Digital Library
Search: "[ keyword: Attack ]" (297)
부채널 분석에 안전한 하드웨어 이진 스칼라 곱셈 알고리즘에 대한 단일 파형 비밀 키 비트 종속 공격
심보연,
강준기,
한동국,
Vol. 28, No. 5, pp. 1079-1087,
10월.
2018
10.13089/JKIISC.2018.28.5.1079
주제어: Side-Channel Analysis, Elliptic Curve Cryptography, Single-Trace Attack, Key Bit-dependent Attack, Countermeasure, Side-Channel Analysis, Elliptic Curve Cryptography, Single-Trace Attack, Key Bit-dependent Attack, Countermeasure
주제어: Side-Channel Analysis, Elliptic Curve Cryptography, Single-Trace Attack, Key Bit-dependent Attack, Countermeasure, Side-Channel Analysis, Elliptic Curve Cryptography, Single-Trace Attack, Key Bit-dependent Attack, Countermeasure
경량 암호 알고리듬 CHAM에 대한 오류 주입 공격
권홍필,
하재철,
Vol. 28, No. 5, pp. 1071-1078,
10월.
2018
10.13089/JKIISC.2018.28.5.1071
주제어: Lightweight Block cipher, CHAM, Fault injection attack, Lightweight Block cipher, CHAM, Fault injection attack
주제어: Lightweight Block cipher, CHAM, Fault injection attack, Lightweight Block cipher, CHAM, Fault injection attack
Zorro의 연관키 차분특성을 이용한 키 복구 공격 및 PGV-Zorro의 충돌쌍 공격
김기윤,
박은후,
이종혁,
장성우,
김지훈,
김한기,
김종성,
Vol. 28, No. 5, pp. 1059-1070,
10월.
2018
10.13089/JKIISC.2018.28.5.1059
주제어: block cipher, Zorro, Related-key differential characteristic, Key Recovery, PGV model, Collision attacks, block cipher, Zorro, Related-key differential characteristic, Key Recovery, PGV model, Collision attacks
주제어: block cipher, Zorro, Related-key differential characteristic, Key Recovery, PGV model, Collision attacks, block cipher, Zorro, Related-key differential characteristic, Key Recovery, PGV model, Collision attacks
연관키 차분 특성을 이용한 Fantomas와 Robin의 키 복구 공격
김한기,
김종성,
Vol. 28, No. 4, pp. 803-807,
8월.
2018
10.13089/JKIISC.2018.28.4.803
주제어: Fantomas, Robin, LS-design, Related-key attack, Differential Path, Key recovery attack, Fantomas, Robin, LS-design, Related-key attack, Differential Path, Key recovery attack
주제어: Fantomas, Robin, LS-design, Related-key attack, Differential Path, Key recovery attack, Fantomas, Robin, LS-design, Related-key attack, Differential Path, Key recovery attack
Bitcoin Lightning Network의 강건성에 대한 연구
이승진,
김형식,
Vol. 28, No. 4, pp. 1009-1019,
8월.
2018
10.13089/JKIISC.2018.28.4.1009
주제어: Lightning Network, Network robustness, Network attack, Network failure, Lightning Network, Network robustness, Network attack, Network failure
주제어: Lightning Network, Network robustness, Network attack, Network failure, Lightning Network, Network robustness, Network attack, Network failure
온라인 상에 공개된 부분 익명화된 빅데이터의 프라이버시 침해 가능성 분석
정강수,
박석,
최대선,
Vol. 28, No. 3, pp. 665-679,
6월.
2018
10.13089/JKIISC.2018.28.3.665
주제어: Privacy analysis, Anonymization, Data crawling, inference attack, Privacy analysis, Anonymization, Data crawling, inference attack
주제어: Privacy analysis, Anonymization, Data crawling, inference attack, Privacy analysis, Anonymization, Data crawling, inference attack