ETRI-Knowledge Sharing Plaform

KOREAN

Researchers

연구자 검색
Keyword

Detail

사진

Yousung Kang
Department
Cryptography Engineering Research Section
Contact
KSP Keywords
논문 검색결과
Type Year Title Cited Download
Journal
2024 Toffoli-depth reduction method preserving in-place quantum circuits and its application to SHA3-256   Jongheon Lee   Quantum Information Processing, v.23, pp.1-43 1
Conference
2023 Research on quantum circuit design for multiplicative inversion in finite field   이유석   한국정보보호학회 학술 대회 (동계) 2023, pp.1-4
Conference
2023 A Study on the Application of Lightweight Cryptography for Protecting Drone Remote Control Data   윤정일   한국정보처리학회 학술 발표 대회 (추계) 2023, pp.1185-1186
Conference
2023 Implementation of PQC-based Secure Channel for Drone Services   윤승용   한국정보처리학회 학술 발표 대회 (추계) 2023, pp.1-2
Conference
2023 Cryptanalysis and Countermeasures of the Recent Authentication and Key Agreement Scheme for Internet of Drones   Sungjin Yu   International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1419-1422 2
Conference
2023 Security enhancement scheme for mobile device using H/W cryptographic module   Seungyong Yoon   International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1450-1452 2
Journal
2023 MPMCT gate decomposition method reducing T-depth quickly in proportion to the number of work qubits   Jongheon Lee   Quantum Information Processing, v.22, pp.1-31 2
Conference
2023 Client-centric on-demand remote profile provisioning technique for M2M IoT Devices   Boheung Chung   International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1-3 0
Conference
2023 Security Technology for C-Band Modem Communication in Unmanned Vehicle Environment   Juhan Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1095-1097 0
Journal
2023 Implementation and characterization of flash-based hardware security primitives for cryptographic key generation   Mi-Kyung Oh   ETRI Journal, v.45, no.2, pp.346-357 4
Conference
2022 UAV arming Authorization using DIM and Flight Authorization Code   Juhan Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.2065-2067 1
Conference
2022 Enhancing IoT security with PUF-based authentication scheme   Seungyong Yoon   International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.2319-2321 2
Conference
2022 Reinforcement of IoT Open Platform Security using PUF-based Device Authentication   Byoungkoo Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2022, pp.1969-1971 3
Conference
2022 A Study on the MCT gate for AES based Grover Oracle   이유석   한국정보보호학회 학술 대회 (하계) 2022, pp.30-33
Journal
2022 Rcryptect: Real-time Detection of Cryptographic Function in the User-space Filesystem   Seungkwang Lee   Computers & Security, v.112, pp.1-13 8
Journal
2022 ISO/IEC 22460-2 Drone Identity Module Standardization Trend   김건우   전자공학회지, v.49, no.1, pp.57-65
Conference
2021 A Study on PX4 Autopilot Secure Booting   김건우   한국항공우주학회 학술 대회 (추계) 2021, pp.1-2
Conference
2021 PUF-based IoT Device Authentication Scheme on IoT Open Platform   Byoungkoo Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2021, pp.1873-1875 7
Conference
2021 Multiple PUF-based Lightweight Authentication Method in the IoT   Seungyong Yoon   International Conference on Information and Communication Technology Convergence (ICTC) 2021, pp.1198-1200 8
Conference
2021 Wi-SUN Device Authentication using Physical Layer Fingerprint   Mi-Kyung Oh   International Conference on Information and Communication Technology Convergence (ICTC) 2021, pp.160-162 4
Conference
2020 Test for mutual authentication between UAV and GCS using hardware security module   김건우   한국항공우주학회 학술 대회 (추계) 2020, pp.1-2
Conference
2020 Drone Security Module for UAV Data Encryption   Keonwoo Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1672-1674 22
Conference
2020 PUF-based Authentication Scheme for IoT Devices   Seungyong Yoon   International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1792-1794 17
Conference
2020 Secure IoT Device Authentication Scheme using Key Hiding Technology   Byoungkoo Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1808-1810 3
Conference
2020 Implementation of execution code integrity verification function for embedded device using hardware security module   전용성   대한전자공학회 학술 대회 (하계) 2020, pp.1765-1768
Journal
