|
1 |
CBDC Model with Enhanced Anonymity Using ID Certificate andBlockchain Encryption
Jae-ho Yoon;Yong-min Kim;
/
Korea Institute of Information Security and Cryptology
, v.33, no.2, pp.139-149,
|
|
2 |
Deep Learning Based Side-Channel Analysis for Recent Masking Countermeasure on SIKE
Woosang Im;Jaeyoung Jang;Hyunil Kim;Changho Seo;
/
Korea Institute of Information Security and Cryptology
, v.33, no.2, pp.151-164,
|
|
3 |
Optimized Implementation of Lightweight Block Cipher SIMECK and SIMON Counter Operation Mode on 32-Bit RISC-V Processors
Min-Joo Sim;Hyeok-Dong Kwon;Yu-Jin Oh;Min-Ho Song;Hwa-Jeong Seo;
/
Korea Institute of Information Security and Cryptology
, v.33, no.2, pp.165-173,
|
|
4 |
Deep Learning-Based Neural Distinguisher for PIPO 64/128
Hyun-Ji Kim;Kyung-Bae Jang;Se-jin Lim;Hwa-Jeong Seo;
/
Korea Institute of Information Security and Cryptology
, v.33, no.2, pp.175-182,
|
|
5 |
A High Speed Optimized Implementation of Lightweight Cryptography TinyJAMBU on Internet of Things Processor 8-Bit AVR
Hyeok-Dong Kwon;Si-Woo Eum;Min-Joo Sim;Yu-Jin Yang;Hwa-Jeong Seo;
/
Korea Institute of Information Security and Cryptology
, v.33, no.2, pp.183-191,
|
|
6 |
S-PRESENT Cryptanalysis through Know-Plaintext Attack Based on Deep Learning
Se-jin Lim;Hyun-Ji Kim;Kyung-Bae Jang;Yea-jun Kang;Won-Woong Kim;Yu-Jin Yang;Hwa-Jeong Seo;
/
Korea Institute of Information Security and Cryptology
, v.33, no.2, pp.193-200,
|
|
7 |
De-Identified Face Image Generation within Face Verification for Privacy Protection
Jung-jae Lee;Hyun-sik Na;To-min Ok;Dae-seon Choi;
/
Korea Institute of Information Security and Cryptology
, v.33, no.2, pp.201-210,
|
|
8 |
An Efficient Post-Quantum Signature Scheme Based on Multivariate-Quadratic Equations with Shorter Secret Keys
Kyung-Ah Shim;
/
Korea Institute of Information Security and Cryptology
, v.33, no.2, pp.211-222,
|
|
9 |
Improvement in Inefficient Repetition of Gauss Sieve
Byeongho Cheon;Changwon Lee;Chanho Jeon;Seokhie Hong;Suhri Kim;
/
Korea Institute of Information Security and Cryptology
, v.33, no.2, pp.223-233,
|
|
10 |
Accelerating ORAM with PIM
Suhwan Shin;Hojoon Lee;
/
Korea Institute of Information Security and Cryptology
, v.33, no.2, pp.235-242,
|
|
11 |
Optimized Implementation of CSIDH-512 through Three-Level Hybrid Montgomery Reduction on ARM Cortex-M7
Younglok Choi;Donghoe Heo;Seokhie Hong;Suhri Kim;
/
Korea Institute of Information Security and Cryptology
, v.33, no.2, pp.243-252,
|
|
12 |
Efficient Null Pointer Dereference Vulnerability Detection by Data Dependency Analysis on Binary
Wenhui Jin;Heekuck Oh;
/
Korea Institute of Information Security and Cryptology
, v.33, no.2, pp.253-266,
|
|
13 |
A Preemptive Detection Method for Unknown IoT Botnet Based on Darknet Traffic
Gunyang Park;Jungsuk Song;Heejun Roh;
/
Korea Institute of Information Security and Cryptology
, v.33, no.2, pp.267-280,
|
|
14 |
A Study on Vulnerability Severity Evaluation Considering Attacker Skill Level Based on Time Series Characteristics
Seong-Su Yoon;Ieck-chae Euom;
/
Korea Institute of Information Security and Cryptology
, v.33, no.2, pp.281-293,
|
|
15 |
Design and Forensic Analysis of a Zero Trust Model for Amazon S3
Kyeong-Hyun Cho;Jae-Han Cho;Hyeon-Woo Lee;Jiyeon Kim;
/
Korea Institute of Information Security and Cryptology
, v.33, no.2, pp.295-303,
|
|
16 |
FunRank: Finding 1-Day Vulnerability with Call-Site and Data-Flow Analysis
Jaehyu Lee;Jihun Baek;Hyungon Moon;
/
Korea Institute of Information Security and Cryptology
, v.33, no.2, pp.305-318,
|
|
17 |
Lightweight Capability-Based Access Control System on File Descriptor via ARM PA
Kyuwon Cho;Hojoon Lee;
/
Korea Institute of Information Security and Cryptology
, v.33, no.2, pp.319-323,
|
|
18 |
Commercial ECU-Based Test-Bed for LIN-CAN Co-Analysis and Proof on Ultrasonic Sensors through Physical Error Injection
Yoon-ji Kim;Ye-ji Koh;In-su Oh;Kang-bin Yim;
/
Korea Institute of Information Security and Cryptology
, v.33, no.2, pp.325-336,
|
|
19 |
Enhancing Kernel Module Security Using WebAssembly
Hajeong Lim;Hojoon Lee;
/
Korea Institute of Information Security and Cryptology
, v.33, no.2, pp.337-344,
|
|
20 |
Limitations and Future Work Suggetion on Safe Interaction Model between Rust and C/C++
Taehyun Noh;Hojoon Lee;
/
Korea Institute of Information Security and Cryptology
, v.33, no.2, pp.345-351,
|
|
21 |
A Study on the Improvement of User Identification of Non-Face-to-Face Financial Transactions with Messenger Phishing Case
Eun Bi Kim;Ik Rae Jeong;
/
Korea Institute of Information Security and Cryptology
, v.33, no.2, pp.353-362,
|
|