Digital Library
Search: "[ keyword: TA ]" (798)
경량 암호 알고리듬 CHAM에 대한 오류 주입 공격
권홍필,
하재철,
Vol. 28, No. 5, pp. 1071-1078,
9월.
2018
10.13089/JKIISC.2018.28.5.1071
주제어: Lightweight Block cipher, CHAM, Fault injection attack, Lightweight Block cipher, CHAM, Fault injection attack
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Lightweight Block cipher, CHAM, Fault injection attack, Lightweight Block cipher, CHAM, Fault injection attack
Zorro의 연관키 차분특성을 이용한 키 복구 공격 및 PGV-Zorro의 충돌쌍 공격
김기윤,
박은후,
이종혁,
장성우,
김지훈,
김한기,
김종성,
Vol. 28, No. 5, pp. 1059-1070,
9월.
2018
10.13089/JKIISC.2018.28.5.1059
주제어: block cipher, Zorro, Related-key differential characteristic, Key Recovery, PGV model, Collision attacks, block cipher, Zorro, Related-key differential characteristic, Key Recovery, PGV model, Collision attacks
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: block cipher, Zorro, Related-key differential characteristic, Key Recovery, PGV model, Collision attacks, block cipher, Zorro, Related-key differential characteristic, Key Recovery, PGV model, Collision attacks
N-gram을 활용한 DGA-DNS 유사도 분석 및 APT 공격 탐지
김동현,
김강석,
Vol. 28, No. 5, pp. 1141-1151,
9월.
2018
10.13089/JKIISC.2018.28.5.1141
주제어: Advanced Persistent Threat, Intrusion Detection, Domain Generation Algorithm, N-GRAM, Data Analysis, Advanced Persistent Threat, Intrusion Detection, Domain Generation Algorithm, N-GRAM, Data Analysis
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Advanced Persistent Threat, Intrusion Detection, Domain Generation Algorithm, N-GRAM, Data Analysis, Advanced Persistent Threat, Intrusion Detection, Domain Generation Algorithm, N-GRAM, Data Analysis
포털 전자메일 압수수색을 위한 메일헤더기반 디지털포렌식
이해진,
손태식,
Vol. 28, No. 5, pp. 1129-1140,
9월.
2018
10.13089/JKIISC.2018.28.5.1129
주제어: Digital Forensics, e-mail seizure search, infringement of privacy, Digital Forensics, e-mail seizure search, infringement of privacy
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Digital Forensics, e-mail seizure search, infringement of privacy, Digital Forensics, e-mail seizure search, infringement of privacy
HyperCerts : 개인정보를 고려한 OTP 기반 디지털 졸업장 블록체인 시스템
정승욱,
Vol. 28, No. 4, pp. 987-997,
7월.
2018
10.13089/JKIISC.2018.28.4.987
주제어: Blockchain, Digital Educational Certificate, Privacy, OTP, Blockchain, Digital Educational Certificate, Privacy, OTP
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Blockchain, Digital Educational Certificate, Privacy, OTP, Blockchain, Digital Educational Certificate, Privacy, OTP
연관키 차분 특성을 이용한 Fantomas와 Robin의 키 복구 공격
김한기,
김종성,
Vol. 28, No. 4, pp. 803-807,
7월.
2018
10.13089/JKIISC.2018.28.4.803
주제어: Fantomas, Robin, LS-design, Related-key attack, Differential Path, Key recovery attack, Fantomas, Robin, LS-design, Related-key attack, Differential Path, Key recovery attack
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Fantomas, Robin, LS-design, Related-key attack, Differential Path, Key recovery attack, Fantomas, Robin, LS-design, Related-key attack, Differential Path, Key recovery attack
블록체인 기반 CCN 콘텐츠 인증 기술
김대엽,
Vol. 28, No. 4, pp. 975-985,
7월.
2018
10.13089/JKIISC.2018.28.4.975
주제어: ICN, CCN/NDN, Data authentication, PKI, Blockchain, ICN, CCN/NDN, Data authentication, PKI, Blockchain
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: ICN, CCN/NDN, Data authentication, PKI, Blockchain, ICN, CCN/NDN, Data authentication, PKI, Blockchain
Microsoft SQL Server의 원본 수집 방식에 따른 삭제 데이터의 복구 가능성 비교
신지호,
Vol. 28, No. 4, pp. 859-868,
7월.
2018
10.13089/JKIISC.2018.28.4.859
주제어: database, Microsoft SQL Server, Logical / Physical Collection, Deleted Data, Recovery, Page, database, Microsoft SQL Server, Logical / Physical Collection, Deleted Data, Recovery, Page
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: database, Microsoft SQL Server, Logical / Physical Collection, Deleted Data, Recovery, Page, database, Microsoft SQL Server, Logical / Physical Collection, Deleted Data, Recovery, Page
Bitcoin Lightning Network의 강건성에 대한 연구
이승진,
김형식,
Vol. 28, No. 4, pp. 1009-1019,
7월.
2018
10.13089/JKIISC.2018.28.4.1009
주제어: Lightning Network, Network robustness, Network attack, Network failure, Lightning Network, Network robustness, Network attack, Network failure
![](https://d2kjln74dkk4oj.cloudfront.net/img/doi_icon.png)
주제어: Lightning Network, Network robustness, Network attack, Network failure, Lightning Network, Network robustness, Network attack, Network failure