1 |
K. Y. Park and J. H. Seo, "Research on information security technology trends smartphone," in Proc. KICS Int. Conf. Commun., pp. 305-306, Nov. 2014.
|
2 |
D. Kim, S. Yoon, and Y. Lee "Security for IoT services," KICS Inf. and Commun. Mag., vol. 20, no. 8, pp. 53-59, Jul. 2013.
|
3 |
B. Choi, H. J. Shim, C. H. Lee, S. Cho, and S. Cho, "An APK overwrite scheme for preventing modification of android applications," J. KICS, vol. 39, no. 8, pp. 309-316, May 2014.
|
4 |
J.-W. Kim and I. Kim, "The counterfeit & modulation checks on the android applications," in Proc. KITS Int. Conf. Commun., pp. 460-464, 2012.
|
5 |
TTAS, 128-bit Block Cipher SEED, TTAS.KO-12.0004/R1, Dec. 2005.
|
6 |
NIST, Announcing the Advanced Encryption Standard(AES), FIPS PUB-197, Nov. 2002.
|
7 |
KS, 128 bit block encryption algorithm ARIA, KS X 1213:2004, Dec. 2004.
|
8 |
D. Hong, J.-K. Lee, D.-C. Kim, D. Kwon, K. H. Ryu, and D.-G. Lee, "LEA: A 128-bit block cipher for fast encryption on common processors," in Proc. WISA 2013, LNCS, vol. 8269, 2014.
|
9 |
J.-Y. Lee, D.-E. Cho, and J.-Y. Lee, "An integrity verification method for secure application on the smartphone," KIIT, vol. 9, no. 10, pp. 223-228, Oct. 2011.
|
10 |
S. Kim, S. Kim, and D. H. Lee, "A study on the vulnerability of integrity verification functions of android-based smartphone banking applications," JKIISC, vol. 23, no. 4, pp. 743-755, Aug. 2013.
|
11 |
NIST, Secure Hash Standard(SHS), FIPS 180-4, Aug. 2015.
|
12 |
NIST, Recommendation for block cipher modes of operation: Methods and techniques, SP 800-38A, 2001.
|
13 |
D.-C. Kim, D. Hong, J.-K. Lee, W.-H. Kim, and D. Kwon, "LSH: A new fast secure hash function family," Inf. Security and Cryptology, ICISC 2014, pp. 286-313, Jan. 2015.
|
14 |
Daniel R. L. Brown, Standards for efficient cryptography, SEC 1: Elliptic curve cryptography, Certicom Res., May 2009.
|