Digital Library
Search: "[ keyword: DES ]" (39)
TiGER의 복호화 실패율 분석
이승우,
김종현,
박종환,
Vol. 34, No. 2, pp. 157-166,
4월.
2024
10.13089/JKIISC.2024.34.2.157
주제어: Post-Quantum Cryptography, Ring-LWE(R), Decryption Failures, Error Correcting Codes
10.13089/JKIISC.2024.34.2.157
주제어: Post-Quantum Cryptography, Ring-LWE(R), Decryption Failures, Error Correcting Codes
가명정보 생명주기에 따른 개인정보보호 중심 설계 적용 원칙에 관한 연구
김동현,
Vol. 32, No. 2, pp. 329-339,
4월.
2022
10.13089/JKIISC.2022.32.2.329
주제어: Personal Information, Pseudonymization Privacy by Design, De-Identification Privacy by Design
10.13089/JKIISC.2022.32.2.329
주제어: Personal Information, Pseudonymization Privacy by Design, De-Identification Privacy by Design
Grover 알고리즘 공격 비용 추정을 통한 DES에 대한 양자 암호 분석
장경배,
김현지,
송경주,
심민주,
엄시우,
서화정,
Vol. 31, No. 6, pp. 1149-1156,
12월.
2021
10.13089/JKIISC.2021.31.6.1149
주제어: Grover algorithm, Symmetric key cryptography, DES, quantum circuit
10.13089/JKIISC.2021.31.6.1149
주제어: Grover algorithm, Symmetric key cryptography, DES, quantum circuit
무기체계 개발을 위한 RMF A&A의 실증에 관한 연구
조광수,
김승주,
Vol. 31, No. 4, pp. 817-839,
8월.
2021
10.13089/JKIISC.2021.31.4.817
주제어: risk management, Risk Assessment, RMF A&A, Security by Design, Supply Chain Security
10.13089/JKIISC.2021.31.4.817
주제어: risk management, Risk Assessment, RMF A&A, Security by Design, Supply Chain Security
타이젠 용 데스크톱 버스 (D-Bus) 권한 우회 취약점 분석 및 자동 탐지
김동성,
최형기,
Vol. 30, No. 6, pp. 1023-1030,
12월.
2020
10.13089/JKIISC.2020.30.6.1023
주제어: Tizen, Wearable, Privilege, Desktop Bus, access control, D-Bus, Vulnerability, Tizen, Wearable, Privilege, Desktop Bus, access control, D-Bus, Vulnerability
10.13089/JKIISC.2020.30.6.1023
주제어: Tizen, Wearable, Privilege, Desktop Bus, access control, D-Bus, Vulnerability, Tizen, Wearable, Privilege, Desktop Bus, access control, D-Bus, Vulnerability
CIA-Level 기반 보안내재화 개발 프레임워크
강수영,
김승주,
Vol. 30, No. 5, pp. 909-928,
10월.
2020
10.13089/JKIISC.2020.30.5.909
주제어: Security by Design, Secure SDLC(Secure Software Development Life Cycle), SDLC(Software Development Life Cycle), SDL(Security Development Lifecycle), Security Engineering, Security by Design, Secure SDLC(Secure Software Development Life Cycle), SDLC(Software Development Life Cycle), SDL(Security Development Lifecycle), Security Engineering
10.13089/JKIISC.2020.30.5.909
주제어: Security by Design, Secure SDLC(Secure Software Development Life Cycle), SDLC(Software Development Life Cycle), SDL(Security Development Lifecycle), Security Engineering, Security by Design, Secure SDLC(Secure Software Development Life Cycle), SDLC(Software Development Life Cycle), SDL(Security Development Lifecycle), Security Engineering
DLCT를 활용한 향상된 차분선형 분석
김현우,
김성겸,
홍득조,
성재철,
홍석희,
Vol. 28, No. 6, pp. 1379-1392,
11월.
2018
10.13089/JKIISC.2018.28.6.1379
주제어: Differential-Linear Cryptanalysis, DLCT(Differential-Linear Connectivity Table), DES, SERPENT, Differential-Linear Cryptanalysis, DLCT(Differential-Linear Connectivity Table), DES, SERPENT
10.13089/JKIISC.2018.28.6.1379
주제어: Differential-Linear Cryptanalysis, DLCT(Differential-Linear Connectivity Table), DES, SERPENT, Differential-Linear Cryptanalysis, DLCT(Differential-Linear Connectivity Table), DES, SERPENT
연관키 차분 특성을 이용한 Fantomas와 Robin의 키 복구 공격
김한기,
김종성,
Vol. 28, No. 4, pp. 803-807,
7월.
2018
10.13089/JKIISC.2018.28.4.803
주제어: Fantomas, Robin, LS-design, Related-key attack, Differential Path, Key recovery attack, Fantomas, Robin, LS-design, Related-key attack, Differential Path, Key recovery attack
10.13089/JKIISC.2018.28.4.803
주제어: Fantomas, Robin, LS-design, Related-key attack, Differential Path, Key recovery attack, Fantomas, Robin, LS-design, Related-key attack, Differential Path, Key recovery attack