| ±¹Á¦ ³í¹® |  ±¹Á¦ Çмú ¹ßÇ¥ | ±¹³» ³í¹®  |  ±¹³» Çмú ¹ßÇ¥  |   Àú¼­   |

 

¡Ü ±¹Á¦ ³í¹® |¡ã|

36. Implementation of Disassembler on Microcontroller Using Side-Channel Power Consumption Leakage,

    MDPI Sensors, Sensors, Vol. 22, No. 15, p. 5900, 2022.08

35. Deep Learning-based Attacks on Masked AES Implementation,

    Journal of Internet Technology, Vol. 23 No. 4, pp. 897-902, July 2022

34. Performance Metric for Differential Deep Learning Analysis,

    Journal of Internet Services and Information Security (JISIS), Vol. 11, No. 2, pp. 22-33, 2021. 05

33. Secure RSA implementation against horizontal correlation power analysis attack

    Int. J. Internet Technology and Secured Transactions, 8±Ç, 1È£, pp.62-77, 2018.05

32. An Improved Square-always Exponentiation Resistant to Side-channel Attacks on RSA Implementation

    Intelligent Automation & Soft Computing, 22±Ç, 3È£, pp.353-363, 2016.07

31. A secure exponentiation algorithm resistant to a combined attack on RSA implementation

    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 93±Ç, 2È£, pp.258-272, 2016.02

30. An Efficient and Robust Anonymous Authentication Scheme in Global Mobility Networks

    International Journal of Security and Its Applications, 9±Ç, 10È£, pp.297-312, 2015.10

29. A fault-resistant implementation of AES using differential bytes between input and output

    JOURNAL OF SUPERCOMPUTING, 67±Ç, 3È£, pp.615-634, 2014.03

28. Message Blinding Method Requiring No Multiplicative Inversion for RSA

    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 13±Ç, 4È£, pp.80:1-80:10, 2014.02

27. A new exponentiation algorithm resistant to combined side channel attack,

    Journal of Internet Services and Information Security, Vol.  3, No. 3, pp.17-27, 2013.11

26. Some remarks on strong Mori domains,

    HOUSTON JOURNAL OF MATHEMATICS, Vol. 38, No. 4, pp. 1051-1059, 2012. 10

25. Differential Fault Analysis by Reducing AES Round, Advances in Information Science and

    Service Science(AISS)-SCOPUS, Vol. 4. No. 11, pp. 103-113, 2012. 06

24. Improved Differential Fault Analysis on Block Cipher ARIA, Information Security

    Application, LNCS 7690, pp .82-95, 2012.12

23. Differential Fault Analysis for Round-Reduced AES by Fault Injection,  

    ETRI Journal, Vol. 33, No. 3, pp. 434-442, 2011. 06

22. A New Formal Proof Model for RFID Location Privacy,

    ESORICS 2008, LNCS 5283, pp. 267-281, 2008. 10

21. Low-cost and Strong-security RFID Authentication Protocol

    EUC 2007, LNCS 4809,  pp. 795-807, 2007. 12

20. HGLAP : Hierarchical Group-index based Lightweight Authentication Protocol for

    Distributed RFID system EUC 2007, LNCS 4809,  pp. 557-567, 2007. 12

19. Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC

    WISA 2007, LNCS 4867, pp. 333-344,  2007. 12

18. Security Analysis and Enhancement of One-Way Hash based Low-Cost Authentication

    Protocol(OHLCAP) , SSDU 2007, LNCS 4819,  pp.574-583, 2007. 9

17. LRMAP: Lightweight and Resynchronous Mutual Authentication Protocol for RFID System,

    ICUCT 2006, LNCS 4412,  pp. 80-89, 2007. 6

16. A differential power analysis attack of block cipher based on the Hamming weight of

    internal operation unit, International Conference on Computational Intelligence and

    Security(CIS2006) LNCS 4456,  pp. 417-426, 2006. 11

15. Relative Doubling attack against Montgomery Ladder

    International Conference on Information Security and Cyptography(ICISC2005),

    LNCS 3935, pp. 117-128, 2005. 12

14. Differential Power Analysis on Block Cipher ARIA

    High Performance Computing and Communications(HPCC2005) (LNCS 3726),

    pp. 541-548,  2005. 9

13. A CRT-Based RSA countermeasure Against Physical Cryptanalysis

    High Performance Computing and Communications(HPCC2005) (LNCS 3726),

    pp. 549-554, 2005.9

12. Power Analysis by Exploiting Chosen Message and Internal Collisions –

    Vulnerability of Checking Mechanism for RSA-Decryption

    International Conferenc on Cyptology in Malaysia(Mycrypt) LNCS 3715, pp.183- 195, 2005.

11. Efficient threshold signature scheme based on self-certified public keys,

    International Transaction on Computer Science and Engineering, GESTS,

    Vol 10, No  1, pp. 97 ~ 108, 2005. 6

10. New key management systems for multilevel security

    Computational Science and Its application (ICCSA-2004),

    LNCS-3481, pp. 245-253, 2005. 5

9. Improvement on HA-Moon Randomized Exponentiation Algorithm, ICISC 2004,  

   LNCS -3506, pp. 154-167,  Dec., 2004.

8. Side channel cryptanalysis on SEED

   International Workshop on Information Security and Applications(WISA-2004),

   LNCS-3325, pp.411-424   Aug., 2004.

7. A secure and practical CRT-Based RSA to resist side channel attacks

   International Conference on Computational Science and Its Applications (ICCSA-2004),

   LNCS 3043, pp. 150-166, May, 2004

6. Permanent Fault Attack on the Parameters of RSA with CRT, Australasian

   Conference on Information Security and Privacy(ACISP-2003),

   LNCS 2727, pp 285-296,  July 9-11, 2003.      

5. A Random M-ary Method-Based Countermeasure against Power

   Analysis Attacks  on  ECC, International Conference on Computational

   Science and Its Applications (ICCSA-2003), LNCS 2668,

   pp. 338-347, May 18 -21, 2003

4. Hardware fault attack on RSA with CRT revited,

   The 5th International Conference on Information Security and   Cryptology(ICISC-2002), 

   pp. 390-404, Olympicparktel, Seoul, Nov. 28-29, 2002

3. A WTLS Handshake Protocol for User Anonymity and Forward Secrecy,

   The 7th CDMA International Conference, LNCS-2524,pp. 354-358, Shilla Hotel, Seoul,

   Oct. 29- Nov., 1 2002,

2. Randomized Signed-Scalar Multiplication of ECC to Resist Power Attacks,

   The 4th Workshop on Cryptographic Hardware and Embedded Systems 2002

   (CHES 2002), LNCS 2523, pp. 566-583, Hotel Sofitel, San Francisco Bay (Redwood City), USA

   August 13 - 15, 2002

1. A Common-multiplicand Method to the Montgomery  Algorithm for Speeding  Up Exponentiation, 

    Information Processing Letters(IPL),

    Vol.66 No.2 pp.105-107, Elsevier Science, 98.4

 

¡Ü ±¹Á¦ Çмú ¹ßÇ¥ |¡ã|

 

22.Fault Injection Attacks Using Clock Glitch Against Deep Neural Networks and Their Countermeasures,

     The 7th International Conference on Mobile Internet Security (MobiSec'23), Dec 19-21, 2023

21. Adversarial Patch Attack on Person Detection and Countermeasure Using Input Channel Diversification

     The 7th International Conference on Mobile Internet Security (MobiSec'23), Dec 19-21, 2023

20. Enhancing Robustness of Self-Driving Car Regression Models through Feature Squeezing

    THE 24th WORLD CONFERENCE ON INFORMATION SECURITY APPLICATIONS (WISA 23), August, 2023

19. Defense Against Adversarial Evasion Attacks on Self-Driving Car Using Image Quantization,

    THE 24th WORLD CONFERENCE ON INFORMATION SECURITY APPLICATIONS (WISA 23), August, 2023

18. Secure Deep Neural Network to Counteract against Side-Channel Analysis Attacks

    International Conference on Next-generation Convergence Technology (ICNCT2023)

    Feb. 2023. *Best Paper Award *

17. Anomaly detection system in vehicle network using ResNet

    International Conference on Next-generation Convergence Technology (ICNCT2023), Feb. 2023

16.  Instruction-level Disassembler Based on Power Consumption Leakage of IoT devices

    The 5th International Symposium on Mobile Internet Security (MobiSec¡¯21), October 7-9, 2021

15. Breaking a Masked AES Implementation Using a Deep Learning-based Attack

     ACM International Conference on Intelligent Computing and its Emerging Applications(ICEA'20)

     2020 12.

14. Power Analysis Attacks on the Right-to-Left Square-Always Exponentiation Algorithm

    6th International Workshop on Managing Insider Security Threats(MIST-2014),

    pp. 2014. 11

13. Instruction Fault Attack on the Miller Algorithm in a pairing-Based Cryptosystem

    Seventh International Conference on Innovative Mobile and Internet Service in Ubiquitous

    Computing, pp. 167-174, 2013. 07

12. A Practical Analysis of Fault Attack Countermeasure on AES using Data Masking

    International Conference on Computing and Convergence Technology - ICCCT 2012, pp. 1-7,

    2012. 12

11. A Fault-Resistant AES Implementation Using Differential Characteristic of Input and

    Output The International Workshop on Managing Insider Security Threats, pp.93-109,

    2012.11

10. Differential Fault Analysis by Round Reduction, 6th International Conference on Computer

    Sciences and Convergence Information Technology , pp. 607-612, 2011. 11

9. Power Analysis Attack and Countermeasure on the Rabbit Stream Cipher, International

   Workshop on Software Engineering for Secure Systems(SESS 2011), pp. 50-56, 2011. 05

8. Fault Resistant CRT-RSA Scheme Adopting a Small Exponent, Computer Sciences and

   Convergence Information Technology (ICCIT),  pp. 544-549, 2010. 11

7. Fault Attack for the Iterative Operation of AES S-Box, Computer Sciences and Convergence

   Information Technology (ICCIT),  pp. 550-555, 2010. 11

6. A New Fault Cryptanalysis on Montgomery Ladder Exponentiation Algorithm,  

   Proceedings of the 2nd International Conference on Interaction Sciences: Information

   Technology, Culture and Human pp. 896-899, 2009

5. A New CRT-RSA Scheme Reststant to Power Analysis and Fault Attacks,

    ICCIT-08, IEEE-CS, Vol. 2, pp.351-356, 2008. 11

4. Power attack resistant countermeasure using random separation of scalar

   multiplication method for ECC, The 7th Joint Workshop on Modern Electronic

   Technologies and Applications, Vol. 7, No 1, pp.42-53, 2003.11

3. LM Signcryption and Its Application in WTLS Handshake Protocol for

    User Anonymity,  The 6th Joint Workshop on Modern Electronic

   Technologies and Applications, Vol. 6, No 1, pp. 142-153, 2001.11

2. A Design of Modular Multiplier Based on Multi-precision   Carry Save Adder,   

    Joint Workshop on Information Security and Cryptology

   (JW-ISC'2000), Vol. 4, No 1, pp. 45-52, 2000.1

1. A Design of Modular Multiplier based on Systolic Array,

   The 4th Joint Workshop on Modern Electronic Technologies and

   Applications, Vol. 4, No 1, pp. 145-155, 99.11

 

¡Ü ±¹³» ³í¹® |¡ã|

113. ºÎä³Î ºÐ¼®À» ÀÌ¿ëÇÑ DNN ±â¹Ý MNIST ºÐ·ù±â °¡ÁßÄ¡ º¹±¸ °ø°Ý ¹× ´ëÀÀÃ¥ ±¸Çö

     Çѱ¹Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 33±Ç, 6È£, ppp. 919-928, 2023.12

112. Àû´ëÀû ȸÇÇ °ø°Ý¿¡ ´ëÀÀÇÏ´Â ¾ÈÀüÇÑ ÀÚÀ²ÁÖÇà ÀÚµ¿Â÷ ½Ã½ºÅÛ

     Çѱ¹Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 33±Ç, 6È£, pp. 907-917, 2023.12

111. ´ÙÁß ÇÇó µö·¯´× ¸ðµ¨À» ÀÌ¿ëÇÑ ÀüÀÚ±âÆÄ ±â¹ÝÀÇ ¸í·É¾î ¿ª¾î¼Àºí·¯ ±¸Çö

     Çѱ¹»êÇбâ¼úÇÐȸ, Á¦ 24±Ç Á¦ 3È£, pp. 24-32, 2023.03

110. ÁØÁöµµ ÇнÀ ¸ðµ¨À» »ç¿ëÇÑ Â÷·® ³»ºÎ ³×Æ®¿öÅ©¿¡¼­ÀÇ ÀÌ»ó ¡ÈÄ Å½Áö

     Çѱ¹»êÇбâ¼úÇÐȸ, Á¦ 24±Ç Á¦ 2È£, pp. 11-20, 2023.02

109. ½Å¿ø È®ÀÎ °ø°Ý¿¡ ¾ÈÀüÇÑ Å¬¶ó¿ìµå µ¥ÀÌÅÍ Áߺ¹ Á¦°Å ±â¼ú

     Çѱ¹»êÇбâ¼úÇÐȸ, Á¦ 24±Ç Á¦ 2È£, pp. 625-634, 2023.02

108. CRYSTALS-Dilithium ´ë»ó ºñÇÁ·ÎÆÄÀϸµ ±â¹Ý Àü·Â ºÐ¼® °ø°Ý ¼º´É °³¼± ¿¬±¸

     Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 33±Ç, 1È£, pp.33-43, 2023.2

