|
1 |
Optimal Implementation of Lightweight Block Cipher PIPO on CUDA GPGPU
Kim, Hyun-Jun;Eum, Si-Woo;Seo, Hwa-Jeong;
/
Korea Institute of Information Security and Cryptology
, v.32, no.6, pp.1035-1043,
|
|
2 |
Non-Profiling Analysis Attacks on PQC Standardization Algorithm CRYSTALS-KYBER and Countermeasures
Jang, Sechang;Ha, Jaecheol;
/
Korea Institute of Information Security and Cryptology
, v.32, no.6, pp.1045-1057,
|
|
3 |
Power-Based Side Channel Attack and Countermeasure on the Post-Quantum Cryptography NTRU
Jang, Jaewon;Ha, Jaecheol;
/
Korea Institute of Information Security and Cryptology
, v.32, no.6, pp.1059-1068,
|
|
4 |
Software Defined Perimeter(SDP) Authentication Mechanism for Zero Trust and Implementation of ECC Cryptoraphy
Lee, Yun-kyung;Kim, Jeong-nyeo;
/
Korea Institute of Information Security and Cryptology
, v.32, no.6, pp.1069-1080,
|
|
5 |
Query-Efficient Black-Box Adversarial Attack Methods on Face Recognition Model
Seo, Seong-gwan;Son, Baehoon;Yun, Joobeom;
/
Korea Institute of Information Security and Cryptology
, v.32, no.6, pp.1081-1090,
|
|
6 |
Real-Time Attack Detection System Using Event-Based Runtime Monitoring in ROS 2
Kang, Jeonghwan;Seo, Minseong;Park, Jaeyeol;Kwon, Donghyun;
/
Korea Institute of Information Security and Cryptology
, v.32, no.6, pp.1091-1102,
|
|
7 |
TCST : A Technology for Verifying Control Flow Integrity for Smart Contracts within a Trusted Execution Environment
Park, Seonghwan;Kwon, Donghyun;
/
Korea Institute of Information Security and Cryptology
, v.32, no.6, pp.1103-1112,
|
|
8 |
Forensic Analysis of Element Instant Messenger Artifacts
Cho, Jae-min;Byun, Hyeon-su;Yun, Hui-seo;Seo, Seung-hee;Lee, Chang-hoon;
/
Korea Institute of Information Security and Cryptology
, v.32, no.6, pp.1113-1120,
|
|
9 |
Firmware Fuzzing Method through Pseudo-HAL Identification
Jeong, Seyeon;Hwang, Eunbi;Cho, Yeongpil;Kwon, Taekyoung;
/
Korea Institute of Information Security and Cryptology
, v.32, no.6, pp.1121-1125,
|
|
10 |
Design and Implementation of High-Performance Cryptanalysis System Based on GPUDirect RDMA
Lee, Seokmin;Shin, Youngjoo;
/
Korea Institute of Information Security and Cryptology
, v.32, no.6, pp.1127-1137,
|
|
11 |
A BERT-Based Deep Learning Approach for Vulnerability Detection
Jin, Wenhui;Oh, Heekuck;
/
Korea Institute of Information Security and Cryptology
, v.32, no.6, pp.1139-1150,
|
|
12 |
A Study on Security Evaluation for Secure Software Update Management System in Automotive
Seo, Jaewan;Kwak, Jiwon;Hong, Paul;Cho, Kwangsoo;Kim, Seungjoo;
/
Korea Institute of Information Security and Cryptology
, v.32, no.6, pp.1151-1163,
|
|
13 |
A Statistical Detection Method to Detect Abnormal Cluster Head Election Attacks in Clustered Wireless Sensor Networks
Kim, Sumin;Cho, Youngho;
/
Korea Institute of Information Security and Cryptology
, v.32, no.6, pp.1165-1170,
|
|
14 |
Intrusion Detection System Based on Sequential Model in SOME/IP
Kang, Yeonjae;Pi, Daekwon;Kim, Haerin;Lee, Sangho;Kim, Huy Kang;
/
Korea Institute of Information Security and Cryptology
, v.32, no.6, pp.1171-1181,
|
|
15 |
Korean Security Risk Management Framework for the Application of Defense Acquisition System
Yang, Woo-sung;Cha, Sung-yong;Yoon, Jong-sung;Kwon, Hyeok-joo;Yoo, Jae-won;
/
Korea Institute of Information Security and Cryptology
, v.32, no.6, pp.1183-1192,
|
|