Subject

Subjects : secret key

  • Articles (41)
  • Patents (11)
  • R&D Reports (0)
논문 검색결과
Type Year Title Cited Download
Journal 2025 Effect and Compensation of Polarization-Dependent Loss in Free-Space Reference Frame Independent Quantum Key Distribution   Lim Kyongchun  ADVANCED QUANTUM TECHNOLOGIES, v.8, no.3, pp.1-8 0 원문
Journal 2023 Improvement of the Efficiency of Neural Cryptography-Based Secret Key Exchange Algorithm   Kim Juyoung  IEEE Access, v.11, pp.45323-45333 2 원문
Journal 2022 Chosen-Ciphertext Clustering Attack on CRYSTALS-KYBER using the Side-Channel Leakage of Barrett Reduction   Boyoun Sim  IEEE Internet of Things Journal, v.9, no.21, pp.21382-21397 20 원문
Journal 2021 Table Redundancy Method for Protecting Against Fault Attacks   Lee Seung Kwang  IEEE Access, v.9, pp.92214-92223 5 원문
Conference 2020 De-identification and Restoration Methods for Protecting Privacy in Off-line Documents   Han Jin Hee  International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1543-1545 0 원문
Journal 2020 TwinPeaks: An approach for certificateless public key distribution for the internet and internet of things   조은상  Computer Networks, v.175, pp.1-15 7 원문
Journal 2020 Improvement on a Masked White-Box Cryptographic Implementation   Lee Seung Kwang  IEEE Access, v.8, pp.90992-91004 16 원문
Journal 2020 Wireless Transceiver Aided Run-Time Secret Key Extraction for IoT Device Security   Oh Mi Kyung  IEEE Transactions on Consumer Electronics, v.66, no.1, pp.11-21 19 원문
Conference 2019 Crypto-Protector: Multi-threaded RSA to Prevent EM Attacks   Lee Seung Kwang  International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.945-947 0 원문
Conference 2019 PUF based IoT Device Authentication Scheme   Byoung Koo Kim  International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.1460-1462 28 원문
Conference 2019 Security Enhancement for IoT Device using Physical Unclonable Functions   Yoon Seung Yong  International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.1457-1459 3 원문
Journal 2019 Study on Peak Misdetection Recovery of Key Exchange Protocol using Heartbeat   Kim Juyoung  Journal of Supercomputing, v.75, no.6, pp.3288-3301 6 원문
Conference 2018 A Study of Template Clustering in the Side Channel Template Analysis   Kim Taesung  International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.1295-1297 1 원문
Conference 2018 The Method for Generating a Trust Field in Wireless Distributed Communication Systems   Hwang Hyungu  International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.939-942 2 원문
Conference 2018 A Secret Key Updating Method between Devices for Secure Smart Services   Han Jin Hee  International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.946-948 2 원문
Conference 2018 False Secret Keys to Disturb Power Analysis   Lee Seung Kwang  International Conference on Ubiquitous and Future Networks (ICUFN) 2018, pp.296-298 0 원문
Conference 2017 Security Consideration of Fuzzy Vault Based on Photoplethysmogram   Kim Juyoung  International Conference on Computer Science and its Applications (CSA) 2017, pp.1-7
Conference 2017 Recovery of Peak Misdetection for IPI-based Key Exchange   Kim Juyoung  International Conference on Computer Science and its Applications (CSA) 2017, pp.1-5
Conference 2017 Balance between Performance and Security in IPI-based Key Schemes using Heartbeats   Kwantae Cho  International Conference on Signal Processing Systems (ICSPS) 2017, pp.1-5 1 원문
Conference 2017 Self-certifying ID based Trustworthy Networking System for IoT Smart Service Domain   Kim Eung Ha  International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.1300-1302 7 원문
Conference 2017 Efficient Secret Key Delivery Using Heartbeats   Kwantae Cho  International Conference on Circuits, Systems, Communications and Computers (CSCC) 2017, pp.1-6 4 원문
Journal 2016 Protecting Secret Keys in Networked Devices with Table Encoding Against Power Analysis Attacks   Kim Taesung  Journal of High Speed Networks, v.22, no.4, pp.293-307 3 원문
Journal 2016 An Improved Square-Always Exponentiation Resistant to Side-Channel Attacks on RSA Implementation   Choi Yong-Je  Intelligent Automation and Soft Computing, v.22, no.3, pp.353-363 7 원문
