ETRI-Knowledge Sharing Plaform

KOREAN

Researchers

연구자 검색
Keyword

Detail

사진

Kim Taesung
Department
Cryptography Engineering Research Section
Contact
KSP Keywords
논문 검색결과
Type Year Title Cited Download
Conference
2024 Security Analysis and Countermeasure of Post Quantum based Authentication Protocol in IoT Environment   이준영   한국통신학회 종합 학술 발표회 (하계) 2024, pp.1972-1973
Conference
2023 Client-centric on-demand remote profile provisioning technique for M2M IoT Devices   Boheung Chung   International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1-3 0
Conference
2023 Cryptanalysis and Countermeasures of the Recent Authentication and Key Agreement Scheme for Internet of Drones   Sungjin Yu   International Conference on Information and Communication Technology Convergence (ICTC) 2023, pp.1419-1422 2
Conference
2018 딥러닝을 활용한 부채널 이차 차분 분석 성능 향상에 관한 연구   김태성   한국정보보호학회 학술 대회 (동계) 2018, pp.376-379
Journal
2018 A Masked White-Box Cryptographic Implementation for Protecting Against Differential Computation Analysis   Seungkwang Lee   IEEE Transactions on Information Forensics and Security, v.13, no.10, pp.2602-2615 27
Conference
2018 A Study of Template Clustering in the Side Channel Template Analysis   Taesung Kim   International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.1295-1297 1
Conference
2018 False Secret Keys to Disturb Power Analysis   Seungkwang Lee   International Conference on Ubiquitous and Future Networks (ICUFN) 2018, pp.296-298 0
Journal
2016 Protecting Secret Keys in Networked Devices with Table Encoding Against Power Analysis Attacks   Taesung Kim   Journal of High Speed Networks, v.22, no.4, pp.293-307 3
Conference
2015 Improved Differential Cluster Analysis with Power Model   Taesung KIM   International Conference on Computers, Communications and Systems (ICCCS) 2015, pp.1-3
Conference
2014 Function Masking: A New Countermeasure Against Side Channel Attack   Taesung Kim   International Workshop on Information Security Applications 2014 (LNCS 8909), v.8909, pp.331-342 0
Journal
2013 Technical Trends of Side Channel Analysis System   김주한   전자통신동향분석, v.28, no.3, pp.47-56
Conference
2013 Parallelized Processing for Real Time Side Channel Analysis   오경희   통신 정보 합동 학술 대회 (JCCI) 2013, pp.1-2
Journal
2013 User-centric Side Channel Analysis System   김주한   정보과학회논문지 : 컴퓨팅의 실제 및 레터, v.19, no.1, pp.56-60
Conference
2012 Side Channel Analysis System - SCARF   김주한   한국 컴퓨터 종합 학술 대회 2012, pp.C266-C268
Conference
2008 Implementation of Publickey-based Key Distribution in Wireless Sensor Network   오경희   한국방송공학회 학술 대회 (동계) 2008, pp.95-98
Conference
2007 Method of Location Privacy and Non-repudation of user in Mobile RFID   김태성   대한전자공학회 종합 학술 대회 (추계) 2007, pp.197-198
Conference
2006 Low Power Implementation of SHA-1 Algorithm for RFID System   Yong Je Choi   International Symposium on Consumer Electronics (ISCE) 2006, pp.682-686 5
Conference
2006 Authorization Policy for Middleware in RFID System   Tae Sung Kim   International Symposium on Consumer Electronics (ISCE) 2006, pp.678-681 3
Conference
2006 Access Control for Middleware in RFID Systems   Tae Sung Kim   International Conference on Advanced Communication Technology (ICACT) 2006, pp.1020-1022 9
Conference
2006 Privacy Protection for Secure Mobile RFID Service   Doo Ho Choi   International Symposium on Wireless Pervasive Computing (ISWPC) 2006, pp.1-4 3
Conference
2005 Security Enhanced RFID Middleware System   Ji Eun Song   International Conference on Computer and Information Science (ICIS) 2005, pp.1-4
Conference
2005 The Design of Privacy Aware Identity Information Sharing Protocol   Taesung Kim   International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2005, pp.679-680
Conference
2004 Authentication and Authorization Service for Network Security System   김태성   한국정보처리학회 학술 발표 대회 (춘계) 2004, pp.1137-1140
Journal
2004 Self-Reputation System in P2P Networks   조남수   정보보호학회논문지, v.14, no.2, pp.35-47
Journal
2003 Design of Privilege Delegation Mechanism using Proxy Certificate   진승헌   정보처리학회논문지 C, v.10C, no.6, pp.739-746
Conference
2003 Certificate-based Digital Library Authentication and Authorization Architecture   원형석   한국정보과학회 학술 발표 (봄) 2003, pp.494-497
Conference
2003 Research for Implementation of Licensed Web SSO   최대선   한국정보과학회 학술 발표 (봄) 2003, pp.452-454
Journal
2003 ID-based Proxy Signature Scheme from the Bilinear Map   이정연   정보보호학회논문지, v.13, no.2, pp.3-11
Conference
2002 A study on a digital library authentication and authorization architecture   원형석   한국정보처리학회 학술 발표 대회 (추계) 2002, pp.1103-1106
Conference
2002 The Design of Integrated Cryptographic API   김태성   한국정보과학회 학술 발표 (가을) 2002, pp.505-507
Conference
2002 Building Certification Paths in Certificate Validation Server   노종혁   한국정보과학회 학술 발표 (가을) 2002, pp.604-606
Conference
2002 Proxy Signature Technology using Proxy Certificate   조상래   한국정보과학회 학술 발표 (가을) 2002, pp.676-678
Conference
2001 Collaborative VA Model   노종혁   한국정보과학회 학술 발표 (가을) 2001, pp.751-753
Conference
2001 The Mechanism of Certification Path Validation   김태성   한국정보처리학회 학술 발표 대회 (추계) 2001, pp.931-934