Digital Library
Search: "[ author: 서석충 ]" (11)
Security Verification of Korean Open Crypto Source Codes with Differential Fuzzing Analysis Method
윤형준,
서석충,
Vol. 30, No. 6, pp. 1225-1236,
Dec.
2020
10.13089/JKIISC.2020.30.6.1225
Keywords: Software Testing, Differential Fuzzing, Cryptographic Library, Vulnerability, Software Testing, Differential Fuzzing, Cryptographic Library, Vulnerability
10.13089/JKIISC.2020.30.6.1225
Keywords: Software Testing, Differential Fuzzing, Cryptographic Library, Vulnerability, Software Testing, Differential Fuzzing, Cryptographic Library, Vulnerability
Study on Selftest Requirements in Cryptographic Module Validation Program with FIPS-OpenSSL Source Code Analysis
서석충,
Vol. 29, No. 5, pp. 985-996,
Oct.
2019
10.13089/JKIISC.2019.29.5.985
Keywords: Cryptographic Modules (CMs), Cryptographic Module Validation Program (CMVP), SelfTest, Conditional SelfTest, Power-on SelfTest, Cryptographic Modules (CMs), Cryptographic Module Validation Program (CMVP), SelfTest, Conditional SelfTest, Power-on SelfTest
10.13089/JKIISC.2019.29.5.985
Keywords: Cryptographic Modules (CMs), Cryptographic Module Validation Program (CMVP), SelfTest, Conditional SelfTest, Power-on SelfTest, Cryptographic Modules (CMs), Cryptographic Module Validation Program (CMVP), SelfTest, Conditional SelfTest, Power-on SelfTest
An Efficient Data Authentication Scheme for Content Centric Networking
Seog Chung Seo,
Vol. 26, No. 6, pp. 1375-1386,
Dec.
2016
10.13089/JKIISC.2016.26.6.1375
Keywords: Content Centric Networking, hash chain, Merkle Hash Tree, Data authentication
10.13089/JKIISC.2016.26.6.1375
Keywords: Content Centric Networking, hash chain, Merkle Hash Tree, Data authentication
Security Analysis against RVA-based DPA Countermeasure Applied to $Eta_T$ Pairing Algorithm
Seog-Chung Seo,
Dong-Guk Han,
Seok-Hie Hong,
Vol. 21, No. 2, pp. 83-90,
Apr.
2011
10.13089/JKIISC.2011.21.2.83
Keywords:$Eta_T$ Pairing, Efficient Countermeasure, DPA
10.13089/JKIISC.2011.21.2.83
Keywords:
New Efficient Scalar Multiplication Algorithms Based on Montgomery Ladder Method for Elliptic Curve Cryptosystems
Sung-Min Cho,
Seog-Chung Seo,
Tae-Hyun Kim,
Yung-Ho Park,
Seok-Hie Hong,
Vol. 19, No. 4, pp. 3-20,
Aug.
2009
10.13089/JKIISC.2009.19.4.3
Keywords: Elliptic Curve Cryptosystem, Montgomery ladder, Simple Power Analysis
10.13089/JKIISC.2009.19.4.3
Keywords: Elliptic Curve Cryptosystem, Montgomery ladder, Simple Power Analysis
TinyECCK : Efficient Implementation of Elliptic Curve Cryptosystem over GF$(2^m)$ on 8-bit Micaz Mote
Seog-Chung Seo,
Dong-Guk Han,
Seok-Hie Hong,
Vol. 18, No. 3, pp. 9-22,
Jun.
2008
10.13089/JKIISC.2008.18.3.9
Keywords: Elliptic Curve Cryptography, Wireless Sensor Networks, Efficient Implementation
10.13089/JKIISC.2008.18.3.9
Keywords: Elliptic Curve Cryptography, Wireless Sensor Networks, Efficient Implementation