Digital Legal Seal for Message Authentication Code
![]() |
Jung, ChangHun
(Inha University)
Shin, DongOh (Inha University) Jang, RhongHo (Inha University) Nyang, DaeHun (Inha University) Lee, KyungHee (The University of Suwon) Youm, Heung-Youl (Soonchunhyang University) |
1 | Payment & Settlement Systems Departm ent, "Payment & Settlement Newsletter," http://www.bok.or.kr/contents/total/ko/boardView.action?menuNaviId=109&boardBean.brdid=119573&boardBean.menuid=109, The Bank of Korea, Vol. 2015, No. 8, Aug. 2015. |
2 | H. Seo and H. Kim, "Design and Implementation of Physical Secure Card for Financial Security," Journal of the Korea Institute of Information and Communication Engineering, Vol. 19, No. 4, pp. 855-863, Apr. 2015. DOI |
3 | H. Lee, "Press Releases," http://www.ofthepeople.kr/bbs/board.php?bo_table=b_0203&wr_id=188, Republic of Korea Nat ional Assembly, Sep. 2015. |
4 | M. Wu, S. Garfinkel and R. Miller, "Secure Web Authentication with Mobile Phones," DIMACS Workshop on Usable Privacy and Security Software, 2014. |
5 | Y. Maeng, D. Shin, S. Kim, D. Nyang and M. Lee, "A Vulnerability Analysis of MITB in Online Banking Transactions in Korea," Internet and Information Security, Vol. 1, No. 2, pp. 101-118, Nov. 2010. |
6 | Electronic Finance Division, "Press Releases," http://www.fsc.go.kr/info/ntc_news_view.jsp?bbsid=BBS0030&page=1&sch1=&sword=&r_url=&menu=7210100&chk=29613&no=29612, Financial Services Commission, Jan. 2014. |
7 | M. Bellare, J. Kilian and P. Rogaway, "The Security of the Cipher Block Chaining Message Authentication Code," Journal of Computer and System Sciences, Vol. 61, Issue 3, pp. 362-399, Dec. 2000. DOI |
8 | M. Bellare, R. Canetti and H. Krawczyk, "Keying Hash Functions for Message Authentication," Lecture Notes in Computer Science, Vol. 1109, pp. 1-15, July. 2001. |
9 | Arduino UNO, http://www.arduino.cc/en/Main/ArduinoBoardUno |
10 | TCRT5000, http://www.vishay.com/docs/83760/tcrt5000.pdf |
11 | T. Kim, J. Lee and D. Lee, "Study on Mobile OTP(One Time Password) Mechanism based PKI for Preventing Phishing Attacks and Improving Availability," Korea Institute of Information Security and Cryptology, Vol. 21, No. 1, pp. 15-26, Feb. 2011. |
12 | B. Kang and H. Kim, "A study on the vulnerability of OTP implementation by using MITM attack and reverse engineering," Korea Institute of Information Security and Cryptology, Vol. 21. No. 6, pp. 83-99, Dec. 2011. |
![]() |