ji, Jae-deok;Han, Dong-Guk;
/
Korea Institute of Information Security and Cryptology
, v.32, no.5, pp.965-973,
|
|
21 |
Adversarial Example Detection Based on Symbolic Representation of Image
Park, Sohee;Kim, Seungjoo;Yoon, Hayeon;Choi, Daeseon;
/
Korea Institute of Information Security and Cryptology
, v.32, no.5, pp.975-986,
|
|
22 |
Novel Deep Learning-Based Profiling Side-Channel Analysis on the Different-Device
Woo, Ji-Eun;Han, Dong-Guk;
/
Korea Institute of Information Security and Cryptology
, v.32, no.5, pp.987-995,
|
|
23 |
A Study on Robustness Evaluation and Improvement of AI Model for Malware Variation Analysis
Lee, Eun-gyu;Jeong, Si-on;Lee, Hyun-woo;Lee, Tea-jin;
/
Korea Institute of Information Security and Cryptology
, v.32, no.5, pp.997-1008,
|
|
24 |
A Multiclass Classification of the Security Severity Level of Multi-Source Event Log Based on Natural Language Processing
Seo, Yangjin;
/
Korea Institute of Information Security and Cryptology
, v.32, no.5, pp.1009-1017,
|
|
25 |
Trustworthy AI Framework for Malware Response
Shin, Kyounga;Lee, Yunho;Bae, ByeongJu;Lee, Soohang;Hong, Heeju;Choi, Youngjin;Lee, Sangjin;
/
Korea Institute of Information Security and Cryptology
, v.32, no.5, pp.1019-1034,
|
|