107. ¾çÀÚ³»¼º¾ÏÈ£ NTRU¿¡ ´ëÇÑ Àü·Â ºÎä³Î °ø°Ý ¹× ´ëÀÀ¹æ¾È

     Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 32±Ç, 6È£, pp.1059-1068, 2022.12

106. PQC Ç¥ÁØÈ­ ¾Ë°í¸®Áò CRYSTALS-KYBER¿¡ ´ëÇÑ ºñÇÁ·ÎÆÄÀϸµ ºÐ¼® °ø°Ý ¹× ´ëÀÀ ¹æ¾È

     Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 32±Ç, 6È£, pp.1045-1057, 2022.12

105. ¾çÀÚ ³»¼º ¾ÏÈ£ FALCON¿¡ ´ëÇÑ Â÷ºÐ Àü·Â ºÐ¼® °ø°Ý ¼º´É °³¼±

       Çѱ¹»êÇбâ¼úÇÐȸ, Á¦ 23±Ç Á¦ 3È£, pp. 16-24, 2022.03

104. °æ·® ºí·Ï ¾ÏÈ£ ¾Ë°í¸®Áò PIPO¿¡ ´ëÇÑ Å×ÀÌºí ±â¹Ý ¸¶½ºÅ· Àû¿ë ¹× ºÐ¼®

       Çѱ¹»êÇбâ¼úÇÐȸ, Á¦ 23±Ç Á¦ 2È£, pp. 161-169, 2022.02

103. ºÎä³Î ºÐ¼®¿¡ °­ÀÎÇÑ ºí·Ï ¾ÏÈ£ PIPO ±¸ÇöÀ» À§ÇÑ ºñ¼±Çü ¸¶½ºÅ· ±â¹ý

       Çѱ¹»êÇбâ¼úÇÐȸ, Á¦ 23±Ç Á¦ 2È£, pp. 751-759, 2022.02

102. µö·¯´×À» È°¿ëÇÑ »ê¾÷Á¦¾î ½Ã½ºÅÛ¿¡ ´ëÇÑ ÀÌ»ó¡ÈÄ Å½Áö

       Çѱ¹»êÇбâ¼úÇÐȸ, Á¦ 23±Ç Á¦ 1È£, pp. 24-32, 2022.01

101. ¿¬¼Ó ¿þÀÌºí¸´ º¯È¯À» »ç¿ëÇÑ ºñÇÁ·ÎÆÄÀϸµ ±â¹Ý Àü·Â ºÐ¼® °ø°Ý

     Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 31±Ç, 6È£, pp. 1127-1136, 2021.12

100. Performance Counter Monotor¸¦ ÀÌ¿ëÇÑ ¸Ó½Å·¯´× ±â¹Ý ij½Ã ºÎä³Î °ø°Ý ŽÁö

     Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 30±Ç, 6È£, pp.1237-1246, 2020.12

99. ºí·Ï ¾ÏÈ£ ARIA¿¡ ´ëÇÑ Flush+Reload  Ä³½Ã ºÎä³Î °ø°Ý

     Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 30±Ç, 6È£, pp.1207-1216,  2020.12

98. CNNÀ» ÀÌ¿ëÇÑ ¼Òºñ Àü·Â ÆÄÇü ±â¹Ý ¸í·É¾î ¼öÁØ ¿ª¾î¼Àºí·¯ ±¸Çö

     Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 30±Ç, 4È£, pp.527-536, 2020.08

97. ºí·Ï ¾ÏÈ£ AES¿¡ ´ëÇÑ CNN ±â¹ÝÀÇ Àü·Â ºÐ¼® °ø°Ý

     Çѱ¹»êÇбâ¼úÇÐȸ, Á¦ 21±Ç Á¦ 5È£, pp.14-21, 2020.05

96. ºí·Ï ¾ÏÈ£ SM4¿¡ ´ëÇÑ ºÎä³Î °ø°Ý ¹× ¸¶½ºÅ· ±â¹Ý ´ëÀÀ ±â¹ý ºÐ¼®

    Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 30±Ç, 1È£, pp.39-49, 2020.02

95. ºí·Ï ¾ÏÈ£ SM4¿¡ ´ëÇÑ ¸Ó½Å·¯´× ±â¹ÝÀÇ ºÎä³Î °ø°Ý

    °ø¾÷±â¼ú¿¬±¸ ³í¹®Áö, 38±Ç, 2È£, pp.70-77, 2019.12

94. Multi-Layer Perceptron ±â¹ýÀ» ÀÌ¿ëÇÑ Àü·ÂºÐ¼® °ø°Ý ±¸Çö ¹× ºÐ¼®

    Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 29±Ç, 5È£, pp.997-1006, 2019.10

93. ºÎä³Î °ø°Ý¿¡ ´ëÀÀÇÏ´Â °æ·®ºí·Ï ¾ÏÈ£ CHAM ±¸ÇöÀ» À§ÇÑ ¸¶½ºÅ· ±â¹ýÀû¿ë ¹× ºÐ¼®

    Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 29±Ç, 4È£, pp.709-718, 2019.08

92. °æ·® ¾ÏÈ£ ¾Ë°í¸®µë CHAM¿¡ ´ëÇÑ ¿À·ù ÁÖÀÔ °ø°Ý

    Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 28±Ç, 5È£, pp.1071-1078, 2018.10

91. NTRU ¼­¸í ½Ã½ºÅÛ ±¸Çö¿¡ ´ëÇÑ ¿À·ù ÁÖÀÔ °ø°Ý ¹× ´ëÀÀ ¹æ¾È ¿¬±¸

    Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 28±Ç, 3È£, pp.551-561, 2018.06

90. ºÎä³Î °ø°Ý ´ëÀÀÀ» À§ÇÑ ¸¶½ºÅ· ±â¹ý¿¡ °üÇÑ ¼º´É ºÐ¼®

    È£¼­´ëÇб³ °ø¾÷±â¼ú¿¬±¸ ³í¹®Áö, 37±Ç, 1È£, pp.57-63, 2018.06

89. ºÎä³Î °ø°Ý¿¡ ´ëÀÀÇÏ´Â ¸¶½ºÅ· ±â¹ÝÀÇ ºí·Ï ¾ÏÈ£ LEA

    Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 27±Ç, 5È£, pp.1023-1032, 2017.10

88. LEA ¾ÏÈ£ ¾Ë°í¸®µë¿¡ ´ëÇÑ ¸¶½ºÅ· ´ëÀÀ ±â¹ý ¿¬±¸

    È£¼­´ëÇб³ °ø¾÷±â¼ú¿¬±¸ ³í¹®Áö, 36±Ç, 1È£, pp.57-63, 2017.06

87. ¾ÏÈ£¿ë µð¹ÙÀ̽º¿¡ ´ëÇÑ ±¸Çö °ø°Ý¿¡ °­ÀÎÇÑ ÀÌÁß ¸è½Â ¾Ë°í¸®µë

    º¸¾È°øÇבּ¸³í¹®Áö, 14±Ç, 1È£, pp.43-58, 2017.02

86. Æä¾î¸µ ¿¬»êÀÌ ¾ø´Â ¹«ÀÎÁõ¼­ ±â¹ÝÀÇ ÀÎÁõ Å° ÀÏÄ¡ ÇÁ·ÎÅäÄÝ

    º¸¾È°øÇבּ¸³í¹®Áö, 13±Ç, 6È£, pp.451-466, 2016.12

85. ½º¸¶Æ® Á¦Á¶ »ê¾÷¿ë ³×Æ®¿öÅ©¿¡ ÀûÇÕÇÑ Snort IDS¿¡¼­ÀÇ Àü󸮱⠱¸Çö

    Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 26±Ç, 5È£, pp.1313-1322, 2016.10

84. Â÷ºÐ Àü·Â ºÐ¼® °ø°Ý¿¡ ´ëÇÑ Ä³¸® ±â¹Ý ·£´ý ¸®ÄÚµù ¹æ¹ýÀÇ Ãë¾à¼º

    Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 26±Ç, 5È£, pp.1099-1103, 2016.10

83. RSA ¾ÏÈ£ ½Ã½ºÅÛÀ» »ç¿ëÇÏ´Â º¸¾È¼º Æò°¡ ´ë»ó Á¦Ç°¿¡ ´ëÇÑ Ãë¾à¼º ºÐ¼® ü°è °³¹ß

    È£¼­´ëÇб³ °ø¾÷±â¼ú¿¬±¸ ³í¹®Áö, 35±Ç, 1È£, pp.82-90, 2016.06

82. ÀϹæÇâ Àü¼Û ³×Æ®¿öÅ©¿¡¼­ÀÇ ¿À·ù Á¦¾î ÇÁ·ÎÅäÄÝ ¹× µ¥ÀÌÅÍ ¾Ïȣȭ ¸ÞÄ¿´ÏÁò

    Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 26±Ç, 3È£, pp.613-621, 2016.06

81. Áö¼ö ºÐÇÒ ±â¹ýÀÌ Àû¿ëµÈ RSA ¾Ë°í¸®µë¿¡ ´ëÇÑ Ãæµ¹Àü·ÂºÐ¼® ¾ÈÀü¼º Æò°¡

    Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 25±Ç, 5È£, pp.985-991, 2015.10

80. ¹°¸®Àû ±¸Çö °ø°Ý¿¡ ´ëÇÑ ÀÌÁø ¸è½Â ¾Ë°í¸®µëÀÇ ÀúÇ×¼º ºÐ¼®

    È£¼­´ëÇб³ °ø¾÷±â¼ú¿¬±¸ ³í¹®Áö, 34±Ç, 1È£, pp.101-111, 2015.06

79. ½º¸¶Æ®Ä«µå ±â¹ÝÀÇ ¾ÈÀüÇÏ°í °æ·®È­µÈ ¸ð¹ÙÀÏ Áö±Þ°áÁ¦ ÇÁ·ÎÅäÄÝ

    º¸¾È°øÇבּ¸³í¹®Áö, 12±Ç, 3È£, pp.1-13, 2015.06

78. NFC¿¡ ±â¹ÝÇÑ ¸ð¹ÙÀÏ ÄíÆù ÇÁ·ÎÅäÄÝ¿¡ ´ëÇÑ ¾ÈÀü¼º ºÐ¼® ¹× ´ëÀÀ ¹æ¾È

    Çѱ¹»êÇбâ¼úÇÐȸ³í¹®Áö, 16±Ç, 2È£, pp.1388-1397, 2015.02

77. Montgomery Ladder ¸è½Â ¾Ë°í¸®µë¿¡ ´ëÇÑ ÀÔ·Â Ãæµ¹ ±â¹Ý »ê°ü Á¤·ÂºÐ¼® °ø°Ý ¹× ´ëÀÀ¹æ¾È

    È£¼­´ëÇб³ °ø¾÷±â¼ú ³í¹®Áö, 33±Ç, 2È£, pp.57-66, 2014.12

76. ¸ðµâ¶ó °ö¼ÀÀÇ Ãæµ¹ ÀԷ¿¡ ±â¹ÝÇÑ ºÎä³Î °ø°Ý ¹× ´ëÀÀÃ¥

    Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 24±Ç, 6È£, pp.1-12, 2014.12

75. ¼öÆò Ãæµ¹ Àü·Â ºÐ¼® °ø°Ý¿¡ ´ëÀÀÇÏ´Â ¸ðµâ·¯ ¸è½Â ¾Ë°í¸®µë

    º¸¾È°øÇבּ¸³í¹®Áö, 11±Ç, 5È£, pp.355-372, 2014.10

74. Square Always ¸è½Â ¾Ë°í¸®µë¿¡ ´ëÇÑ ºÎä³Î °ø°Ý

    Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 24±Ç, 3È£, pp.477-489, 2014.06

73. ÀÎÅÍ³Ý ¹ðÅ· ½Ã½ºÅÛÀÇ º¸¾È¿ä±¸»çÇ× ºÐ¼® ¹× º¸È£ÇÁ·ÎÆÄÀÏ °³¹ß

    °ø¾÷±â¼ú¿¬±¸ ³í¹®Áö, 33±Ç, 1È£, pp.53-64, 2014.06

72. m-ary ¸è½Â ¿¬»ê¿¡ ´ëÇÑ »õ·Î¿î ´Ü¼ø Àü·Â ºÐ¼® °ø°Ý

    Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 24±Ç, 1È£, pp.261-266, 2014.2