Journal 2015 Conditional Re-encoding Method for Cryptanalysis-Resistant White-Box AES   Lee Seung Kwang  ETRI Journal, v.37, no.5, pp.1012-1022 13 원문
Journal 2015 Collusion-Resistant Convertible Ring Signature Schemes   Jung Yeon Hwang  Science China - Information Sciences, v.58, no.1, pp.1-16 3 원문
Journal 2015 Inter-Authentication and Session Key Sharing Procedure for Secure M2M/IoT Environment   박남제  Information : An International Interdisciplinary Journal, v.18, no.1, pp.261-266 17
Journal 2014 KeyQ: A Dynamic Key Establishment Method Using an RFID Anti-Collision Protocol   Yousung Kang  IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, v.E97.A, no.12, pp.2662-2666 0 원문
Journal 2014 An Enhanced (t,n) Threshold Directed Signature Scheme   Jung Yeon Hwang  Information Sciences, v.275, pp.284-292 11 원문
Journal 2014 Improved Shamir''s CRT-RSA Algorithm: Revisit with the Modulus Chaining Method   Lee Seung Kwang  ETRI Journal, v.36, no.3, pp.469-478 10 원문
Conference 2012 Reversible Data Hiding Without Side Information   유향미  International Instrumentation and Measurement Technology Conference (I2MTC) 2012, pp.1-4 원문
Journal 2012 Constructing Strong Identity-Based Designated Verifier Signatures with Self-Unverifiability   기주희  ETRI Journal, v.34, no.2, pp.235-244 17 원문
Conference 2012 Fast Alignment Method for Side Channel Analysis System   Kim Ju Han  International Conference on Electronics, Information, and Communication (ICEIC) 2012, pp.1-2
Journal 2009 Efficient Key Detection Method in the Correlation Electromagnetic Analysis Using Peak Selection Algorithm   Yousung Kang  Journal of Communications and Networks, v.11, no.6, pp.556-563 0 원문
Journal 2009 Counterfactual Quantum Cryptography   Noh Tae-Gon  Physical Review Letters, v.103, no.23, pp.1-4 149 원문
Conference 2009 A New Fault Cryptanalysis on Montgomery Ladder Exponentiation Algorithm   박제훈  International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS) 2009, pp.896-899 1 원문
Journal 2009 Security Vulnerability of ID-Based Key Sharing Schemes   Jung Yeon Hwang  IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, v.E92-A, no.10, pp.2641-2643 0 원문
Journal 2008 Performance Enhancement of Differential Power Analysis Attacks With Signal Companding Methods   류정춘  IEEE Signal Processing Letters, v.15, pp.625-628 11 원문
Journal 2007 Differential Power Analysis on Countermeasures Using Binary Signed Digit Representations   Tae Hyun Kim  ETRI Journal, v.29, no.5, pp.619-632 3 원문
Conference 2007 Protecting Secret Keys with Fuzzy Fingerprint Vault Based on a 3D Geometric Hash Table   이성주  International Conference on Adaptive and Natural Computing Algorithms (ICANNGA) 2007 (LNCS 4432), v.4432, pp.432-439 15 원문
Conference 2005 Design of Unified Key Management Model using XKMS   Kim Ju Han  International Conference on Advanced Communication Technology (ICACT) 2005, pp.77-80 원문
Journal 1998 Key Distribution for Secure VSAT Satellite Communications   Park Jeong-Hyun  IEEE Transactions on Broadcasting, v.44, no.3, pp.274-277 12 원문
특허 검색결과
Status Year Patent Name Country Family Pat. KIPRIS
Registered 2020 METHOD AND APPARATUS FOR COMMUNICATIONS USING SECRET KEY IN COMMUNICATION SYSTEM UNITED STATES
Registered 2019 부가 비밀키를 이용한 암호문의 복호화 방법 및 장치 KOREA
Registered 2016 분산 무선통신 네트워크를 위한 보안키 공유 방법 KOREA KIPRIS
Registered 2016 METHOD AND APPARATUS FOR GENERATING SECRET KEY IN WIRELESS COMMUNICATION NETWORK UNITED STATES
Registered 2017 생체정보를 이용한 생체 비밀키 생성 방법 및 이를 위한 장 KOREA KIPRIS
Registered 2014 KEY MANAGING SYSTEM AND METHOD FOR SENSOR NETWORK SECURITY UNITED STATES
Registered 2021 METHOD AND APPARATUS FOR GENERATING SECRET KEY BASED ON NEURAL NETWORK SYNCHRONIZATION UNITED STATES
Registered 2020 신경망 동기화에 기반한 비밀키 생성 방법 및 장치 KOREA
Registered 2014 METHOD AND APPARATUS FOR AUTHENTICATING AND MANGING APPLICATION USING TRUSTED PLATFORM MODULE UNITED STATES
Registered 2019 SYSTEM FOR KEY CONTROL FOR IN-VEHICLE NETWORK UNITED STATES
Registered 2019 통신 시스템에서 비밀키를 사용한 통신 방법 및 장치 KOREA KIPRIS
연구보고서 검색결과
Type Year Research Project Primary Investigator Download
No search results.