Digital Library
Search: "[ author: 김태현 ]" (15)
Analysis of Usage Patterns and Security Vulnerabilities in Android Permissions and Broadcast Intent Mechanism
Young-Dong Kim,
Ikhwan Kim,
Taehyoun Kim,
Vol. 22, No. 5, pp. 1145-1158,
Oct.
2012
10.13089/JKIISC.2012.22.5.1145
Keywords: Android, permission, broadcast intent, security vulnerability
10.13089/JKIISC.2012.22.5.1145
Keywords: Android, permission, broadcast intent, security vulnerability
A new digital signature scheme secure against fault attacks
Tae-Won Kim,
Tae-Hyun Kim,
Seok-Hie Hong,
Young-Ho Park,
Vol. 22, No. 3, pp. 515-524,
Jun.
2012
10.13089/JKIISC.2012.22.3.515
Keywords: DSA, Fault Attacks, Countermeasures
10.13089/JKIISC.2012.22.3.515
Keywords: DSA, Fault Attacks, Countermeasures
DPA-Resistant Low-Area Design of AES S-Box Inversion
Hee-Seok Kim,
Dong-Guk Han,
Tae-Hyun Kim,
Seok-Hie Hong,
Vol. 19, No. 4, pp. 21-28,
Aug.
2009
10.13089/JKIISC.2009.19.4.21
Keywords: Side Channel Attack, Masking Method, AES, S-box, Composite field
10.13089/JKIISC.2009.19.4.21
Keywords: Side Channel Attack, Masking Method, AES, S-box, Composite field
New Efficient Scalar Multiplication Algorithms Based on Montgomery Ladder Method for Elliptic Curve Cryptosystems
Sung-Min Cho,
Seog-Chung Seo,
Tae-Hyun Kim,
Yung-Ho Park,
Seok-Hie Hong,
Vol. 19, No. 4, pp. 3-20,
Aug.
2009
10.13089/JKIISC.2009.19.4.3
Keywords: Elliptic Curve Cryptosystem, Montgomery ladder, Simple Power Analysis
10.13089/JKIISC.2009.19.4.3
Keywords: Elliptic Curve Cryptosystem, Montgomery ladder, Simple Power Analysis
A Proposal of Wavelet-based Differential Power Analysis Method
Jeong-Choon Ryoo,
Dong-Guk Han,
Sung-Kyoung Kim,
Hee-Seok Kim,
Tae-Hyun Kim,
Sang-Jin Lee,
Vol. 19, No. 3, pp. 27-36,
Jun.
2009
10.13089/JKIISC.2009.19.3.27
Keywords: Side Channel Attack, differential power analysis, Correlation Power Analysis, wavelet transform, Multi-Resolution Analysis
10.13089/JKIISC.2009.19.3.27
Keywords: Side Channel Attack, differential power analysis, Correlation Power Analysis, wavelet transform, Multi-Resolution Analysis
Improved Security Analysis of Reduced SMS4 Block Cipher
Tae-Hyun Kim,
Jong-Sung Kim,
Seok-Hie Hong,
Jae-Chul Sung,
Chang-Hoon Lee,
Vol. 19, No. 3, pp. 3-10,
Jun.
2009
10.13089/JKIISC.2009.19.3.3
Keywords: Side-channel attacks, meet-in-the-middle attack, AES
10.13089/JKIISC.2009.19.3.3
Keywords: Side-channel attacks, meet-in-the-middle attack, AES
Performance Improvement of Power Attacks with Truncated Differential Cryptanalysis
Tae-Sun Kang,
Hee-Seok Kim,
Tae-Hyun Kim,
Jong-Sung Kim,
Seok-Hie Hong,
Vol. 19, No. 1, pp. 43-52,
Feb.
2009
10.13089/JKIISC.2009.19.1.43
Keywords: Masking Method, Side Channel Attack, DES, Truncated Differential Cryptanalysis
10.13089/JKIISC.2009.19.1.43
Keywords: Masking Method, Side Channel Attack, DES, Truncated Differential Cryptanalysis
Differential Cryptanalysis of a 20-Round Reduced SMS4 Block Cipher
Tae-Hyun Kim,
Jong-Sung Kim,
Jae-Chul Sung,
Seok-Hie Hong,
Vol. 18, No. 4, pp. 37-44,
Aug.
2008
10.13089/JKIISC.2008.18.4.37
Keywords: block cipher, SMS4, differential cryptanalysis
10.13089/JKIISC.2008.18.4.37
Keywords: block cipher, SMS4, differential cryptanalysis
Secure RSA with CRT Protected Against Fault Attacks without using Checking Procedure
Sung-Kyoung Kim,
Tae-Hyun Kim,
Dong-Guk Han,
Young-Ho Park,
Seok-Hie Hong,
Vol. 18, No. 4, pp. 17-26,
Aug.
2008
10.13089/JKIISC.2008.18.4.17
Keywords: CRT-RSA, Fault Attack, checking procedure
10.13089/JKIISC.2008.18.4.17
Keywords: CRT-RSA, Fault Attack, checking procedure
A High-speed Masking Method to protect ARIA against Side Channel Analysis
Hee-Seok Kim,
Tae-Hyun Kim,
Jeong-Choon Ryoo,
Dong-Guk Han,
Seok-Hie Hong,
Vol. 18, No. 3, pp. 69-78,
Jun.
2008
10.13089/JKIISC.2008.18.3.69
Keywords: side channel attacks, power analysis, The Masking Method, ARIA
10.13089/JKIISC.2008.18.3.69
Keywords: side channel attacks, power analysis, The Masking Method, ARIA