71. GOOSE ÇÁ·ÎÅäÄÝ È¯°æ¿¡¼­ Snort ±â¹ÝÀÇ Ä§ÀÔ Å½Áö ½Ã½ºÅÛ °³¹ß

    Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 23±Ç, 6È£, pp.1-10,2013.12

70. ½º¸¶Æ® Æù¿¡¼­ »ç¿ëÇÏ´Â È­¸é Àá±Ý ±â´É¿¡ ´ëÇÑ º¸¾È Ãë¾à¼º ºÐ¼®

    °ø¾÷±â¼ú¿¬±¸ ³í¹®Áö, 32±Ç, 2È£, pp.1-7,2013.12

69. BNP ¸è½Â ¾Ë°í¸®µë¿¡ ´ëÇÑ ¹«¸®Àû Á¶ÇÕ °ø°Ý ¹× ´ëÀÀÃ¥

    Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 23±Ç, 4È£, pp.585-591,2013.08

68. Çϵåµð½ºÅ© µ¥ÀÌÅÍ º¸È£¿ë ¼ÒÇÁÆ®¿þ¾î TrueCrypt¿¡ ´ëÇÑ ¾ÈÀü¼º ºÐ¼®

    °ø¾÷±â¼ú¿¬±¸ ³í¹®Áö, 32±Ç, 1È£, pp.43-50,2013.06

67. ºí·Ï ¾ÏÈ£ ARIA¿¡ ´ëÇÑ ¿À·ù ÁÖÀÔ °ø°Ý ´ëÀÀ ¹æ¾È

    Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 23±Ç, 3È£, pp.371-381,2013.06

66. ÀÔÃâ·Â Â÷ºÐ Ư¼ºÀ» ÀÌ¿ëÇÑ ¿À·ù ÁÖÀÔ °ø°Ý¿¡ °­ÀÎÇÑ AES ±¸Çö ¹æ¾È

    Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 22±Ç, 5È£, pp.1-9,2012.10

65. ¹Ýº¹¹® ¿À·ù ÁÖÀÔÀ» ÀÌ¿ëÇÑ °³¼±µÈ Triple DES ¶ó¿îµå Ãà¼Ò °ø°Ý

    Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 22±Ç, 4È£, pp.709-717,2012.08

64. OpenSSLÀÇ DLL ÆÄÀϳ»ÀÇ AES ¾ÏÈ£ ¾Ë°í¸®µë¿¡ ´ëÇÑ ¿À·ù ÁÖÀÔ °ø°Ý

    °ø¾÷±â¼ú ³í¹®Áö, 31±Ç, 1È£, pp.57-64,2012.06

63. ID ±â¹Ý ¾ÏÈ£ ±â¹ýÀ» ÀÌ¿ëÇÑ SCADA ½Ã½ºÅÛ¿¡¼­ ºñ¹Ð Å° °ü¸® ¹× º¹±¸ ¹æ¾È

    Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 22±Ç, 3È£, pp.427-438,2012.06

62. AES ¾ÏÈ£ ¾Ë°í¸®µë¿¡ ´ëÇÑ ¹Ýº¹¹® µÞ ¶ó¿îµå Ãà¼Ò °ø°Ý

    Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 22±Ç, 3È£, pp.439-445,2012.06

61. µðÁöÅÐ º¹Çձ⿡¼­ º¸¾È ¹®¼­ °ü¸® Ãë¾àÁ¡ ºÐ¼® ¹× ´ëÀÀ¹æ¾È

    Çѱ¹Á¤º¸±â¼úÇÐȸ ³í¹®Áö, 10±Ç, 6È£, pp.133-143,2012.06

60. ¼ÒÇÁÆ®¿þ¾î ±â¹Ý ½ºÆ®¸² ¾ÏÈ£ Salsa20/12¿¡ ´ëÇÑ »ó°üµµ Àü·ÂºÐ¼® °ø°Ý

    Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 21±Ç, 5È£, pp.1-12,2011.10

59. ¾ÆÇÉ ÁÂÇ¥¸¦ »ç¿ëÇÏ´Â Æä¾î¸µ ¿¬»êÀÇ Miller ¾Ë°í¸®µë¿¡ ´ëÇÑ È¿°úÀûÀÎ ¿À·ù ÁÖÀÔ °ø°Ý

    Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 21±Ç, 3È£, pp.11-25,2011.06

58. ¿ø¹æ°¨½Ã ½Ã½ºÅÛ¿¡¼­ Æä¾îÁúÀ» ÀÌ¿ëÇÑ ID±â¹Ý Å° °ü¸® ¹æ½Ä

    È£¼­´ëÇб³ °ø¾÷±â¼ú¿¬±¸, 30±Ç, 1È£, pp.49-58,2011.06

57. TPM¿¡¼­ ¸í·É¾î Àΰ¡¿¡ ´ëÇÑ ¿ÀÇÁ¶óÀÎ »çÀü °ø°Ý°ú ´ëÀÀÃ¥

    Çѱ¹»êÇбâ¼úÇÐȸ³í¹®Áö, 12±Ç, 4È£, pp.1876-1883,2011.04

56. ¿À·ù ÁÖÀÔÀ» ÀÌ¿ëÇÑ Triple DES¿¡ ´ëÇÑ ¶ó¿îµå Ãà¼Ò °ø°Ý

    Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 21±Ç, 2È£, pp.91-100,2011.04

55. TPM ¸í·É¾î Àΰ¡ ÇÁ·ÎÅäÄÝ¿¡ ´ëÇÑ ³»ºÎÀÚ °ø°Ý Ãë¾àÁ¡ ºÐ¼® ¹× ´ëÀÀÃ¥

    Çѱ¹»êÇбâ¼úÇÐȸ³í¹®Áö, 12±Ç, 3È£, pp.1356-1366,2011.03

54. Wi-Fi¸¦ ÀÌ¿ëÇÑ ½º¸¶Æ®Æù¿¡¼­ »çÀü °ø°Ý¿¡ ¾ÈÀüÇÑ WPA-PSK ÇÁ·ÎÅäÄÝ

    Çѱ¹»êÇбâ¼úÇÐȸ ³í¹®Áö, 13±Ç, 4È£, pp. 1839-1848, 2012.4

53. AES¿¡ ´ëÇÑ ¹Ýº¹¹® ¿À·ù ÁÖÀÔ °ø°Ý

    Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 20±Ç, 6È£, pp.59-65,2010.12

52. ¿À·ù ºÐ¼® °ø°Ý¿¡ ´ëÀÀÇÏ´Â È¿À²ÀûÀÎ DSA ¼­¸í ±â¹ý

    Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 20±Ç, 5È£, pp.49-57,2010.10

51. ¿À·ù ÁÖÀÔÀ» ÀÌ¿ëÇÑ DSA ¼­¸í ¾Ë°í¸®Áò °ø°Ý ¹× ´ëÀÀÃ¥

    Çѱ¹»êÇбâ¼úÇÐȸ³í¹®Áö, 11±Ç, 8È£, pp.3045-3052,2010.08

50. ¿¬»êÀÚ Á¶ÀÛ°ø°Ý¿¡ ´ëÇÑ CRT-RSA ¾Ë°í¸®µëÀÇ ¾ÈÀü¼º ÀçºÐ¼®

    Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 20±Ç, 4È£, pp.155-160,2010.08

49. ¿À·ùÈ®»ê ±â¹ý¿¡ ±â¹ÝÇÑ RSA-CRT ´ëÀÀÃ¥¿¡ ´ëÇÑ ¼±Åà ¸Þ½ÃÁö °ø°Ý

    Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 20±Ç, 3È£, pp.135-140,2010.06

48. ÀÌÁß ¸è½Â°ú ¿À·ù È®»ê ±â¹ýÀ» ÀÌ¿ëÇÑ RSA-CRT¿¡¼­ÀÇ ¹°¸®Àû °ø°Ý ´ëÀÀ ¹æ¹ý

    Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 20±Ç, 2È£, pp.33-41,2010.04

47. Á¤º¸º¸È£¿ë ¾ÏȣĨ¿¡ ´ëÇÑ ÇØÅ· ¹× ´ëÀÀÃ¥

    Á¤º¸Ã³¸®ÇÐȸ ÇÐȸÁö, 17±Ç, 2È£, pp.70-78,2010.03

46. RSA ¸è½Â ¾Ë°í¸®ÁòÀÇ Á¦¾î¹®¿¡ ´ëÇÑ¿À·ùÁÖÀÔ °ø°Ý

   Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 19±Ç, 6È£, pp.63-70, 2009.12

45. »ç¿ëÀÚ ÀÍ¸í¼ºÀ» Á¦°øÇÏ´Â ½º¸¶Æ®Ä«µå ±â¹Ý ¿ø°Ý ÀÎÁõ ÇÁ·ÎÅäÄÝ

    ÀÎÅͳÝÁ¤º¸ÇÐȸ³í¹®Áö, 10±Ç, 6È£, pp.229-239,2009.12

44. Áß°£ ¾ÏÈ£¹® º¹±¸ ¹æ¹ýÀ» ÀÌ¿ëÇÑ AES Â÷ºÐ ¿À·ù °ø°Ý

    Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 19±Ç, 5È£, pp.167-174,2009.10

43. ºñÁ¤»ó Àü¿ø Àü¾ÐÀ» ÀÌ¿ëÇÑ RSA ¾ÏÈ£½Ã½ºÅÛÀÇ ½ÇÇèÀû ¿À·ù ÁÖÀÔ °ø°Ý

    Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 19±Ç, 5È£, pp.195-200,2009.10

42. Á¦ 3ÀÚ¿¡°Ô »ç¿ëÀÚ ÀÍ¸í¼ºÀ» Á¦°øÇÏ´Â ½º¸¶Æ® Ä«µå±â¹Ý ¿ø°ÝÀÎÁõ ½Ã½ºÅÛ ±¸Çö

    Çѱ¹»êÇбâ¼úÇÐȸ³í¹®Áö, 10±Ç, 10È£, pp.2750-2759,2009.10

41. Çؽ¬ ÇÔ¼ö¿¡ ±â¹ÝÇÑ °æ·®È­µÈ RFID ÀÎÁõ ÇÁ·ÎÅäÄÝ

    Çѱ¹Á¤º¸º¸È£ÇÐȸ³í¹®Áö, Á¦19±Ç Á¦ 3È£, pp. 61-72, 2009. 6

40. CRT-RSA ¾ÏÈ£ ½Ã½ºÅÛ¿¡ ´ëÇÑ ±¤ÇÐÀû ¿À·ù ÁÖÀÔ °ø°ÝÀÇ ½ÇÇèÀû ¿¬±¸

    Çѱ¹Á¤º¸º¸È£ÇÐȸ³í¹®Áö, Á¦19±Ç Á¦ 3È£, pp. 51-60, 2009. 6

39. ¹«¼±¼¾¼­ ³×Æ®¿öÅ©¿¡¼­ °æ·®È­µÈ ÀÎÁõ°ú Å° µ¿ÀÇ ÇÁ·ÎÅäÄÝ

    Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ³í¹®Áö, Á¦10±Ç Á¦ 2È£, pp. 41-52, 2009. 4

38. Á¤º¸º¸È£ÀåÄ¡¿¡ ´ëÇÑ ºÎä³Î °ø°Ý µ¿Çâ

    Çѱ¹Á¤º¸º¸È£ÇÐȸÇÐȸÁö, Á¦19±Ç Á¦ 2È£, pp. 53-62, 2009, 4

37. °øÇб³À°ÀÎÁõÀ» À§ÇÑ Á¤º¸º¸È£ÇÐ ½ÉÈ­ ÇÁ·Î±×·¥

    Çѱ¹Á¤º¸º¸È£ÇÐȸÇÐȸÁö, Á¦19±Ç Á¦ 1È£, pp. 1-8, 2009. 2

36. RFID ½Ã½ºÅÛ¿¡¼­ ű×-DB°£ °æ·®È­µÈ ÀÎÁõ ¹æ½Ä

    È£¼­´ëÇб³ °ø¾÷ ±â¼ú ¿¬±¸¼Ò ³í¹®Áö, pp. 71-78, 2008. 12

 35. Â÷ºÐ Àü·Â ºÐ¼® °ø°ÝÀ» À§ÇÑ Çâ»óµÇ°í ½ÇÁ¦ÀûÀÎ ½ÅÈ£ Á¤·Ä ¹æ¹ý

    Çѱ¹Á¤º¸º¸È£ÇÐȸ³í¹®Áö,  Á¦18±Ç Á¦ 5È£, pp.  93-102, 2008. 10

 34. ¿À·ù È®»ê ±â¹ýÀ» ÀÌ¿ëÇÑ CRT-RSA ¿À·ù ÁÖÀÔ °ø°Ý ´ëÀÀ ¹æ¾È

    Çѱ¹Á¤º¸º¸È£ÇÐȸ ³í¹®Áö Á¦ 18±Ç Á¦ 2È£, pp.  75-83  , 2008. 4

33. °Ë»öÁ¤º¸ »çÀü µ¿±âÈ­¸¦ ÀÌ¿ëÇÑ Àúºñ¿ë RFID ÀÎÁõ¹æ½Ä

    Çѱ¹Á¤º¸º¸È£ÇÐȸ ³í¹®Áö 18±Ç Á¦ 1È£, pp. 77-88, 2008. 2 

32. º¸È£ÇÁ·ÎÆÄÀÏ °³¹ßÀ» À§ÇÑ º¸Áõµî±Þ »êÁ¤ ±âÁØ¿¡ °üÇÑ ¿¬±¸

    Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÐȸÁö 17±Ç Á¦ 6È£, pp.57-66, 2007. 12

