Digital Library
Search: "[ keyword: Differential ]" (69)
차분 프라이버시를 만족하는 안전한 GAN 기반 재현 데이터 생성 기술 연구
강준영,
정수용,
홍도원,
서창호,
Vol. 30, No. 5, pp. 945-956,
10월.
2020
10.13089/JKIISC.2020.30.5.945
주제어: Synthetic Data, CGAN, Differential privacy, Rényi Differential Privacy, data privacy, Synthetic Data, CGAN, Differential privacy, Rényi Differential Privacy, data privacy
주제어: Synthetic Data, CGAN, Differential privacy, Rényi Differential Privacy, data privacy, Synthetic Data, CGAN, Differential privacy, Rényi Differential Privacy, data privacy
로컬 차분 프라이버시 실제 적용 사례연구 : 프라이버시 보존형 설문조사
정수용,
홍도원,
서창호,
Vol. 30, No. 1, pp. 141-156,
2월.
2020
10.13089/JKIISC.2020.30.1.141
주제어: Local Differential Privacy, data privacy, Privacy Preserving Survey, Randomized Response, Data Analysis, Local Differential Privacy, data privacy, Privacy Preserving Survey, Randomized Response, Data Analysis
주제어: Local Differential Privacy, data privacy, Privacy Preserving Survey, Randomized Response, Data Analysis, Local Differential Privacy, data privacy, Privacy Preserving Survey, Randomized Response, Data Analysis
마스킹 화이트 박스 AES에 대한 새로운 고차 차분 계산 분석 기법
이예찬,
진성현,
김한빛,
김희석,
홍석희,
Vol. 30, No. 1, pp. 1-15,
2월.
2020
10.13089/JKIISC.2020.30.1.1
주제어: White-Box Cryptography, Differential Computation Analysis, Masked White-Box AES, 2nd Order DPA, White-Box Cryptography, Differential Computation Analysis, Masked White-Box AES, 2nd Order DPA
주제어: White-Box Cryptography, Differential Computation Analysis, Masked White-Box AES, 2nd Order DPA, White-Box Cryptography, Differential Computation Analysis, Masked White-Box AES, 2nd Order DPA
BOGI 전략으로 설계된 블록 암호의 차분 공격에 대한 안전성 분석
이상협,
김성겸,
홍득조,
성재철,
홍석희,
Vol. 29, No. 6, pp. 1259-1270,
12월.
2019
10.13089/JKIISC.2019.29.6.1259
주제어: BOGI, differential cryptanalysis, Active S-box, GIFT, MILP, BOGI, differential cryptanalysis, Active S-box, GIFT, MILP
주제어: BOGI, differential cryptanalysis, Active S-box, GIFT, MILP, BOGI, differential cryptanalysis, Active S-box, GIFT, MILP
AI 환경에서 모델 전도 공격에 안전한 차분 프라이버시 기술
박철희,
홍도원,
Vol. 29, No. 3, pp. 589-598,
6월.
2019
10.13089/JKIISC.2019.29.3.589
주제어: Differential privacy, model inversion attack, privacy-preserving neural network, Differential privacy, model inversion attack, privacy-preserving neural network
주제어: Differential privacy, model inversion attack, privacy-preserving neural network, Differential privacy, model inversion attack, privacy-preserving neural network
GPGPU 기술을 활용한 차분 확률의 통계적 분석
조은지,
김성겸,
홍득조,
성재철,
홍석희,
Vol. 29, No. 3, pp. 477-489,
6월.
2019
10.13089/JKIISC.2019.29.3.477
주제어: GPGPU, CUDA, differential cryptanalysis, GIFT, PRESENT, Markov Cipher, statistical analysis, GPGPU, CUDA, differential cryptanalysis, GIFT, PRESENT, Markov Cipher, statistical analysis
주제어: GPGPU, CUDA, differential cryptanalysis, GIFT, PRESENT, Markov Cipher, statistical analysis, GPGPU, CUDA, differential cryptanalysis, GIFT, PRESENT, Markov Cipher, statistical analysis
DLCT를 활용한 향상된 차분선형 분석
김현우,
김성겸,
홍득조,
성재철,
홍석희,
Vol. 28, No. 6, pp. 1379-1392,
12월.
2018
10.13089/JKIISC.2018.28.6.1379
주제어: Differential-Linear Cryptanalysis, DLCT(Differential-Linear Connectivity Table), DES, SERPENT, Differential-Linear Cryptanalysis, DLCT(Differential-Linear Connectivity Table), DES, SERPENT
주제어: Differential-Linear Cryptanalysis, DLCT(Differential-Linear Connectivity Table), DES, SERPENT, Differential-Linear Cryptanalysis, DLCT(Differential-Linear Connectivity Table), DES, SERPENT
Zorro의 연관키 차분특성을 이용한 키 복구 공격 및 PGV-Zorro의 충돌쌍 공격
김기윤,
박은후,
이종혁,
장성우,
김지훈,
김한기,
김종성,
Vol. 28, No. 5, pp. 1059-1070,
10월.
2018
10.13089/JKIISC.2018.28.5.1059
주제어: block cipher, Zorro, Related-key differential characteristic, Key Recovery, PGV model, Collision attacks, block cipher, Zorro, Related-key differential characteristic, Key Recovery, PGV model, Collision attacks
주제어: block cipher, Zorro, Related-key differential characteristic, Key Recovery, PGV model, Collision attacks, block cipher, Zorro, Related-key differential characteristic, Key Recovery, PGV model, Collision attacks
연관키 차분 특성을 이용한 Fantomas와 Robin의 키 복구 공격
김한기,
김종성,
Vol. 28, No. 4, pp. 803-807,
8월.
2018
10.13089/JKIISC.2018.28.4.803
주제어: Fantomas, Robin, LS-design, Related-key attack, Differential Path, Key recovery attack, Fantomas, Robin, LS-design, Related-key attack, Differential Path, Key recovery attack
주제어: Fantomas, Robin, LS-design, Related-key attack, Differential Path, Key recovery attack, Fantomas, Robin, LS-design, Related-key attack, Differential Path, Key recovery attack
효율적인 MILP-Espresso 기반 차분 특성 자동 탐색 방법
박연지,
이호창,
홍득조,
홍석희,
Vol. 28, No. 3, pp. 533-543,
6월.
2018
10.13089/JKIISC.2018.28.3.707
주제어: MILP, Bit-based, Differential, Automatic Search, Logic minimization algorithm, Espresso, GIFT, SKINNY, MILP, Bit-based, Differential, Automatic Search, Logic minimization algorithm, Espresso, GIFT, SKINNY
주제어: MILP, Bit-based, Differential, Automatic Search, Logic minimization algorithm, Espresso, GIFT, SKINNY, MILP, Bit-based, Differential, Automatic Search, Logic minimization algorithm, Espresso, GIFT, SKINNY