|
1 |
A Study on Creating WBC-AES Dummy LUT as a Countermeasure against DCA
Minyeong Choi;Byoungjin Seok;Seunghee Seo;Changhoon Lee;
/
Korea Institute of Information Security and Cryptology
, v.33, no.3, pp.363-374,
|
|
2 |
Precise Max-Pooling on Fully Homomorphic Encryption
Eunsang Lee;
/
Korea Institute of Information Security and Cryptology
, v.33, no.3, pp.375-381,
|
|
3 |
Quantum Circuit Implementation of the LED Block Cipher with Compact Qubit
Min-ho Song;Kyung-bae Jang;Gyeong-ju Song;Won-woong Kim;Hwa-Jeong Seo;
/
Korea Institute of Information Security and Cryptology
, v.33, no.3, pp.383-389,
|
|
4 |
Optimized Implementation of Lightweight Block Cipher PIPO Using T-Table
Minsig Choi;Sunyeop Kim;Insung Kim;Hanbeom Shin;Seonggyeom Kim;Seokhie Hong;
/
Korea Institute of Information Security and Cryptology
, v.33, no.3, pp.391-399,
|
|
5 |
Efficient Implementation of NIST LWC SPARKLE on 64-Bit ARMv8
Hanbeom Shin;Gyusang Kim;Myeonghoon Lee;Insung Kim;Sunyeop Kim;Donggeun Kwon;Seonggyeom Kim;Seogchung Seo;Seokhie Hong;
/
Korea Institute of Information Security and Cryptology
, v.33, no.3, pp.401-410,
|
|
6 |
A Study on Effective Interpretation of AI Model based on Reference
Hyun-woo Lee;Tae-hyun Han;Yeong-ji Park;Tae-jin Lee;
/
Korea Institute of Information Security and Cryptology
, v.33, no.3, pp.411-425,
|
|
7 |
Count-Min HyperLogLog : Cardinality Estimation Algorithm for Big Network Data
Sinjung Kang;DaeHun Nyang;
/
Korea Institute of Information Security and Cryptology
, v.33, no.3, pp.427-435,
|
|
8 |
Security Analysis of ARM64 Hardware-Based Security
Myung-Kyu Sim;Hojoon Lee;
/
Korea Institute of Information Security and Cryptology
, v.33, no.3, pp.437-447,
|
|
9 |
StarGAN-Based Detection and Purification Studies to Defend against Adversarial Attacks
Sungjune Park;Gwonsang Ryu;Daeseon Choi;
/
Korea Institute of Information Security and Cryptology
, v.33, no.3, pp.449-458,
|
|
10 |
Design Method of Things Malware Detection System(TMDS)
Sangyoon Shin;Dahee Lee;Sangjin Lee;
/
Korea Institute of Information Security and Cryptology
, v.33, no.3, pp.459-469,
|
|
11 |
A Study on the Digital Forensics Artifacts Collection and Analysis of Browser Extension-Based Crypto Wallet
Ju-eun Kim;Seung-hee Seo;Beong-jin Seok;Heoyn-su Byun;Chang-hoon Lee;
/
Korea Institute of Information Security and Cryptology
, v.33, no.3, pp.471-485,
|
|
12 |
Pentesting-Based Proactive Cloud Infringement Incident Response Framework
Hyeon No;Ji-won Ock;Seong-min Kim;
/
Korea Institute of Information Security and Cryptology
, v.33, no.3, pp.487-498,
|
|
13 |
A Study on Ransomware Detection Methods in Actual Cases of Public Institutions
Yong Ju Park;Huy Kang Kim;
/
Korea Institute of Information Security and Cryptology
, v.33, no.3, pp.499-510,
|
|
14 |
A Study on the Decryption Method for Volume Encryption and Backup Applications
Gwui-eun Park;Min-jeong Lee;Soo-jin Kang;Gi-yoon Kim;Jong-sung Kim;
/
Korea Institute of Information Security and Cryptology
, v.33, no.3, pp.511-525,
|
|
15 |
IaC-VIMF: IaC-Based Virtual Infrastructure Mutagenesis Framework for Cyber Defense Training
Joo-Young Roh;Se-Han Lee;Ki-Woong Park;
/
Korea Institute of Information Security and Cryptology
, v.33, no.3, pp.527-535,
|
|
16 |
A Study on Data Acquisition of IoT Devices Intrusion
Jong-bum Lee;Ieck-Chae Euom;
/
Korea Institute of Information Security and Cryptology
, v.33, no.3, pp.537-547,
|
|
17 |
A Study on Improving Data Poisoning Attack Detection against Network Data Analytics Function in 5G Mobile Edge Computing
Ji-won Ock;Hyeon No;Yeon-sup Lim;Seong-min Kim;
/
Korea Institute of Information Security and Cryptology
, v.33, no.3, pp.549-559,
|
|
18 |
A Study on the Human Vulnerability Classification System for People-Centric Security
Jungjun Park;Seongjin Ahn;
/
Korea Institute of Information Security and Cryptology
, v.33, no.3, pp.561-575,
|
|
19 |
A Methodology for SDLC of AI-based Defense Information System
Gyu-do Park;Young-ran Lee;
/
Korea Institute of Information Security and Cryptology
, v.33, no.3, pp.577-589,
|
|