2020 Wireless Transceiver Aided Run-Time Secret Key Extraction for IoT Device Security   Mi-Kyung Oh   IEEE Transactions on Consumer Electronics, v.66, no.1, pp.11-21 12
Journal
2020 Secure and reliable IoT device authentication technology using key hiding technique   김병구   정보보호학회지, v.30, no.1, pp.35-42
Journal
2020 Design of Resistor-Capacitor Physically Unclonable Function for Resource-Constrained IoT Devices   Sangjae Lee   Sensors, v.20, no.2, pp.1-16 7
Conference
2019 Implementation of UAS Identification and Authentication on OneM2M IoT Platform   Keonwoo Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.948-950 4
Conference
2019 Security Enhancement for IoT Device using Physical Unclonable Functions   Seungyong Yoon   International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.1457-1459 3
Conference
2019 PUF based IoT Device Authentication Scheme   Byoungkoo Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.1460-1462 26
Conference
2019 Crypto-Protector: Multi-threaded RSA to Prevent EM Attacks   Seungkwang Lee   International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.945-947 0
Conference
2019 RC PUF: A Low-Cost and an Easy-to-Design PUF for Resource-Constrained IoT Devices   Sangjae Lee   World Conference on Information Security Applications (WISA) 2019 (LNCS 11897), pp.275-285 1
Conference
2019 Implementation of a LoRaWAN Protocol Processing Module on an Embedded Device using Secure Element   YongSung Jeon   International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2019, pp.1-3 5
Journal
2019 Standardization trend of drone ICT security technology   강유성   TTA Journal, v.182, pp.66-71
Journal
2019 Two-Factor Fuzzy Commitment for Unmanned IoT Devices Security   Dooho Choi   IEEE Internet of Things Journal, v.6, no.1, pp.335-348 28
Conference
2018 Public Key-based Lightweight Mutual Authentication and Key Agreement Protocol for Drones   Keonwoo Kim   Asian/Austrailian Rotorcraft Forum (ARF) 2018, pp.1-5 1
Journal
2018 A Masked White-Box Cryptographic Implementation for Protecting Against Differential Computation Analysis   Seungkwang Lee   IEEE Transactions on Information Forensics and Security, v.13, no.10, pp.2602-2615 27
Conference
2018 Secure Key Extraction for IoT Devices Integrating IEEE 802.15.4g/k Transceiver   Mi-Kyung Oh   International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.833-835 3
Conference
2018 Implementing a Phase Detection Ring Oscillator PUF on FPGA   Sangjae Lee   International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.845-847 6
Conference
2018 Abnormal Traffic Detection Mechanism for Protecting IIoT Environments   Byoung-Koo Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.943-945 8
Journal
2018 International standardization trend of security requirements and test methods for physically unclonable function   강유성   정보보호학회지, v.28, no.4, pp.34-40
Conference
2018 Design of a LPWAN Communication Device based on Hardware Security Module   YongSung Jeon   International Technical Conference on Circuits/Systems, Computers and Communications (ITC-CSCC) 2018, pp.1-3
Journal
2018 Security requirements for drone-based services   강유성   TTA Journal, v.177, pp.74-79
Conference
2015 Security Analysis on RFID Mutual Authentication Protocol   You Sung Kang   International Workshop on Information Security Applications (WISA) 2015 (LNCS 9503), v.9503, pp.65-74 4
Journal
2014 KeyQ: A Dynamic Key Establishment Method Using an RFID Anti-Collision Protocol   You Sung KANG   IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, v.E97.A, no.12, pp.2662-2666 0
Journal
2013 Comments on an Improved RFID Security Protocol for ISO/IEC WD 29167-6   You Sung Kang   ETRI Journal, v.35, no.1, pp.170-172 8
Conference
2012 Security-Enhanced Key Establishment Schemes Using Network Coding   You Sung Kang   International Conference on Computing and Convergence Technology (ICCCT) 2012, pp.1056-1061
Conference
2012 Analysis of Security Architecture of Electric Vehicle Charging Infrastructure   강유성   대한전자공학회 종합 학술 대회 (하계) 2012, pp.1869-1871
Journal
2012 수동형 UHF RFID 보안 기술 국제 표준화 동향   강유성   정보보호학회지, v.22, no.1, pp.31-38
Journal
2010 Standardization of Air Interface Protocol for RFID Security Services   강유성   한국정보기술학회지, v.8, no.1, pp.43-50
Journal