31. ºñ¹ÐÁ¤º¸ µ¿±âÈ­¿¡ ±â¹ÝÇÑ Strong RFID ÀÎÁõ ÇÁ·ÎÅäÄÝ 

    Çѱ¹Á¤º¸º¸È£ÇÐȸ ³í¹®Áö 17±Ç Á¦ 5È£, pp. 99-109, 2007. 10

30. A Blinding-based Scalar Multiplication Algorithm secure gainst Power Analysis Attacks

    Çѱ¹Á¤º¸º¸È£ÇÐȸ ³í¹®Áö 17±Ç Á¦ 3È£, pp. 117-121, 2007. 6

29. »çÀ̵å ä³Î °ø°Ý¿¡ ´ëÇÑ ½º¸¶Æ®Ä«µå ¾ÈÀü¼ºÀÇ ½ÇÇèÀû ºÐ¼®

    Á¤º¸º¸È£ÇÐȸ³í¹®Áö 16±Ç Á¦ 4È£, 2006. 8

   * 2006³â 2¿ù Çѱ¹Á¤º¸º¸È£ÇÐȸ ¿µ³²ÁöºÎ Çмú´ëȸ ¿ì¼ö³í¹® 

28. Àú ¸Þ¸ð¸® ȯ°æ¿¡ ÀûÇÕÇÑ ¸¶½ºÅ· ±â¹ÝÀÇ ARIA ±¸Çö

    Çѱ¹Á¤º¸º¸È£ÇÐȸ ³í¹®Áö, 16±Ç Á¦ 3È£, pp. 143-156, 2006. 6

27. ·£´ý ¸¶½ºÅ· ±â¹ýÀ» ÀÌ¿ëÇÑ DPA °ø°Ý¿¡ ¾ÈÀüÇÑ ARIA ±¸Çö

    Çѱ¹Á¤º¸º¸È£ÇÐȸ ³í¹®Áö, 16±Ç Á¦ 2È£, pp. 129-139, 2006. 4

26. ºÎä³Î °ø°ÝºÐ¼® ÅøÀ» ÀÌ¿ëÇÑ ¾ÈÀü¼º Æò°¡¿¡ °üÇÑ ¿¬±¸

    Áö¼º°úâÁ¶ 9±Ç 1È£ Áý, 2006. 2

25. Modified Priority queuing packet scheduling algorithm

    International Digital Contents Conference, Digital Contents Society, 2005. 12

24. Á¤º¸º¸È£¿ë ½Ã½ºÅÛ¿¡ ´ëÇÑ Hybrid ¹°¸®Àû ºÐ¼® °ø°Ý ¹× ¹æ¾î´ëÃ¥

    Áö¼º°úâÁ¶ 8±Ç 1È£ Áý, 2005. 2

23. ºí·° ¾ÏÈ£ ARIA¿¡ ´ëÇÑ Â÷ºÐ Àü·ÂºÐ¼® °ø°Ý

    Á¤º¸º¸È£ÇÐȸ³í¹®Áö 15±Ç 1È£ 7Áý, 2005. 2

   * 2004³â Çѱ¹Á¤º¸º¸È£ÇÐȸ Çмú´ëȸ ¿ì¼ö³í¹®

22. Ÿ¿ø °î¼± ¾ÏÈ£½Ã½ºÅÛ¿¡¼­ Àü·ÂºÐ¼®°ø°Ý¿¡ ´ëÀÀÇÏ´Â ºñ¹Ð Å° ·£´ýÈ­ ¹æ¹ý

    Á¤º¸°úÇÐȸ Á¤º¸º¸È£ ¿¬±¸È¸, Vol. 4, No 1, pp. 38-43,2004.4

21. RSA ½Ã½ºÅÛ¿¡¼ºÀÇ Fault ÁÖÀÔ °ø°Ý°ú ±× ´ëÀÀ¹æ¾È

    Áö¼º°ú âÁ¶, Vol. 7 No 1. pp. 551-566, ³ª»ç·¿´ëÇб³, 2004. 2

20. »ç¿ëÀÚ ÀÍ¸í¼ºÀ» À§ÇÑ  Distributed Signcryption

    Çѱ¹Á¤º¸º¸È£ÇÐȸ³í¹®Áö, Á¦ 13È£, Á¦ 4±Ç

    pp. 169-176, 2003. 8

 * 2003³â Çѱ¹Á¤º¸º¸È£ÇÐȸ ¿µ³²ÁöºÎ Çмú´ëȸ ¿ì¼ö³í¹®  

19. ºñ¹Ð Å°¸¦ NAF·Î »ç¿ëÇÏ´Â ¾ÏÈ£½Ã½ºÅÛÀÇ Â÷ºÐÀü·ÂºÐ¼®°ø°Ý

    Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ³í¹®Áö, Á¦ 4È£, Á¦ 3±Ç

    pp. 1-8, 2003. 6

18. Folding ±â¹ýÀ» ÀÌ¿ëÇ× Àü·ÂºÐ¼® °ø°Ý¿¡ ´ëÀÀÇÏ´Â °í¼Ó ½ºÄ®¶ó °ö¼À,

    Çѱ¹Á¤º¸º¸È£ÇÐȸ³í¹®Áö, Á¦ 13È£, Á¦ 3±Ç

    pp. 57-64, 2003. 6 

17. Ÿ¿ø°î¼±¾ÏÈ£½Ã½ºÅÛ¿¡¼­ ·£´ý m-ary ¹æ¹ýÀ» »ç¿ëÇÑ  Àü·ÂºÐ¼® °ø°ÝÀÇ ´ëÀÀ¹æ¾È,

    Çѱ¹ Á¤º¸º¸È£ÇÐȸ³í¹®Áö, Á¦ 13È£, Á¦ 3±Ç

    pp. 35-44, 2003. 6

16. ´ëÇÐÀÇ Á¤º¸º¸È£ °ü·ÃÇаú ±³À°°úÁ¤ ºÐ¼®°ú  ¸ðµ¨ °³¹ß¿¡ °üÇÑ ¿¬±¸,

     Çѱ¹ Á¤º¸º¸È£ÇÐȸ³í¹®Áö, Á¦ 13È£, Á¦ 3±Ç

     pp. 17-26, 2003. 6

15. ´ëÇпø¿¡¼­ÀÇ Á¤º¸º¸È£Àü°ø ±³°ú °úÁ¤¿¡ °üÇÑ °íÂû

    Çѱ¹Á¤º¸º¸È£ÇÐȸÇÐȸÁö, Vol, 13, No. 2, pp. 1-14, 2003. 4

14. ±¹³» 4³âÁ¦ ÁÖ¿ä´ëÇÐ Á¤º¸º¸È£ °ü·ÃÇаú ÇкΠ±³À° °úÁ¤ ºñ±³ ºÐ¼® ¿¬±¸

    Çѱ¹Á¤º¸º¸È£ÇÐȸÇÐȸÁö, Vol, 13, No. 2, pp. 1-14, 2003. 4

13. Àü·ÂºÐ¼®°ø°Ý¿¡ ´ëÀÀÇÏ´Â ½ºÄ®¶ó °ö¼À ¾Ë°í¸®µëÀÇ °í¼Ó º´·ÄÈ­

    ³ª»ç·¿ ³íÃÑ Vol. 8, No. 1,  ³ª»ç·¿´ëÇб³, 2003. 2

12. ECC¿¡¼­ÀÇ ºÎ-ä³Î °ø°Ý ´ëó¹æ¾È ¹× Markov chain ºÐ¼®

    ³ª»ç·¿ ³íÃÑ Vol. 7, No. 1,  ³ª»ç·¿´ëÇб³, 2002.2

11. Montgomery °ö¼À±â¸¦ ÀÌ¿ëÇÑ È¿À²ÀûÀÎ ¸ðµâ¶ó ¸è½Â±â ±¸Á¶

    Çѱ¹Á¤º¸º¸È£ÇÐȸ ³í¹®Áö, Vol. 11,  No. 5,

10. GF(2^m)ü»óÀÇ Å¸¿ø°î¼±À» ÀÌ¿ëÇÑ ¼­¸í½Ã½ºÅÛ ±¸Çö

    ³ª»ç·¿ ³íÃÑ Vol. 6, No. 1,  ³ª»ç·¿´ëÇб³, 2001.2

9. ºÐÇÒÇü  CSA¸¦ ÀÌ¿ëÇÑ  Montgomery °ö¼À±â

   Åë½ÅÁ¤º¸º¸È£ÇÐȸ ³í¹®Áö, Vol.10, No.3, pp. 77-84,

   Åë½ÅÁ¤º¸º¸È£ÇÐȸ, 2000.9

8. Ÿ¿ø°î¼±¿¡ ±âÃÊÇÑ µðÁöÅÐ ¼­¸í ¾Ë°í¸®µëÀÇ ¼ÒÇÁÆ®¿þ¾î ±¸Çö

   ³ª»ç·¿ ³íÃÑ Vol. 5, No. 1, pp. 467-490,

   ³ª»ç·¿´ëÇб³, 2000.2  

7. ½Ã½ºÅ丯 ¾î·¹À̸¦ ÀÌ¿ëÇÑ Montgomery ¸ðµâ¶ó °ö¼À±â ¼³°è

   Åë½ÅÁ¤º¸º¸È£ÇÐȸ ³í¹®Áö, Vol.9, No.1, pp. 135-146,

   Åë½ÅÁ¤º¸º¸È£ÇÐȸ,99.3

6. µðÁöÅ» ¼­¸í ¾Ë°í¸®µëÀÇ ±¸Çö

   ³ª»ç·¿ ³íÃÑ Vol. 4, No. 1, pp. 335-356, ³ª»ç·¿´ëÇб³, 99.2

5. °øÅë Çǽ¼ö ¸ðµâ¶ó °ö¼ÀÀ» ÀÌ¿ëÇÑ °í¼Ó ¸è½Â

   Á¤º¸°úÇÐȸ ³í¹®Áö(C) Vol. 3, No. 5, pp. 491-497,

   Á¤º¸°úÇÐȸ, 97.10

4. Montgomery ¸ðµâ¶ó °ö¼ÀÀ» º¯ÇüÇÑ °í¼Ó ¸è½Â

   Åë½ÅÇÐȸ ³í¹®Áö, Vol. 22, No. 5, pp. 1036-1044,

   Åë½ÅÇÐȸ, 97.5

3. °³ÀÎÁ¤º¸¿¡ ±âÃÊÇÑ ¼­¸í ¹× Å°ºÐ¹è ÅëÇÕ ¾ÏÈ£½Ã½ºÅÛÀÇ Á¦¾È

   Åë½ÅÁ¤º¸º¸È£ÇÐȸ ³í¹®Áö, Vol.6, No.3, pp. 57-70,

   Åë½ÅÁ¤º¸º¸È£ÇÐȸ,96.9

2. µðÁöÅ» À̵¿Åë½Å ÀÎÁõ ¼­ºñ½ºÀÇ ±â¼úµ¿Çâ

   TELECOMMUNICATIONS REVIEW, Vol. 6, No. 2, pp. 145-160,

   Çѱ¹À̵¿Åë½Å, 96.5

1. °³ÀÎÁ¤º¸¿¡ ±âÃÊÇÑ È¿À²ÀûÀÎ Å° ºÐ¹è ½Ã½ºÅÛÀÇ Á¦¾È

   °æºÏ´ë ÀüÀÚ±â¼ú ¿¬±¸Áö, Vol. 17, No. 1, pp. 9-17,

   °æºÏ´ëÇб³, 96.1

 

¡Ü ±¹³» Çмú ¹ßÇ¥  |¡ã|

156. Àû´ëÀû ÆÐÄ¡ °ø°Ý¿¡ ´ëÀÀÇÏ´Â °æÀïÇнÀ ±â¹ÝÀÇ ÀâÀ½ ÁÖÀÔ ±â¹ý

       Çѱ¹Á¤º¸º¸È£ÇÐȸ  µ¿°èÇмú´ëȸ, pp. 194-198. 2024. 12

       * ¿ì¼ö³í¹®»ó(Çѱ¹ÀÎÅͳÝÁøÈï¿øÀå»ó) ¼ö»ó

155. ÇÕ¼º°ö ½Å°æ¸Á¿¡¼­ Ŭ·° ±Û¸®Ä¡ ¿À·ù ÁÖÀÔÀ» ÀÌ¿ëÇÑ ¿ÀºÐ·ù °ø°Ý

       Çѱ¹Á¤º¸º¸È£ÇÐȸ  µ¿°èÇмú´ëȸ, pp. 603-606. 2024. 12

154. µö·¯´× È°¼ºÈ­ ÇÔ¼ö Softmax¿¡ ´ëÇÑ ¿À·ù ÁÖÀÔ °ø°Ý ¹× ´ëÀÀÃ¥

       ±¹Á¦Â÷¼¼´ëÀ¶ÇÕ±â¼úÇÐȸ Ãß°èÀ¶ÇÕÇмú¹ßÇ¥´ëȸ, 2024. 10

      * ¿ì¼ö³í¹®»ó(ÇÐȸÀå»ó) ¼ö»ó

153. Áö½Ä Áõ·ù¸¦ ÀÌ¿ëÇÑ °æ·®È­ÇÑ µö·¯´× ±â¹Ý CAN ¹ö½º ÀÌ»ó ŽÁö±â

       ±¹Á¦Â÷¼¼´ëÀ¶ÇÕ±â¼úÇÐȸ Ãß°èÀ¶ÇÕÇмú¹ßÇ¥´ëȸ, 2024. 10

152. DNN ±¸Á¶ MNIST ºÐ·ù±â¿¡¼­ ³»ºÎ °¡ÁßÄ¡ º¹¿ø ºÎä³Î °ø°Ý¿¡ ´ëÇÑ ´ëÀÀÃ¥ ±¸Çö

     Çѱ¹Á¤º¸º¸È£ÇÐȸ ÃæûÁöºÎÇмú´ëȸ, 2024. 9

      * ¿ì¼ö³í¹®»ó(ETRI ¿øÀå»ó) ¼ö»ó

151. DNN È°¼ºÈ­ ÇÔ¼ö¿¡ ´ëÇÑ ¿À·ù ÁÖÀÔ °ø°Ý ´ëÀÀÃ¥

     Çѱ¹Á¤º¸º¸È£ÇÐȸ ÃæûÁöºÎÇмú´ëȸ, 2024. 9

150. CAN ¹ö½º¿¡¼­ 1D ConvolutionÀ» ÀÌ¿ëÇÑ ±â°è ÇнÀ ±â¹Ý ÀÌ»óŽÁö

     Çѱ¹Á¤º¸º¸È£ÇÐȸ ÃæûÁöºÎÇмú´ëȸ, 2024. 9

149. ÀÚÀ²ÁÖÇà ÀÚµ¿Â÷¿¡ ´ëÇÑ Àû´ëÀû ȸÇÇ °ø°Ý ¹× ´ëÀÀ ½Ã½ºÅÛ

     Çѱ¹Á¤º¸º¸È£ÇÐȸ  ÇÏ°èÇмú´ëȸ, pp. 166-169, 2023. 6

       * ¿ì¼ö³í¹®»ó(Çѱ¹Á¤º¸º¸È£ÇÐȸÀå»ó) ¼ö»ó

148. ½Ã°è¿­ ÇÕ¼º°ö ¿ÀÅäÀÎÄÚ´õ¸¦ È°¿ëÇÑ DoS°ø°Ý ŽÁö

     Çѱ¹Á¤º¸º¸È£ÇÐȸ  ÇÏ°èÇмú´ëȸ, pp. 477-480, 2023. 6

147. Siamese Neural Network¸¦ ÅëÇÑ One-Shot Learning À̹ÌÁö ÀÎ½Ä ½Ã½ºÅÛ

     Çѱ¹Á¤º¸º¸È£ÇÐȸ  ÇÏ°èÇмú´ëȸ, pp.449-452. 2023. 6

146. ÀÚÀ²ÁÖÇàÂ÷ ½ºÆ¼¾î¸µ °¢µµ ¿¹Ãø ¸ðµ¨¿¡ ´ëÇÑ Àû´ëÀû °ø°Ý ¹× ´ëÀÀ ºÐ¼®

     Çѱ¹Á¤º¸º¸È£ÇÐȸ  ÇÏ°èÇмú´ëȸ, pp. 170-173. 2023. 6

145. ºÎä³Î ºÐ¼®À» ÀÌ¿ëÇÑ MNIST À̹ÌÁö DNN ºÐ·ù±âÀÇ °¡ÁßÄ¡ º¹¿ø °ø°Ý

     Çѱ¹Á¤º¸º¸È£ÇÐȸ  ÇÏ°èÇмú´ëȸ, pp. 61-64. 2023. 6

  * ¿ì¼ö³í¹®»ó(ºÎä³Î Á¤º¸ºÐ¼®°æÁø´ëȸ ÀÎÅͳÝÁøÈï¿øÀå»ó) ¼ö»ó

144. ¾çÀÚ³»¼º¾ÏÈ£ Classic McEliece¿¡ ´ëÇÑ µö·¯´×À» ÀÌ¿ëÇÑ ÇÁ·ÎÆÄÀϸµ °ø°Ý

     Çѱ¹Á¤º¸º¸È£ÇÐȸ  µ¿°èÇмú´ëȸ, pp. 521-524. 2022. 11

       * ¿ì¼ö³í¹®»ó(Çѱ¹Á¤º¸º¸È£ÇÐȸÀå»ó) ¼ö»ó

143. ¾çÀÚ ³»¼º ¾ÏÈ£ CRYSTALS-Dilithium¿¡ ´ëÇÑ È¿°úÀûÀÎ ºñÇÁ·ÎÆÄÀϸµ °ø°Ý

     Çѱ¹Á¤º¸º¸È£ÇÐȸ  µ¿°èÇмú´ëȸ, pp. 517-520. 2022. 11

142. Transformer¸¦ ÀÌ¿ëÇÑ ºÎä³Î Á¤º¸ Çؼ® ¹× ¿ª¾î¼Àºí·¯ ¼º´É Çâ»ó

     Çѱ¹Á¤º¸º¸È£ÇÐȸ  µ¿°èÇмú´ëȸ, pp. 373-376, 2022. 11

141. ´ÙÁß ÇÇó ¼±ÅÃÀ» ÅëÇÑ ºÎä³Î ±â¹Ý ¿ª¾î¼Àºí·¯ ¼º´É Çâ»ó

       Çѱ¹Á¤º¸º¸È£ÇÐȸ ÃæûÁöºÎÇмú´ëȸ, 2022. 10

       * ¿ì¼ö³í¹®»ó(NSR ¼ÒÀå»ó) ¼ö»ó

140. Ŭ¶ó¿ìµå ½ºÅ丮Áö¿¡¼­ ¾ÈÀüÇÑ µ¥ÀÌÅÍ Áߺ¹ Á¦°Å ±â¼ú ¿¬±¸ µ¿Çâ

     Çѱ¹Á¤º¸º¸È£ÇÐȸ ÃæûÁöºÎÇмú´ëȸ, 2022. 10

139. ºí·ÏüÀÎÀ» È°¿ëÇÑ ÀÚµ¿Â÷ °ü¸® ½Ã½ºÅÛ ±¸Çö

     ±¹Á¦Â÷¼¼´ëÀ¶ÇÕ±â¼úÇÐȸ Ãß°èÀ¶ÇÕÇмú¹ßÇ¥´ëȸ, 2022. 7

138. Longformer ¹× ALBERT¸¦ ÀÌ¿ëÇÑ ½Ã½ºÅÛ ÀÌ»ó ·Î±× ŽÁö

     ±¹Á¦Â÷¼¼´ëÀ¶ÇÕ±â¼úÇÐȸ Ãß°èÀ¶ÇÕÇмú¹ßÇ¥´ëȸ, 2022. 7

137. ¾çÀÚ ³»¼º ¾ÏÈ£ CRYSTALS-Kyber¿¡ ´ëÇÑ ºñÇÁ·ÎÆÄÀϸµ ±â¹Ý Àü·Â ºÐ¼® °ø°Ý

     Çѱ¹Á¤º¸º¸È£ÇÐȸ  ÇÏ°èÇмú´ëȸ, pp. 806-811, 2022. 6

136. ¾çÀÚ³»¼º¾ÏÈ£ NTRU¿¡ ´ëÇÑ Àü·Â ºÎä³Î °ø°Ý

    Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÇмú´ëȸ, pp. 415-419,, 2022. 6

    * ¿ì¼ö³í¹®»ó ¼ö»ó

135. DualBERT¿Í ºÎä³Î Á¤º¸¸¦ ÀÌ¿ëÇÑ ½Ã½ºÅÛ ¹«°á¼º °ËÁõ

     Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÇмú´ëȸ, pp. 406-410,, 2022. 6

134. µö·¯´× ±â¹ýÀ» ÀÌ¿ëÇÑ µöÆäÀÌÅ© ŽÁö ½Ã½ºÅÛ ±¸Çö

     Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÇмú´ëȸ, pp. 265-269,, 2022. 6

133. ¿Âº¸µå ÀÎÅÍÆäÀ̽º¸¦ È°¿ëÇÑ ¼ÒÇÁÆ®¿þ¾î ±â¹Ý ºÎä³Î Àü·Â ºÐ¼® °ø°Ý

     Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÇмú´ëȸ, pp. 265~268, 2021. 11

132. °æ·® ºí·Ï ¾ÏÈ£ PIPO¿¡ ´ëÇÑ ºÎä³Î ºÐ¼® ¹× ¸¶½ºÅ· ´ëÀÀ ±â¹ý

     Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÇмú´ëȸ, pp. 539~542, 2021. 11

131. Wav2Vec 2.0 À½¼º ÀÎ½Ä ¸ðµ¨À» »ç¿ëÇÑ µö·¯´× ±â¹ýÀÇ º¸À̽ºÇÇ½Ì °¨Áö

     Çѱ¹Á¤º¸º¸È£ÇÐȸ ÃæûÁöºÎÇмú´ëȸ,  2021. 8

130. ¿¬¼Ó ¿þÀÌºí¸´ º¯È¯À» ÀÌ¿ëÇÑ Àü·Â ºÐ¼® °ø°ÝÀÇ ¼º´É Çâ»ó ¹æ¾È

     Çѱ¹Á¤º¸º¸È£ÇÐȸ ÃæûÁöºÎÇмú´ëȸ,  2021. 8

    * ÃÖ¿ì¼ö³í¹®»ó ¼ö»ó

129. ±â°è¾î ¼öÁØ ºÎä³Î ´©¼³ Á¤º¸ ºÐ¼® ¹× ¿ª¾î¼Àºí·¯ ±¸Çö

     Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp. 328~332, 2021. 6

128. CUDA ±â¹Ý º´·Ä󸮸¦ ÅëÇÑ »ó°ü Àü·Â ºÐ¼®(CPA)ÀÇ °í¼Ó ±¸Çö

     Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp. 311~314, 2021. 6

127. ÇعֿþÀÌÆ® ±â¹Ý ÀÌÁø ·¹À̺íÀ»  ÀÌ¿ëÇÑ ºñÇÁ·ÎÆÄÀϸµ µö·¯´× ºÎä³Î °ø°Ý

     Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÇмú´ëȸ, pp. 570~574, 2020. 11

126. ij½Ã ºÎä³Î °ø°Ý¿¡ ´ëÀÀÇÏ´Â T-Table ¼ÅÇøµ ±â¹Ý AES ±¸Çö

     Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÇмú´ëȸ, pp. 579~583, 2020. 11

125. ¸¶ÀÌÅ©·Î ÄÁÆ®·Ñ·¯ ¼Òºñ Àü·Â ±â¹Ý ¸í·É¾î ¼öÁØ ¿ª¾î¼Àºí·¯ ±¸Çö

     Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp. 649-653, 2020. 7

    * ÃÖ¿ì¼ö³í¹®»ó ¼ö»ó

124. ¸Ó½Å·¯´× ±â¹Ý ³×Æ®¿öÅ© Æ®·¡ÇÈ ºÐ¼® ±â¹ý ¼º´É ºñ±³

     Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp. 404~408, 2020. 6

123. ºí·Ï ¾ÏÈ£¿¡ ´ëÇÑ ºÎä³Î ºÐ¼®¿ë Àü·Â ÆÄÇü µ¥ÀÌÅÍ ¼Â ±¸Ãà

     Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÇмú´ëȸ,pp 263~266, 2019.12

122. Áß±¹ Ç¥ÁØ ºí·Ï ¾ÏÈ£ ¾Ë°í¸®Áò SM4¿¡ ´ëÇÑ Àü·Â ºÐ¼® °ø°Ý ¹× ´ëÀÀ ±â¹ý

     Çѱ¹Á¤º¸º¸È£ÇÐȸ ÃþûÁöºÎÇмú´ëȸ, ¼¼¼Ç E, 2019.  10

    * ³í¹® Àå·Á»ó ¼ö»ó

121. MLP µö·¯´× ±â¹ý¿¡ ±â¹ÝÇÑ Àü·Â ºÐ¼® °ø°Ý ±¸Çö ¹× ºÐ¼®

     Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp. 75~78, 2019. 6

120. Àü·Â ºÐ¼® °ø°ÝÀ» À§ÇÑ AutoEncoder ±â¹ÝÀÇ È¿À²ÀûÀÎ POI ºÐ¼® ±â¹ý ¿¬±¸

     Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp.110~113, 2019. 6

119. ºÎä³Î ºÐ¼® °ø°Ý¿¡ ´ëÀÀÇÏ´Â ÃÊ°æ·® ºí·Ï ¾ÏÈ£ CHAM ±¸ÇöÀ» À§ÇÑ Ãà¼Ò ¸¶½ºÅ· ±â¹ý Àû¿ë

      Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÇмú´ëȸ, pp. 371~375, 2018.12

     * ÃÖ¿ì¼ö³í¹®»ó ¼ö»ó

118. ºÎä³Î ºÐ¼® °ø°Ý¿¡ ´ëÀÀÇÏ´Â SIMON ¾ÏÈ£ ±¸ÇöÀ» À§ÇÑ ¸¶½ºÅ· ±â¹ý Á¦¾È

     Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp. 291~ 295, 2018. 6

117. °æ·® ºí·Ï ¾ÏÈ£ SPECK¿¡ ´ëÇÑ µ¥ÀÌÅÍ ¸¶½ºÅ· ±â¹ý ¼³°è ¹× ±¸Çö

     Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp. 281~ 285, 2018. 6

116. ¾ÈÀüÇÑ ½º¸¶Æ®°øÀå ¿¬°è¸¦ À§ÇÑ Å©·Î½º µµ¸ÞÀÎ º¸¾È ¹æ¹ý

     Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp. 154-161, 2018. 6

115. ÀÚ¹Ù½ºÅ©¸³Æ® ÄÚµå º¸È£¸¦ À§ÇÑ ÄÚµå ³­µ¶È­ ÇÁ·Î±×·¥ ½Ã¹Ä·¹À̼Ç

     Çѱ¹Á¤º¸º¸È£ÇÐȸ ÃæûÁöºÎÇмú´ëȸ, pp. 8~11, 2018. 2

114. NTRU ¼­¸í ½Ã½ºÅÛ¿¡ ´ëÇÑ ¿À·ù ÁÖÀÔ °ø°Ý µ¿Çâ ¹× ±¸Çö¿¡ °üÇÑ ¿¬±¸

     Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÇмú´ëȸ, pp. 300~302, 2017,12

113. ÇüÅ º¸Á¸ ¾ÏÈ£ ¾Ë°í¸®Áò ±¸Çö¿¡ °üÇÑ ¿¬±¸

     Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, Æ÷½ºÅÍ ¹ßÇ¥, 2017. 6

112. ºÎä³Î ºÐ¼®¿¡ ´ëÀÀÇϱâ À§ÇÑ LEA ¸¶½ºÅ· ¾Ë°í¸®Áò

     Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp. 7~11, 2017. 6

     * ¿ì¼ö³í¹®»ó ¼ö»ó

111. ¼­¸í ¹× Å° ÀÏÄ¡ ±â´ÉÀ» Á¦°øÇÏ´Â ¹«ÀÎÁõ¼­ ±â¹ÝÀÇ ÅëÇÕ ¾ÏÈ£½Ã½ºÅÛ

     Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÇмú´ëȸ, Æ®·¢ E-5, 2016. 12

110. ¼öÆòÃæµ¹ Àü·ÂºÐ¼® °ø°Ý¿¡ ´ëÀÀÇÏ´Â Square- Multiply Ladder ¾Ë°í¸®Áò

     Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, Æ®·¢ B-1, 2016. 6

     * ÃÖ¿ì¼ö ³í¹®»ó ¼ö»ó

109. °¡»óÄ«µå¹øÈ£¸¦ ÀÌ¿ëÇÏ´Â °áÁ¦ ½Ã½ºÅÛÀÇ Ãë¾à¼º ºÐ¼® ¹× °³¼±

     Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, Æ®·¢ A-6, 2016. 6

108. ÀϹæÇâ Àü¼Ûµ¥ÀÌÅÍ ¾ÏÈ£ ¹× Å° ºÐ¹è ¹æ¹ý

     Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÇмú´ëȸ, Æ®·¢ A-2, 2015. 12

   * ¿ì¼ö³í¹®»ó ¼ö»ó

107.ÀϹæÇâ ÀÚ·áÀü¼Û Àåºñ¿¡ ´ëÇÑ ±â¼ú ºÐ·ù

     Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÇмú´ëȸ, Æ®·¢ A-2, 2015. 12

106. ij½Ã±â¹Ý ºÎä³Î °ø°Ý¿¡ °üÇÑ °íÂû

     Çѱ¹Á¤º¸º¸È£ÇÐȸ ÃæûÁöºÎÇмú´ëȸ, pp. 17~23, 2015. 10

105. º¯ÇüµÈ ¼±Åø޽ÃÁö °ø°Ý¿¡ ´ëÇÑ Left-to-RightÇü ÀÌÁø ¸è½Â ¹æ½ÄÀÇ Ãë¾à¼º

     Çѱ¹Á¤º¸º¸È£ÇÐȸ ÃæûÁöºÎÇмú´ëȸ, pp. 9~12, 2015. 10

104. ºÒºÐ¸í ¼ú¾î¸¦ ÀÌ¿ëÇÑ °¡»ó¸Ó½Å¿¡¼­ÀÇ µ¿Àû ºÐ¼® ȸÇÇ °ø°Ý ±â¹ý

     Çѱ¹Á¤º¸º¸È£ÇÐȸ ÃæûÁöºÎÇмú´ëȸ, 2014. 9

103. È帧Á¦¾î ³­µ¶È­¸¦ ÅëÇÑ Á¤»óÇàÀ§ ±â¹ÝÀÇ µ¿Àû ºÐ¼® ¿ìȸ °ø°Ý

     Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, Æ®·¢ D-4  2014. 6

102. ħÀÔ Å½Áö ½Ã½ºÅÛ Snort¿¡¼­ PE ÆÄÀÏ Å½Áö ¼³°è¿¡ °üÇÑ ¿¬±¸

    Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ,  pp. 71~76, 2013. 12

    * ¿ì¼ö ³í¹®»ó ¼ö»ó

101. ½º¸¶Æ® Æù¿¡¼­ »ç¿ëÇÏ´Â ÆÄÀÏ ¾ÏÈ£¿ë ¾Û¿¡ ´ëÇÑ Ãë¾à¼º ºÐ¼®

      Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ,  pp.128~133, 2013. 12

100. ´Ü¼ø Àü·Â ºÐ¼® °ø°Ý¿¡ ´ëÇÑ ½º¸¶Æ®Æù¿ë ¸è½Â ¾Ë°í¸®µëÀÇ Ãë¾à¼º,

      Çѱ¹Á¤º¸º¸È£ÇÐȸ ÃæûÁöºÎÇмú´ëȸ,  pp. 16~20 , 2013. 9

99. °ø°³ ¼ÒÇÁÆ®¿þ¾î Snort¸¦ ÀÌ¿ëÇÑ GOOSE ÇÁ·ÎÅäÄÝ IDS °³¹ß

    Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ,  pp.127~132, 2013. 6

     * ¿ì¼ö ³í¹®»ó ¼ö»ó

98. AES¿¡¼­ ÀÔÃâ·Â Â÷ºÐ °ª¿¡ ±â¹ÝÇÑ ¿À·ù ÁÖÀÔ°ø°Ý ¹æ¾î ´ëÃ¥

    Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ,  pp.34~38 , 2012. 6

    * ¿ì¼ö ³í¹®»ó ¼ö»ó

97. µ¥ÀÌÅÍ ¸¶½ºÅ· ±â¹ýÀ» ÀÌ¿ëÇÑ ¿À·ù ÁÖÀÔ°ø°Ý ¹æ¾î ±â¹ý,

    Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp.20~24, 2012.6

96. °æ·® ºí·Ï ¾ÏÈ£ HIGHT¿¡ ´ëÇÑ ¿À·ù ÁÖÀÔ °ø°Ý

    Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÇмú´ëȸ, pp. 107~111, 2011.12

95. ºí·Ï¾ÏÈ£ HIGHT¿¡ ´ëÇÑ ¿À·ù ÁÖÀÔ °ø°Ý

    2011³â Á¤º¸º¸È£ÇÐȸ ÃæûÁöºÎ Çмú¹ßǥȸ, pp. 288~294, 2011.11

94. Triple DES ¿¡ ´ëÇÑ °³¼±µÈ ¶ó¿îµå Ãà¼Ò ¿À·ù ÁÖÀÔ °ø°Ý

    2011³â Á¤º¸º¸È£ÇÐȸ ÃæûÁöºÎ Çмú¹ßǥȸ, pp. 278~287, 2011.11

   * ¿ì¼ö³í¹®»ó ¼ö»ó

93. OpenSSL µ¿Àû ¶óÀ̺귯¸® ¿À·ù ÁÖÀÔÀ» ÀÌ¿ëÇÑ RSA ¼­¸í °ø°Ý

    Á¤º¸º¸È£¿Í ¾ÏÈ£¿¡ °üÇÑ Çмú´ëȸ(WISC-2011), pp. 96~106, 2011.09

92. SCADA ½Ã½ºÅÛ¿¡¼­ ID-±â¹Ý Å° ºÐ¹è ¹× º¹±¸ ÇÁ·ÎÅäÄÝ

    Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp. 196~201, 2011.06

   * ¿ì¼ö³í¹®»ó ¼ö»ó

91. QR Code¿¡ ´ëÇÑ º¸¾È À§Çù ¹× ´ëÀÀ ¹æ¹ý Á¦¾È

    Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp. 168~171, 2011.06

90. ¾ÏÈ£¿ë µð¹ÙÀ̽º¿¡ ´ëÇÑ ¹°¸®Àû °ø°Ý À§Ç輺 ¹× ´ëÀÀ ¹æ¾È

    Á¦ 9ȸ ±¹¹æ º¡º¸º¸È£ ÄÁÆÛ·±½º, pp. 317~340, 2011.06

89. Rabbit ¾Ë°í¸®µë¿¡ ´ëÇÑ Àü·ÂºÐ¼® °ø°ÝÀÇ ´ëÀÀ ¹æ¹ý

    Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp. 333~337, 2010.12

88. ¹Ýº¹¹® ¿À·ù ÁÖÀÔÀ» ÀÌ¿ëÇÑ Triple DES Â÷ºÐ ¿À·ù °ø°Ý

    Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÇмú´ëȸ, pp. 308~312, 2010.12

87. CRT-RSA ¾ÏÈ£ ½Ã½ºÅÛÀÇ È¿À²ÀûÀÎ ÀÌÁß µ¡¼À üÀÎ ¸è½Â ±¸Á¶¿¡ °üÇÑ ¿¬±¸

    Çѱ¹Á¤º¸º¸È£ÇÐȸ Çмú¹ßǥȸ, pp. 3~11, 2010.10

86. TPM ÀÎÁõÇÁ·ÎÅäÄÝÀÇ Ãë¾à¼º ºÐ¼®°ú ´ëÀÀÃ¥

    Çѱ¹Á¤º¸º¸È£ÇÐȸ Çмú ¹ßǥȸ, pp. 119~127, 2010.10

85. TPM¿¡¼­ ¸í·É¾î ÀÎÁõ ÇÁ·ÎÅäÄÝ¿¡ ´ëÇÑ °ø°Ý ¹× ´ëÀÀ¹æ¹ý

    Çѱ¹Á¤º¸º¸È£ÇÐȸ Çмú´ëȸ, pp. 144~154, 2010.10

84. ¹Ýº¹¹®¿¡ ´ëÇÑ ¿À·ù ÁÖÀÔÀ» ÀÌ¿ëÇÑ AES ¾ÏÈ£°ø°Ý

    Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp. 68~73, 2010.06

83. DSA¿¡ ´ëÇÑ ¿À·ùÁÖÀÔ °ø°Ý ¹× ´ëÀÀÃ¥

    Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp. 57~60, 2010.06

82. DLP±â¹Ý µðÁöÅÐ ¼­¸í¿¡ ´ëÇÑ ¿À·ùÁÖÀÔ °ø°Ý ¹× ´ëÀÀÃ¥

    Çѱ¹Á¤º¸º¸È£ÇÐȸ Çмú ¹ßǥȸ, pp. 84~87, 2010.04

81. ³í¸® ÇÔ¼ö¸¦ ÀÌ¿ëÇÑ ¿À·ù ÁÖÀÔ °ø°Ý ´ëÀÀ¹æ¹ý

    Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÇмú´ëȸ, pp. 105~119, 2009.12

80. RSA-CRT ¿¡¼­ÀÇ ¿À·ù ÁÖÀÔ °ø°Ý ´ëÀÀÃ¥ ºñ±³ ºÐ¼®

    Çѱ¹»êÇбâ¼úÇÐȸ Ãß°èÇмú´ëȸ,  pp. 449~452, 2009.12

79. ¹°¸®Àû °ø°Ý¿¡ ¾ÈÀüÇÑ ¸è½Â ±â¹ýÀÇ Ãë¾àÁ¡ ºÐ¼® ¹× ´ëÀÀ ¹æ¾È

    Çѱ¹Á¤º¸º¸È£ÇÐȸ ÃæûÁöºÎ Çмú´ëȸ, pp. 167~175, 2009.10

78. ¿À·ù °ø°Ý¿¡ ´ëÀÀÇÏ´Â ÀÌÁ߸è½Â ±â¹ýÀÇ Ãë¾àÁ¡ ºÐ¼® ¹× °³¼± ¹æ¾È

    Çѱ¹Á¤º¸º¸È£ÇÐȸ ÃæûÁöºÎ Çмú´ëȸ,  pp. 160~166, 2009.10

77. Universally composable RFID Anonymous authentication and key-exchange protocols

    Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ,  pp. 384-389, 2009. 6

76. ARIA ºí·Ï ¾ÏÈ£¿¡ ´ëÇÑ Â÷ºÐ¿À·ù ºÐ¼® °ø°Ý

    Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp. 219-223, 2009. 6

75. ¾ÏÈ£ Áß°£°ª ÃßÃâÀ» ÅëÇÑ AES Â÷ºÐ ¿À·ù °ø°Ý

     Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ,  pp. 190-195, 2009. 6

   * ¿ì¼ö³í¹®»ó ¼ö»ó

74. RSA-CRT¿¡ ´ëÇÑ Second-oder ¿À·ù °ø°ÝÀÇ ´ëÀÀÃ¥ ºÐ¼®

    Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ,  pp. 3-8, 2009. 6 

73. ÀüÀÚÈ­Æó Ä«µå ½Ã½ºÅÛÀÇ ÇÁ·ÎÅäÄÝ Ãë¾à¼º ºÐ¼® ¹× ºÎä³Î °ø°Ý

    Çѱ¹Á¤º¸º¸È£ÇÐȸ ¿µ³²ÁöºÎ Çмú´ëȸ,  pp. 202- 207, 2009. 2

72. ÀÍ¸í¼ºÀ» Á¦°øÇÏ´Â È¿À²ÀûÀÎ ¿ø°Ý »ç¿ëÀÚ ÀÎÁõ ÇÁ·ÎÅäÄÝ

    Çѱ¹Á¤º¸º¸È£ÇÐȸ ¿µ³²ÁöºÎ Çмú´ëȸ,  pp. 144- 148, 2009. 2

71. ÀÌÁß ¸è½ÂÀ» ÀÌ¿ëÇÑ RSA-CRT¿¡¼­ÀÇ È¿À²ÀûÀÎ ¿À·ù °ø°Ý ´ëÀÀ ¹æ¹ý

    Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°è Çмú ³í¹® ¹ßǥȸ,  pp. 92-98, 2008. 12

70. Montgomery Ladder ¸è½Â ¾Ë°í¸®µë¿¡ ´ëÇÑ ¿À·ù ÁÖÀÔ °ø°Ý

    Çѱ¹Á¤º¸º¸È£ÇÐȸ ÃæûÁöºÎ Çмú ³í¹® ¹ßǥȸ,  pp. 211-218, 2008. 10

69. ¿¬»ê ¿À·ù °Ë»ç¸¦ ÀÌ¿ëÇÑ ¿À·ù ÁÖÀÔ °ø°Ý ¹æ¾î ¹æ¹ý

    Çѱ¹Á¤º¸º¸È£ÇÐȸ Çмú ³í¹® ¹ßǥȸ, pp. 223-226, 2008. 6

68. ¿À·ù ¹× Àü·ÂºÐ¼® °ø°Ý¿¡ °­ÀÎÇÑ CRT-RSA ¾ÏÈ£½Ã½ºÅÛ

    Çѱ¹Á¤º¸º¸È£ÇÐȸ Çмú ³í¹® ¹ßǥȸ, pp. 350-355, 2008. 6

67. ¼¾¼­ ³×Æ®¿öÅ©¿¡¼­ È¿À²ÀûÀÎ ÀÎÁõ°ú Å° µ¿ÀÇ ±â¹ý,

    Çѱ¹Á¤º¸º¸È£ÇÐȸ Çмú´ëȸ, pp. 65-70, 2008.2

66. RFID¿ë HB ÀÎÁõ ÇÁ·ÎÅäÄÝÀÇ ½Ç¿ëÈ­¿¡ °üÇÑ ¿¬±¸,

    Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°è Çмú´ëȸ, pp.  59-63, 2007. 12

65. º¸È£ÇÁ·ÎÆÄÀÏ °³¹ßÀ» À§ÇÑ º¸Áõµî±Þ »êÁ¤ ¹æ¹ý¿¡ °üÇÑ ¿¬±¸,

     Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°è Çмú´ëȸ, pp. 655-660, 2007. 12

64. ISO/IEC 11770-3 Å° Àü¼Û ÇÁ·ÎÅäÄݸÞÄ¿´ÏÁò 5ÀÇ ¾ÈÀü¼º ºÐ¼®,

    Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°è Çмú´ëȸ, pp. 239-243, 2007. 12

63. °æ·®È­µÈ RFID »óÈ£ÀÎÁõ ÇÁ·ÎÅäÄÝ Á¦¾È

    Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°è Çмú´ëȸ, pp. 331-336, 2007. 12

62. CRT-RSA ¿À·ù °ø°Ý¿¡ ´ëÀÀÇÏ´Â ¿À·ù È®»ê ±â¹ý,

    Çѱ¹Á¤º¸º¸È£ÇÐȸ ÃæûÁöºÎ Çмú´ëȸ, pp. 81-85, 2007. 10

61. GEN-2 RFID Çü½ÄÀ» ¸¸Á·ÇÏ´Â ÀÎÁõÇÁ·ÎÅäÄÝ¿¡ ´ëÇÑ Ãë¾à¼º ºÐ¼®

    Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp. 109-113, 2007. 6 

60. ºñ¹ÐÁ¤º¸ µ¿±âÈ­¿¡ ±â¹ÝÇÑ String RFID ÀÎÁõ ÇÁ·ÎÅäÄÝ

    Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp. 84-88, 2007. 6  - ¿ì¼ö ³í¹®

   * ¿ì¼ö³í¹®»ó ¼ö»ó

59. ºÐ»êȯ°æ¿¡ ÀûÇÕÇÑ Àúºñ¿ë RFID ÀÎÁõ ÇÁ·ÎÅäÄÝ

    Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp. 78-83, 2007. 6 

58. (2,n)-threshold ±â¹ýÀ» ÀÌ¿ëÇÑ ¼¾¼­ ³×Æ®¿öÅ© »çÀüÅ° ºÐ¹è ¹æ½Ä

    Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp. 47-51, 2007. 6 

57. Á¤º¸º¸È£ÇаúÀÇ ÀÎÅϽ± :È£¼­´ë »ç·Ê

    Çѱ¹Á¤º¸º¸È£ÇÐȸ Á¤º¸º¸È£±³À°¿öÅ©¼ó, pp. 91-100, 2007. 6

56. º¸°£°ú ÃßÃâ¹æ¹ýÀ» ÀÌ¿ëÇÑ Çâ»óµÈ ºÎä³Î °ø°Ý½ÅÈ£ Á¤·Ä¹ý

    Çѱ¹Á¤º¸º¸È£ÇÐȸ ¿µ³²ÁöºÎ Çмú´ëȸ, pp. 215-220. 2007. 2

55. Partial ID¸¦ ÀÌ¿ëÇÑ RFID ÀÎÁõ ÇÁ·ÎÅäÄÝ¿¡ ´ëÇÑ Ãë¾à¼º ºÐ¼®

   Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°è Çмú´ëȸ, pp. 217-220.  2006. 12

54. ÀúºÎÇÏ ¹× À絿±â Ư¼ºÀ» °¡Áø ¾ÈÀüÇÑ RFID ÀÎÁõ ÇÁ·ÎÅäÄÝ

    Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°è Çмú´ëȸ, pp. 563-568.  2006. 6 

53. ½º¸¶Æ® Ä«µå¿¡ ´ëÇÑ ÀüÀÚÆÄ ºÐ¼® °ø°Ý

    Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°è Çмú´ëȸ, pp. 148-152.  2006. 6 

52. ´Éµ¿Çü RFID¿¡ ´ëÇÑ Â÷ºÐÀü·Â ÁÖÆļö ºÐ¼® °ø°Ý

    Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°è Çмú´ëȸ, pp. 141-147.  2006. 6 

51. ½º¸¶Æ®Ä«µå »çÀ̵å ä³Î °ø°ÝºÐ¼® µµ±¸ °³¹ß

   Çѱ¹Á¤º¸º¸È£ÇÐȸ ¿µ³²ÁöºÎ Çмú´ëȸ, pp. 165-169. 2006. 2,

   * ¿ì¼ö³í¹®»ó ¼ö»ó

50. USB Token¿¡ ´ëÇÑ ºÎä³Î °ø°Ý µ¿Çâ

    CISC2005-W, 2005. 12 

49. ½º¸¶Æ®Ä«µå¸¦ ÀÌ¿ëÇÑ È¿À²ÀûÀÎ ¿ø°Ý »ç¿ëÀÚ ÀÎÁõ ½ºÅ´,

    CISC2005-W, 2005. 12 

48. ¼±Åà Æò¹®À» ÀÌ¿ëÇÑ SPA¿¡ ¾ÈÀüÇÑ ºí¶óÀεù ±â¹Ý ¸è½Â ¾Ë°í¸®Áò

    WISC Çмú´ëȸ, 2005. 9 

47. Áß°£°ª ·£´ýÈ­ ¹æ¹ýÀ» ÀÌ¿ëÇÑ Àü·ÂºÐ¼®°ø°Ý ¹æ¾î¹ý

    CISC2005-S, 2005. 7

46. ´ÙÁß°èÃþÅ° °ü¸®¹®Á¦ÀÇ ¾ÏÈ£ÇÐÀû Çعý

    CISC2005-S, 2005. 7

45. ÇعֿþÀÌÆ® ¸ðµ¨ Àü·ÂºÐ¼® °ø°ÝÀ» ÅëÇÑ ARIAºÎä³Î °ø°Ý

    Çѱ¹Á¤º¸º¸È£ÇÐȸ ¿µ³²ÁöºÎ Çмú´ëȸ, 2005. 2

44. ÀÚüÀÎÁõ °ø°³Å°¸¦ ÀÌ¿ëÇÑ È¿À²ÀûÀÎ ÀÓ°èÄ¡ ¼­¸í ±â¹ý,

     Çѱ¹Á¤º¸º¸È£ÇÐȸ Çмú´ëȸ ³í¹®¹ßÇ¥ (CISC2004-W), 2004. 12

43. ½º¸¶Æ® Ä«µå¿¡¼­ÀÇ ARIA ±¸Çö¿¡ ´ëÇÑ Â÷ºÐÀü·ÂºÐ¼®°ø°Ý,

     Çѱ¹Á¤º¸º¸È£ÇÐȸ Çмú´ëȸ ³í¹®¹ßÇ¥ (CISC2004-W), 2004. 12

    * ¿ì¼ö³í¹®»ó ¼ö»ó

42. ºñ¹Ð Å° ·£´ýÈ­ ¹æ¹ý¿¡ ÀÇÇÑ Àü·ÂºÐ¼®°ø°Ý ¹æ¾î´ëÃ¥,

    Çѱ¹Á¤º¸º¸È£ÇÐȸ Çмú´ëȸ ³í¹®¹ßÇ¥ (CISC2004-W), 2004. 12

41. Ÿ¿ø°î¼±¾ÏÈ£½Ã½ºÅÛ¿¡ ´ëÇÑ Àü·ÂºÐ¼® °ø°Ý ¹× ¹æ¾î ¾Ë°í¸®µë,

    Çѱ¹ µðÁöÅÐÄÁÅÙÃ÷ ÇÐȸ Çмú´ëȸ ³í¹®¹ßÇ¥ DCS2004, 2004. 12

40. ºÎä³Î °ø°Ý

    Á¦1ȸ Â÷¼¼´ë ¾ÏÈ£±â¼ú ¿öÅ©¼¥ ³í¹®¹ßÇ¥, 2004. 10

39. Á¤º¸º¸È£Àü°ø ÀÎÅϽ±¿¡ °üÇÑ ¿¬±¸

    Á¤º¸º¸È£ ±³À° ¿öÅ©¼¥(WISE2004), Vol 3. No 1, pp. 231-250, Çѱ¹Á¤º¸º¸È£ÇÐȸ

38. A CRT-Based RSA System resistant to physical cryptanalysis

    ITRC Forum 2004, .407-415, 2004. 6

37. An efficient algorithm for simultaneous elliptic

    curve scalar multiplication,  Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÇмú´ëȸ, Vol. 13,  No. 1,

