Browse > Article List

논문
1 CBDC Model with Enhanced Anonymity Using ID Certificate andBlockchain Encryption
Jae-ho Yoon;Yong-min Kim; / Korea Institute of Information Security and Cryptology , v.33, no.2, pp.139-149,
2 Deep Learning Based Side-Channel Analysis for Recent Masking Countermeasure on SIKE
Woosang Im;Jaeyoung Jang;Hyunil Kim;Changho Seo; / Korea Institute of Information Security and Cryptology , v.33, no.2, pp.151-164,
3 Optimized Implementation of Lightweight Block Cipher SIMECK and SIMON Counter Operation Mode on 32-Bit RISC-V Processors
Min-Joo Sim;Hyeok-Dong Kwon;Yu-Jin Oh;Min-Ho Song;Hwa-Jeong Seo; / Korea Institute of Information Security and Cryptology , v.33, no.2, pp.165-173,
4 Deep Learning-Based Neural Distinguisher for PIPO 64/128
Hyun-Ji Kim;Kyung-Bae Jang;Se-jin Lim;Hwa-Jeong Seo; / Korea Institute of Information Security and Cryptology , v.33, no.2, pp.175-182,
5 A High Speed Optimized Implementation of Lightweight Cryptography TinyJAMBU on Internet of Things Processor 8-Bit AVR
Hyeok-Dong Kwon;Si-Woo Eum;Min-Joo Sim;Yu-Jin Yang;Hwa-Jeong Seo; / Korea Institute of Information Security and Cryptology , v.33, no.2, pp.183-191,
6 S-PRESENT Cryptanalysis through Know-Plaintext Attack Based on Deep Learning
Se-jin Lim;Hyun-Ji Kim;Kyung-Bae Jang;Yea-jun Kang;Won-Woong Kim;Yu-Jin Yang;Hwa-Jeong Seo; / Korea Institute of Information Security and Cryptology , v.33, no.2, pp.193-200,
7 De-Identified Face Image Generation within Face Verification for Privacy Protection
Jung-jae Lee;Hyun-sik Na;To-min Ok;Dae-seon Choi; / Korea Institute of Information Security and Cryptology , v.33, no.2, pp.201-210,
8 An Efficient Post-Quantum Signature Scheme Based on Multivariate-Quadratic Equations with Shorter Secret Keys
Kyung-Ah Shim; / Korea Institute of Information Security and Cryptology , v.33, no.2, pp.211-222,
9 Improvement in Inefficient Repetition of Gauss Sieve
Byeongho Cheon;Changwon Lee;Chanho Jeon;Seokhie Hong;Suhri Kim; / Korea Institute of Information Security and Cryptology , v.33, no.2, pp.223-233,
10 Accelerating ORAM with PIM
Suhwan Shin;Hojoon Lee; / Korea Institute of Information Security and Cryptology , v.33, no.2, pp.235-242,
11 Optimized Implementation of CSIDH-512 through Three-Level Hybrid Montgomery Reduction on ARM Cortex-M7
Younglok Choi;Donghoe Heo;Seokhie Hong;Suhri Kim; / Korea Institute of Information Security and Cryptology , v.33, no.2, pp.243-252,
12 Efficient Null Pointer Dereference Vulnerability Detection by Data Dependency Analysis on Binary
Wenhui Jin;Heekuck Oh; / Korea Institute of Information Security and Cryptology , v.33, no.2, pp.253-266,
13 A Preemptive Detection Method for Unknown IoT Botnet Based on Darknet Traffic
Gunyang Park;Jungsuk Song;Heejun Roh; / Korea Institute of Information Security and Cryptology , v.33, no.2, pp.267-280,
14 A Study on Vulnerability Severity Evaluation Considering Attacker Skill Level Based on Time Series Characteristics
Seong-Su Yoon;Ieck-chae Euom; / Korea Institute of Information Security and Cryptology , v.33, no.2, pp.281-293,
15 Design and Forensic Analysis of a Zero Trust Model for Amazon S3
Kyeong-Hyun Cho;Jae-Han Cho;Hyeon-Woo Lee;Jiyeon Kim; / Korea Institute of Information Security and Cryptology , v.33, no.2, pp.295-303,
16 FunRank: Finding 1-Day Vulnerability with Call-Site and Data-Flow Analysis
Jaehyu Lee;Jihun Baek;Hyungon Moon; / Korea Institute of Information Security and Cryptology , v.33, no.2, pp.305-318,
17 Lightweight Capability-Based Access Control System on File Descriptor via ARM PA
Kyuwon Cho;Hojoon Lee; / Korea Institute of Information Security and Cryptology , v.33, no.2, pp.319-323,
18 Commercial ECU-Based Test-Bed for LIN-CAN Co-Analysis and Proof on Ultrasonic Sensors through Physical Error Injection
Yoon-ji Kim;Ye-ji Koh;In-su Oh;Kang-bin Yim; / Korea Institute of Information Security and Cryptology , v.33, no.2, pp.325-336,
19 Enhancing Kernel Module Security Using WebAssembly
Hajeong Lim;Hojoon Lee; / Korea Institute of Information Security and Cryptology , v.33, no.2, pp.337-344,
20 Limitations and Future Work Suggetion on Safe Interaction Model between Rust and C/C++
Taehyun Noh;Hojoon Lee; / Korea Institute of Information Security and Cryptology , v.33, no.2, pp.345-351,
21 A Study on the Improvement of User Identification of Non-Face-to-Face Financial Transactions with Messenger Phishing Case
Eun Bi Kim;Ik Rae Jeong; / Korea Institute of Information Security and Cryptology , v.33, no.2, pp.353-362,