2010 Design Implementation of Lightweight and High Speed Security Protocol Suitable for UHF Passive RFID Systems   강유성   정보보호학회논문지, v.20, no.4, pp.117-134
Journal
2009 Efficient Key Detection Method in the Correlation Electromagnetic Analysis Using Peak Selection Algorithm   You Sung Kang   Journal of Communications and Networks, v.11, no.6, pp.556-563 0
Conference
2009 A New Fault Cryptanalysis on Montgomery Ladder Exponentiation Algorithm   Jea Hoon Park  International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS) 2009, pp.896-899 1
Conference
2008 RFID Stamp with RFID Passive Reader   Jun Ki Kang   International Conference on Convergence and Hybrid Information Technology (ICHIT) 2008, pp.802-805 0
Journal
2008 Standardization Trend and Strategy of Mobile RFID Security Technology   강유성   전자통신동향분석, v.23, no.2, pp.142-152
Journal
2008 모바일 RFID 보안 기술   박남제   TTA Journal, pp.108-114
Journal
2007 Trend of RFID-Based Securities Protection Technology   강유성   전자통신동향분석, v.22, no.6, pp.150-157
Conference
2007 Side-Channel Analysis for Wireless Sensor Mote Using Peak Value Selection   강유성   대한전자공학회 종합 학술 대회 (추계) 2007, pp.114-115
Journal
2007 화물 컨테이너 보호를 위한 RFID 보안 장치 기술 동향   강유성   정보와 통신 : 한국통신학회지, v.24, no.11, pp.43-50
Journal
2006 ISO/IEC JTC1 SC31 WG4 SG3 파리 회의   강유성   TTA Journal, v.알수없음, no.107, pp.130-134
Conference
2006 Design of Lightweight Security Protocol for Electronic Seal Data Protection   You Sung Kang   International Workshop on Information Security Applications (WISA) 2006 (LNCS 4298), v.4298, pp.517-531
Conference
2006 Privileged Tracking and Clone Detection for RFIDEnabled Banknotes   You Sung Kang   Applied Cryptography and Network Security, pp.1-13
Conference
2005 Design of an Authentication Protocol for Secure Electronic Seals   Seong Soo Park  International Conference on Information Systems (ICIS) 2005, pp.1-5
Conference
2005 Experimental Analysis of Pre-Authentication for WLAN Fast and Secure Handoff   You Sung Kang   International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2005, pp.465-466
Journal
2005 능동 및 모바일 RFID 서비스 환경에서의 정보보호 기술   이병길   정보보호학회지, v.15, no.3, pp.40-47
Journal
2005 Inter-AP security transition mechanism and its FSM in WLAN AP supporting fast roaming   정병호   한국통신학회논문지 B : 네트워크 및 융합 서비스, v.30, no.6C, pp.601-606
Journal
2005 무선 랜 보안 표준 IEEE 802.11i   강유성   TTA Journal, v.알수없음, no.99, pp.123-130
Journal
2005 Technical Trend of Security in Ubiquitous Sensor Networks   김신효   전자통신동향분석, v.20, no.1, pp.93-99
Conference
2004 Wireless LAN Fast Security Roaming System Using IAPP   오경희   한국정보처리학회 학술 발표 대회 (추계) 2004, pp.1263-1266
Conference
2004 Pre-Authentication of Wireless LAN over IAPP   오경희   한국정보과학회 학술 발표 (가을) 2004, pp.295-297
Conference
2004 Analysis on Security Strength of WLAN AP Configurations   You Sung Kang   International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2004, pp.101-104
Journal
2004 RFID/USN 환경에서의 정보 보호 소고   정병호   한국통신학회지, v.21, no.6, pp.102-115
Conference
2004 Fast and Safe Roaming in Wireless LAN By Forwarding Data Frames between APs   오경희   한국정보처리학회 학술 발표 대회 (춘계) 2004, pp.1185-1188
Journal
2004 A Study on Dynamic Key Management in Mixed-Mode Wireless LAN   강유성   한국통신학회논문지 B : 네트워크 및 융합 서비스, v.29, no.4C, pp.581-593
Conference
2004 Analysis and Countermeasure on Vulnerability of WPA Key Exchange Mechanism   You Sung Kang   International Conference on Information Networking (ICOIN) 2004 (LNCS 3090), v.3090, pp.915-924 1
Journal
2003 Design of Accounting and Security Sessions for IEEE 802.11 Network   양대헌   정보보호학회논문지, v.13, no.6, pp.85-96
Conference
2003 WLAN Stations Classification and AP Configurations According to Security Strength   강유성   한국통신학회 종합 학술 발표회 (추계) 2003, pp.1009-1012
Conference
2003 Performance Evaluation between Software Implementation and Hardware Implementation of WPA TKIP Algorithm in Access Points   오경희   한국정보처리학회 학술 발표 대회 (추계) 2003, pp.1941-1944
Conference
2003 Software Implementation of WPA Wireless LAN Access Point   오경희   한국정보과학회 학술 발표 (가을) 2003, pp.667-669
Journal
2003 무선 LAN 보안 취약점과 단계적 해결 방안   강유성   한국통신학회지, v.20, no.7, pp.117-128
Conference
2003 Secure Wireless LAN with IEEE 802.1x Authentication and Dynamic WEP Key   오경희   한국정보과학회 학술 발표 (봄) 2003, pp.368-370
Journal
2002 무선 LAN 정보 보호 기술 표준화 동향   김신효   정보보호학회지, v.12, no.4, pp.56-66