Digital Library

Journal of The Korea Institute of Information Security and Cryptology, Vol. 35, No. 1, Feb. 2025


Joint Distribution Analysis on Masked HIGHT
, , , , , , Vol. 35, No. 1, pp. 1-10, Feb. 2025
10.13089/JKIISC.2025.35.1.1
Keywords:

New Parameter of NTRU+KEM with Cyclotomic Binomial and Efficient Implementation
, , , , Vol. 35, No. 1, pp. 11-24, Feb. 2025
10.13089/JKIISC.2025.35.1.11
Keywords:

Simple Power Analysis and Countermeasure for SMAUG-T Multiplication Operation
, , , Vol. 35, No. 1, pp. 25-35, Feb. 2025
10.13089/JKIISC.2025.35.1.25
Keywords:

Universal Deep Learning-Based Profiling Side-Channel Analysis Method on HW Implementation Symmetric Key Algorithm
, , , , , Vol. 35, No. 1, pp. 37-46, Feb. 2025
10.13089/JKIISC.2025.35.1.37
Keywords:

The Design and Implementation of an Automated Device Binding Application Method to Complement Anti-Debugging Evasion in IoT Environment
, , , Vol. 35, No. 1, pp. 47-55, Feb. 2025
10.13089/JKIISC.2025.35.1.47
Keywords:

Decentralized Based Cloud ID Solution for Self-Sovereign Identity
, Vol. 35, No. 1, pp. 57-66, Feb. 2025
10.13089/JKIISC.2025.35.1.57
Keywords:

Android Malware Family Classification Techniques Using System API Call Sequence Data
, , , Vol. 35, No. 1, pp. 67-78, Feb. 2025
10.13089/JKIISC.2025.35.1.67
Keywords:

Event Data Recording Technique for High-Efficiency and Reliable Fuzzing of Firmware
, , , , Vol. 35, No. 1, pp. 79-85, Feb. 2025
10.13089/JKIISC.2025.35.1.79
Keywords:

Electrocardiogram Signal De-Identification Methods for Enhancing Robustness against Membership Inference Attacks
, , , Vol. 35, No. 1, pp. 87-97, Feb. 2025
10.13089/JKIISC.2025.35.1.87
Keywords:

A Study on the Effectiveness of Backdoor Attack Defense through the Combination of Weak Differential Privacy and Various Defense Mechanisms in Federated Learning
, , Vol. 35, No. 1, pp. 99-108, Feb. 2025
10.13089/JKIISC.2025.35.1.99
Keywords:

Anomaly Detection of MITRE ATT&CK Techniques in AWS CloudTrail Using BERT-Based Sliding Window Approach
, , , , , , Vol. 35, No. 1, pp. 109-118, Feb. 2025
10.13089/JKIISC.2025.35.1.109
Keywords:

A Methodology for Identifying SendMessages in IoT Companion Apps for Vulnerability Analysis of IoT Devices
, , , , , Vol. 35, No. 1, pp. 119-134, Feb. 2025
10.13089/JKIISC.2025.35.1.119
Keywords:

A Study on Software Supply Chain Risk Management Policies and Techniques Suitable for Korean Military Environment
, , Vol. 35, No. 1, pp. 135-155, Feb. 2025
10.13089/JKIISC.2025.35.1.135
Keywords:

A Study on the Verification of Re-Identifiability of Voice Unstructured Data
, , , , , Vol. 35, No. 1, pp. 157-165, Feb. 2025
10.13089/JKIISC.2025.35.1.157
Keywords: