Browse > Article List

논문
1 Optimal Implementation of Lightweight Block Cipher PIPO on CUDA GPGPU
Kim, Hyun-Jun;Eum, Si-Woo;Seo, Hwa-Jeong; / Korea Institute of Information Security and Cryptology , v.32, no.6, pp.1035-1043,
2 Non-Profiling Analysis Attacks on PQC Standardization Algorithm CRYSTALS-KYBER and Countermeasures
Jang, Sechang;Ha, Jaecheol; / Korea Institute of Information Security and Cryptology , v.32, no.6, pp.1045-1057,
3 Power-Based Side Channel Attack and Countermeasure on the Post-Quantum Cryptography NTRU
Jang, Jaewon;Ha, Jaecheol; / Korea Institute of Information Security and Cryptology , v.32, no.6, pp.1059-1068,
4 Software Defined Perimeter(SDP) Authentication Mechanism for Zero Trust and Implementation of ECC Cryptoraphy
Lee, Yun-kyung;Kim, Jeong-nyeo; / Korea Institute of Information Security and Cryptology , v.32, no.6, pp.1069-1080,
5 Query-Efficient Black-Box Adversarial Attack Methods on Face Recognition Model
Seo, Seong-gwan;Son, Baehoon;Yun, Joobeom; / Korea Institute of Information Security and Cryptology , v.32, no.6, pp.1081-1090,
6 Real-Time Attack Detection System Using Event-Based Runtime Monitoring in ROS 2
Kang, Jeonghwan;Seo, Minseong;Park, Jaeyeol;Kwon, Donghyun; / Korea Institute of Information Security and Cryptology , v.32, no.6, pp.1091-1102,
7 TCST : A Technology for Verifying Control Flow Integrity for Smart Contracts within a Trusted Execution Environment
Park, Seonghwan;Kwon, Donghyun; / Korea Institute of Information Security and Cryptology , v.32, no.6, pp.1103-1112,
8 Forensic Analysis of Element Instant Messenger Artifacts
Cho, Jae-min;Byun, Hyeon-su;Yun, Hui-seo;Seo, Seung-hee;Lee, Chang-hoon; / Korea Institute of Information Security and Cryptology , v.32, no.6, pp.1113-1120,
9 Firmware Fuzzing Method through Pseudo-HAL Identification
Jeong, Seyeon;Hwang, Eunbi;Cho, Yeongpil;Kwon, Taekyoung; / Korea Institute of Information Security and Cryptology , v.32, no.6, pp.1121-1125,
10 Design and Implementation of High-Performance Cryptanalysis System Based on GPUDirect RDMA
Lee, Seokmin;Shin, Youngjoo; / Korea Institute of Information Security and Cryptology , v.32, no.6, pp.1127-1137,
11 A BERT-Based Deep Learning Approach for Vulnerability Detection
Jin, Wenhui;Oh, Heekuck; / Korea Institute of Information Security and Cryptology , v.32, no.6, pp.1139-1150,
12 A Study on Security Evaluation for Secure Software Update Management System in Automotive
Seo, Jaewan;Kwak, Jiwon;Hong, Paul;Cho, Kwangsoo;Kim, Seungjoo; / Korea Institute of Information Security and Cryptology , v.32, no.6, pp.1151-1163,
13 A Statistical Detection Method to Detect Abnormal Cluster Head Election Attacks in Clustered Wireless Sensor Networks
Kim, Sumin;Cho, Youngho; / Korea Institute of Information Security and Cryptology , v.32, no.6, pp.1165-1170,
14 Intrusion Detection System Based on Sequential Model in SOME/IP
Kang, Yeonjae;Pi, Daekwon;Kim, Haerin;Lee, Sangho;Kim, Huy Kang; / Korea Institute of Information Security and Cryptology , v.32, no.6, pp.1171-1181,
15 Korean Security Risk Management Framework for the Application of Defense Acquisition System
Yang, Woo-sung;Cha, Sung-yong;Yoon, Jong-sung;Kwon, Hyeok-joo;Yoo, Jae-won; / Korea Institute of Information Security and Cryptology , v.32, no.6, pp.1183-1192,