     pp.412-416 , 2003.12

36. SEED¿¡ ´ëÇÑ ¿À·ù ºÐ¼® °ø°Ý

    Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÇмú´ëȸ, Vol. 13,  No. 1,

     pp.39-44, 2003.12

35. ¿ø°ÝÁö Á¤º¸º¸È£ ±³À° È°¼ºÈ­¹æ¾È, Á¤º¸º¸È£±³À°¿öÅ©¼¥

    (WISE2003)³í¹®Áý, pp. 195-216, 2003. 6

34. Smart Card Security and Stream Cipher for Mobile Terminal Devices

    ITRC Forum 2003, 2003. 6

33. ½º¸¶Æ® Ä«µå¿¡¼­ÀÇ DPA °ø°Ý¿¡ ´ëÇÑ ¾ÈÀü¼º Æò°¡ ±âÁØ Á¦¾È

    Çѱ¹Á¤º¸º¸È£ÇÐȸ ¿µ³²ÁöºÎÇмú´ëȸ ³í¹®Áý,

     Vol. 4,  No. 1, pp. 115-122, 2003. 2

32. Àü·ÂºÐ¼®°ø°Ý¿¡ ´ëÀÀÇϴ Ÿ¿ø°î¼±¿¡¼­ÀÇ ½ºÄ®¶ó °ö¼À

    Çѱ¹µðÁöÅÐ ÄÜÅÙÃ÷ ÇÐȸ Ãß°è Çмú´ëȸ, Vol. 2,  No. 1,

    pp.234-237, 2002.12

31. Ÿ¿ø°î¼± ¾ÏÈ£½Ã½ºÅÛ¿¡¼­ ·£´ý ºÐÇÒ »ó¼ö¹è¸¦ ÀÌ¿ëÇÑ Àü·Â°ø°ÝÀÇ ´ëÀÀ¹æ¹ý

    Çѱ¹Á¤º¸º¸È£ÇÐȸ Á¾ÇÕÇмú´ëȸ, Vol. 12,  No. 1,

    pp. 580-583, 2002.11

30. ½º¸¶Æ® Ä«µåÀÇ MESD °ø°Ý¿¡ ´ëÇÑ ½ÇÇèÀû ºÐ¼®

    Çѱ¹Á¤º¸º¸È£ÇÐȸ Á¾ÇÕÇмú´ëȸ, Vol. 12,  No. 1,

    pp. 575-579, 2002.11

29. À̵¿ ¹× ¹«¼± ³×Æ®¿öÅ© º¸¾È ±â¼ú

    NETSEC-KR 2002,  COEX, 2002. 5

28. ¹«¼± ÀÎÅÍ³Ý º¸¾È ¸ÞÄ«´ÏÁò

    ITRC Forum 2002,  ¼­¿ï±³À°¹®È­È¸°ü, 2002. 5

27. ºÎä³Î ¿À·ù °ø°Ý¿¡ ´ëÀÀÇÏ´Â CRT ±â¹Ý  RSA ½Ã½ºÅÛ

    ITRC Forum 2002,  ¼­¿ï±³À°¹®È­È¸°ü, 2002. 5

26. ¸è½Â ¾Ë°í¸®µëÀÇ µ¥ÀÌÅÍ º¯È­¸¦ ÀÌ¿ëÇÑ ½º¸¶Æ® Ä«µåÀÇ Â÷ºÐ Àü·ÂºÐ¼® °ø°Ý

    Á¦12ȸ Åë½ÅÁ¤º¸ÇÕµ¿Çмú´ëȸ(JCCI 2002), Vol. 12, No.1 pp. IV A.1.1-4, 2002. 4

25. ºÎä³Î ¿À·ù °ø°Ý¿¡ ´ëÀÀÇÏ´Â CRT ±â¹Ý  RSA ½Ã½ºÅÛ

    Çѱ¹Á¤º¸º¸È£ÇÐȸ ¿µ³²ÁöºÎ Çмú´ëȸ, Vol. 3,  No. 1,

     pp. 114-122, 2002. 2

24. NAF¸¦ »ç¿ëÇϴ Ÿ¿ø°î¼±¾ÏÈ£ ½Ã½ºÅÛ¿¡¼­ÀÇ Â÷ºÐ Àü·ÂºÐ¼®°ø°Ý

    Çѱ¹Á¤º¸º¸È£ÇÐȸ ¿µ³²ÁöºÎ Çмú´ëȸ, Vol. 3,  No. 1,

     pp. 114-122, 2002. 2

 23. µ¥ÀÌÅÍ »óÅ õÀ̸¦ ÀÌ¿ëÇÑ  S/Nºñ¸¦ Çâ»ó½ÃŲ DPA °ø°Ý

     Çѱ¹Á¤º¸º¸È£ÇÐȸ Á¾ÇÕÇмú´ëȸ, Vol. 11,  No. 1,

     pp. 127-131, 2001.11

22. ·£´ý¿¬»ê ¹æ¹ýÀ» ÀÌ¿ëÇÑ Å¸¿ø°î¼±¾ÏÈ£½Ã½ºÅÛ¿¡¼­ÀÇ Àü·ÂºÐ¼® °ø°Ý ´ëó ¹æ¾È

    Çѱ¹Á¤º¸º¸È£ÇÐȸ ÃæûÁöºÎ Çмú´ëȸ, Vol. 4, No. 1,

    pp. 13-26, 2001.11   

21. ºÐÇÒ °¡´ÉÇÑ Ä³¸® ÀúÀåÇü µ¡¼À±â¸¦ »ç¿ëÇÑ ¸ðµâ¶ó °ö¼ÀÀåÄ¡

    IRTC  Forum-2001,  pp. D3-9~12, 2001.5

20. Á¤º¸º¸È£¿ë ¿¬»êȸ·Î °³¹ß

    IRTC  Forum-2001,  pp. D3-5, 2001.5   

19. Montgomery °ö¼À ±â¹ÝÀÇ ¸ðµâ¶ó ¸è½Â±â ±¸Á¶

     Åë½ÅÁ¤º¸º¸È£ÇÐȸ Á¾ÇÕÇмú´ëȸ, Vol. 10,  No. 1,

     pp. 561-572, 2000.11

18. È¿À²ÀûÀÎ ¸ðµâ¶ó ¸è½Â±â ¼³°è¿¡ °üÇÑ ¿¬±¸

     Åë½ÅÁ¤º¸º¸È£ÇÐȸ ÃæûÁöºÎ Çмú´ëȸ, Vol. 3, No. 1,

      pp. 419-430, 2000.11

17. ¹Ýº¹ÀûÀÎ °¡»êÀ» ÀÌ¿ëÇÑ ÀûÀÀÀûÀÎ ¸ðµâ¶ó °ö¼À±â

     Á¦ 3ȸ °³¹æÇü º¸¾È±â¼ú°ú Á¤º¸º¸È£ ÀÀ¿ë ¿öÅ©¼¥,

     Vol. 3,  No. 1, pp. 189-203, 2000. 4,

16. ´ÙÁ¤µµ CSA¸¦ ÀÌ¿ëÇÑ °í¼Ó ¸ðµâ¶ó °ö¼À±â

     Åë½ÅÁ¤º¸º¸È£ÇÐȸ Á¾ÇÕÇмú´ëȸ, Vol. 9,  No. 1,

     pp. 541-552, 99.11

15. Á¤º¸º¸È£ ÀåÄ¡¿ë ¸ðµâ¶ó °ö¼À±â ¼³°è

     Åë½ÅÁ¤º¸º¸È£ÇÐȸ ÃæûÁöºÎ Çмú´ëȸ, Vol. 2, No. 1,

     pp. 137-147, 99.10

14. À̵¿ Åë½Å ÀÎÁõ ±â¼ú°ú Ç¥Áص¿Çâ,

     Á¤º¸º¸¾È ±â¼ú ¿öÅ©¼¥, Vol. 5, No. 1, pp. 325-342, 99.8

13. Montgomery ¸ðµâ¶ó °ö¼À±âÀÇ Á¦¾È

     Åë½ÅÁ¤º¸ÇÕµ¿Çмú´ëȸ ³í¹®Áý, Vol. 9, No. 1, pp. 371-375,

     ´ëÇÑÅë½ÅÇÐȸ, 99.4

12. Ÿ¿ø °î¼± ¾ÏÈ£½Ã½ºÅÛÀ» À§ÇÑ ½ºÄ®¶ó °ö¼À ¾Ë°í¸®µë  ±¸Çö°ú ºÐ¼®

    Åë½ÅÁ¤º¸ÇÕµ¿Çмú´ëȸ ³í¹®Áý, Vol. 8, No. 1, pp. 332-336,

    ´ëÇÑÀüÀÚ°øÇÐȸ, 98.4

11. °í¼Ó ¸è½ÂÀ» À§ÇÑ ¸ðµâ¶ó °ö¼À±â ȸ·Î ¼³°è

    Åë½ÅÁ¤º¸º¸È£ÇÐȸÇмú´ëȸ ³í¹®Áý, Vol. 7, No. 1,

    pp. 222-231, Åë½ÅÁ¤º¸º¸È£ÇÐȸ, 97.11

10. IEEE º¸¾È Ç¥ÁØÈ­ µ¿Ç⠺м®

    Á¤º¸º¸¾È±â¼ú Ç¥ÁØÈ­ ¿öÅ©˜Þ ³í¹®Áý, Vol. 3, No. 1,

    pp. 665-673, Çѱ¹»ê¾÷Ç¥ÁØ¿ø, 97.9

9. °í¼Ó ¸è½ÂÀ» À§ÇÑ Montgomery ¾Ë°í¸®µëÀÇ º¯Çü ¹× Àû¿ë

    Åë½ÅÁ¤º¸ÇÕµ¿Çмú´ëȸ ³í¹®Áý, Vol. 7, No. 1, pp. 49-53,

    Á¤º¸°úÇÐȸ, 97.4

8. °í¼Ó ¸è½ÂÀ» À§ÇÑ ¸ðµâ¶ó °¨¼Ò ¾Ë°í¸®µë

    ºÎÈ£ ¹× Á¤º¸ÀÌ·Ð ¿öÅ©˜Þ ³í¹®Áý, Vol. 1, No. 1,

    pp. 83-89, Åë½ÅÇÐȸ, 96.12

7. SMÀ» »ç¿ëÇÑ ICÄ«µåÀÇ ÀÎÁõ ¹× ¼­¸í ÇÁ·ÎÅäÄÝ

    Åë½ÅÁ¤º¸º¸È£ÇÐȸ Çмú´ëȸ ³í¹®Áý, Vol. 6, No. 1,

    pp. 374-382, Åë½ÅÁ¤º¸º¸È£ÇÐȸ 96.11

6. Montgomery ¾Ë°í¸®µëÀ» ÀÌ¿ëÇÑ »õ·Î¿î °ö¼À¹æ½Ä

   Åë½ÅÁ¤º¸º¸È£ÇÐȸÇмú´ëȸ ³í¹®Áý, Vol. 6, No. 1,

   pp. 160-164, Åë½ÅÁ¤º¸º¸È£ÇÐȸ, 96.11

5. °í¼Ó ¸è½ÂÀ» À§ÇÑ »õ·Î¿î ¸ðµâ¶ó °¨¼Ò ¾Ë°í¸®µë

   Åë½ÅÁ¤º¸º¸È£ÇÐȸÇмú´ëȸ ³í¹®Áý, Vol. 6, No. 1,

   pp. 151-159, Åë½ÅÁ¤º¸º¸È£ÇÐȸ, 96.11

4. ÀÎÁõ,¼­¸í ¹× Å°ºÐ¹è¸¦ ÅëÇÕÇÏ´Â °³ÀÎÁ¤º¸¿¡ ±âÃÊÇÑ ¾ÏÈ£½Ã½ºÅÛ

   Åë½ÅÁ¤º¸ÇÕµ¿Çмú´ëȸ ³í¹®Áý, Vol. 6, No. 1,

   pp. 66-70, Åë½ÅÁ¤º¸º¸È£ÇÐȸ, 96.4

 3. °³ÀÎÁ¤º¸¿¡ ±âÃÊÇÑ ÀÎÁõ, ¼­¸í ¹× Å° ºÐ¹è ÅëÇÕ ½Ã½ºÅÛ

   Åë½ÅÁ¤º¸º¸È£ÇÐȸÇмú´ëȸ ³í¹®Áý, Vol. 5, No. 1,

   pp. 275-287, Åë½ÅÁ¤º¸º¸È£ÇÐȸ, 95.11

2. Àú¼Ó CELP À½¼º ºÎȣȭ ¹æ½ÄÀÇ °è»ê·® °¨¼Ò¿¡ °üÇÑ ¿¬±¸

   Åë½ÅÁ¤º¸ÇÕµ¿Çмú´ëȸ ³í¹®Áý, Vol. 5, No. 1, pp. 466-469,

   Åë½ÅÇÐȸ, 95.4

1. µðÁöÅ» À½¼º º¸È£½Ã½ºÅÛÀÇ ±¸Çö

    ½Åȣó¸®ÇÕµ¿Çмú´ëȸ ³í¹®Áý, Vol. 6, No. 1, pp. 54-57,

    ½Åȣó¸®ÇÐȸ, 93.9

 

¡Ü Àú ¼­  |¡ã|

8. µðÁöÅÐ ³í¸®È¸·Î, Çö¿ì»ç, 2021. 3(°³Á¤ÆÇ)

7. (C·Î ¹è¿ì´Â) ¾ÏÈ£ÇÐ ÇÁ·Î±×·¡¹Ö, ¹Ì·¡ÄÄ, 2009. 2, 2018. 2(°³Á¤ÆÇ, Çö¿ì»ç)

6. (½Ç¹«·Î ¹è¿ì´Â) ³×Æ®¿öÅ© º¸¾È, ¹Ì·¡ÄÄ, 2008. 8

5. ÇÙ½É C ¾ð¾î ¹× ½Ç½À, 21¼¼±â»ç 2003. 2, 2008. 2(°³Á¤ÆÇ, ¹Ì·¡ÄÄ)

4. »ýÈ°¼ÓÀÇ ÄÄÇ»ÅÍ, 21¼¼±â»ç, 2002. 3

3. ÃֽŠµðÁöÅÐ ³í¸®È¸·Î, ¿µÁø¼­°ü, 2000, 3, 2008. 2(°³Á¤ÆÇ, Çö¿ì»ç)

2. Windows'95¿Í ÇѱÛ'97, ¿µÁø¼­°ü, 99.3

1. ÇÑ±Û Excel'97°ú Power Point'97, ¿µÁø¼­°ü, 98.8