Browse > Article List

논문
1 A Study on Creating WBC-AES Dummy LUT as a Countermeasure against DCA
Minyeong Choi;Byoungjin Seok;Seunghee Seo;Changhoon Lee; / Korea Institute of Information Security and Cryptology , v.33, no.3, pp.363-374,
2 Precise Max-Pooling on Fully Homomorphic Encryption
Eunsang Lee; / Korea Institute of Information Security and Cryptology , v.33, no.3, pp.375-381,
3 Quantum Circuit Implementation of the LED Block Cipher with Compact Qubit
Min-ho Song;Kyung-bae Jang;Gyeong-ju Song;Won-woong Kim;Hwa-Jeong Seo; / Korea Institute of Information Security and Cryptology , v.33, no.3, pp.383-389,
4 Optimized Implementation of Lightweight Block Cipher PIPO Using T-Table
Minsig Choi;Sunyeop Kim;Insung Kim;Hanbeom Shin;Seonggyeom Kim;Seokhie Hong; / Korea Institute of Information Security and Cryptology , v.33, no.3, pp.391-399,
5 Efficient Implementation of NIST LWC SPARKLE on 64-Bit ARMv8
Hanbeom Shin;Gyusang Kim;Myeonghoon Lee;Insung Kim;Sunyeop Kim;Donggeun Kwon;Seonggyeom Kim;Seogchung Seo;Seokhie Hong; / Korea Institute of Information Security and Cryptology , v.33, no.3, pp.401-410,
6 A Study on Effective Interpretation of AI Model based on Reference
Hyun-woo Lee;Tae-hyun Han;Yeong-ji Park;Tae-jin Lee; / Korea Institute of Information Security and Cryptology , v.33, no.3, pp.411-425,
7 Count-Min HyperLogLog : Cardinality Estimation Algorithm for Big Network Data
Sinjung Kang;DaeHun Nyang; / Korea Institute of Information Security and Cryptology , v.33, no.3, pp.427-435,
8 Security Analysis of ARM64 Hardware-Based Security
Myung-Kyu Sim;Hojoon Lee; / Korea Institute of Information Security and Cryptology , v.33, no.3, pp.437-447,
9 StarGAN-Based Detection and Purification Studies to Defend against Adversarial Attacks
Sungjune Park;Gwonsang Ryu;Daeseon Choi; / Korea Institute of Information Security and Cryptology , v.33, no.3, pp.449-458,
10 Design Method of Things Malware Detection System(TMDS)
Sangyoon Shin;Dahee Lee;Sangjin Lee; / Korea Institute of Information Security and Cryptology , v.33, no.3, pp.459-469,
11 A Study on the Digital Forensics Artifacts Collection and Analysis of Browser Extension-Based Crypto Wallet
Ju-eun Kim;Seung-hee Seo;Beong-jin Seok;Heoyn-su Byun;Chang-hoon Lee; / Korea Institute of Information Security and Cryptology , v.33, no.3, pp.471-485,
12 Pentesting-Based Proactive Cloud Infringement Incident Response Framework
Hyeon No;Ji-won Ock;Seong-min Kim; / Korea Institute of Information Security and Cryptology , v.33, no.3, pp.487-498,
13 A Study on Ransomware Detection Methods in Actual Cases of Public Institutions
Yong Ju Park;Huy Kang Kim; / Korea Institute of Information Security and Cryptology , v.33, no.3, pp.499-510,
14 A Study on the Decryption Method for Volume Encryption and Backup Applications
Gwui-eun Park;Min-jeong Lee;Soo-jin Kang;Gi-yoon Kim;Jong-sung Kim; / Korea Institute of Information Security and Cryptology , v.33, no.3, pp.511-525,
15 IaC-VIMF: IaC-Based Virtual Infrastructure Mutagenesis Framework for Cyber Defense Training
Joo-Young Roh;Se-Han Lee;Ki-Woong Park; / Korea Institute of Information Security and Cryptology , v.33, no.3, pp.527-535,
16 A Study on Data Acquisition of IoT Devices Intrusion
Jong-bum Lee;Ieck-Chae Euom; / Korea Institute of Information Security and Cryptology , v.33, no.3, pp.537-547,
17 A Study on Improving Data Poisoning Attack Detection against Network Data Analytics Function in 5G Mobile Edge Computing
Ji-won Ock;Hyeon No;Yeon-sup Lim;Seong-min Kim; / Korea Institute of Information Security and Cryptology , v.33, no.3, pp.549-559,
18 A Study on the Human Vulnerability Classification System for People-Centric Security
Jungjun Park;Seongjin Ahn; / Korea Institute of Information Security and Cryptology , v.33, no.3, pp.561-575,
19 A Methodology for SDLC of AI-based Defense Information System
Gyu-do Park;Young-ran Lee; / Korea Institute of Information Security and Cryptology , v.33, no.3, pp.577-589,