| ±¹Á¦ ³í¹® | ±¹Á¦ Çмú ¹ßÇ¥ | ±¹³» ³í¹® | ±¹³» Çмú ¹ßÇ¥ | Àú¼ |
36. Implementation of Disassembler on Microcontroller Using Side-Channel Power Consumption Leakage,
MDPI Sensors, Sensors, Vol. 22, No. 15, p. 5900, 2022.08
35. Deep Learning-based Attacks on Masked AES Implementation,
Journal of Internet Technology, Vol. 23 No. 4, pp. 897-902, July 2022
34. Performance Metric for Differential Deep Learning Analysis,
Journal of Internet Services and Information Security (JISIS), Vol. 11, No. 2, pp. 22-33, 2021. 05
33. Secure RSA implementation against horizontal correlation power analysis attack
Int. J. Internet Technology and Secured Transactions, 8±Ç, 1È£, pp.62-77, 2018.05
32. An Improved Square-always Exponentiation Resistant to Side-channel Attacks on RSA Implementation
Intelligent Automation & Soft Computing, 22±Ç, 3È£, pp.353-363, 2016.07
31. A secure exponentiation algorithm resistant to a combined attack on RSA implementation
INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 93±Ç, 2È£, pp.258-272, 2016.02
30. An Efficient and Robust Anonymous Authentication Scheme in Global Mobility Networks
International Journal of Security and Its Applications, 9±Ç, 10È£, pp.297-312, 2015.10
29. A fault-resistant implementation of AES using differential bytes between input and output
JOURNAL OF SUPERCOMPUTING, 67±Ç, 3È£, pp.615-634, 2014.03
28. Message Blinding Method Requiring No Multiplicative Inversion for RSA
ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 13±Ç, 4È£, pp.80:1-80:10, 2014.02
27. A new exponentiation algorithm resistant to combined side channel attack,
Journal of Internet Services and Information Security, Vol. 3, No. 3, pp.17-27, 2013.11
26. Some remarks on strong Mori domains,
HOUSTON JOURNAL OF MATHEMATICS, Vol. 38, No. 4, pp. 1051-1059, 2012. 10
25. Differential Fault Analysis by Reducing AES Round, Advances in Information Science and
Service Science(AISS)-SCOPUS, Vol. 4. No. 11, pp. 103-113, 2012. 06
24. Improved Differential Fault Analysis on Block Cipher ARIA, Information Security
Application, LNCS 7690, pp .82-95, 2012.12
23. Differential Fault Analysis for Round-Reduced AES by Fault Injection,
ETRI Journal, Vol. 33, No. 3, pp. 434-442, 2011. 06
22. A New Formal Proof Model for RFID Location Privacy,
ESORICS 2008, LNCS 5283, pp. 267-281, 2008. 10
21. Low-cost and Strong-security RFID Authentication Protocol
EUC 2007, LNCS 4809, pp. 795-807, 2007. 12
20. HGLAP : Hierarchical Group-index based Lightweight Authentication Protocol for
Distributed RFID system EUC 2007, LNCS 4809, pp. 557-567, 2007. 12
19. Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC
WISA 2007, LNCS 4867, pp. 333-344, 2007. 12
18. Security Analysis and Enhancement of One-Way Hash based Low-Cost Authentication
Protocol(OHLCAP) , SSDU 2007, LNCS 4819, pp.574-583, 2007. 9
17. LRMAP: Lightweight and Resynchronous Mutual Authentication Protocol for RFID System,
ICUCT 2006, LNCS
4412, pp. 80-89, 2007. 6
16. A differential power analysis attack of block cipher based on the Hamming weight of
internal operation unit, International Conference on Computational Intelligence and
Security(CIS2006) LNCS 4456, pp. 417-426, 2006. 11
15. Relative Doubling attack against Montgomery Ladder
International Conference on Information Security and Cyptography(ICISC2005),
LNCS 3935, pp. 117-128, 2005. 12
14. Differential Power Analysis on Block Cipher ARIA
High Performance Computing and Communications(HPCC2005) (LNCS 3726),
pp. 541-548, 2005. 9
13. A CRT-Based RSA countermeasure Against Physical Cryptanalysis
High Performance Computing and Communications(HPCC2005) (LNCS 3726),
pp. 549-554, 2005.9
12. Power Analysis by Exploiting Chosen Message and Internal Collisions –
Vulnerability of Checking Mechanism for RSA-Decryption
International Conferenc on Cyptology in Malaysia(Mycrypt) LNCS 3715, pp.183- 195, 2005.
11. Efficient threshold signature scheme based on self-certified public keys,
International Transaction on Computer Science and Engineering, GESTS,
Vol 10, No 1, pp. 97 ~ 108, 2005. 6
10. New key management systems for multilevel security
Computational Science and Its application (ICCSA-2004),
LNCS-3481, pp. 245-253, 2005. 5
9. Improvement on HA-Moon Randomized Exponentiation Algorithm, ICISC 2004,
LNCS -3506, pp. 154-167, Dec., 2004.
8. Side channel cryptanalysis on SEED
International Workshop on Information Security and Applications(WISA-2004),
LNCS-3325, pp.411-424 Aug., 2004.
7. A secure and practical CRT-Based RSA to resist side channel attacks
International Conference on Computational Science and Its Applications (ICCSA-2004),
LNCS 3043, pp. 150-166, May, 2004
6. Permanent Fault Attack on the Parameters of RSA with CRT, Australasian
Conference on Information Security and Privacy(ACISP-2003),
LNCS 2727, pp 285-296, July 9-11, 2003.
5. A Random M-ary Method-Based Countermeasure against Power
Analysis Attacks on ECC, International Conference on Computational
Science and Its Applications (ICCSA-2003), LNCS 2668,
pp. 338-347, May 18 -21, 2003
4. Hardware fault attack on RSA with CRT revited,
The 5th International Conference on Information Security and Cryptology(ICISC-2002),
pp. 390-404, Olympicparktel, Seoul, Nov. 28-29, 2002
3. A WTLS Handshake Protocol for User Anonymity and Forward Secrecy,
The 7th CDMA International Conference, LNCS-2524,pp. 354-358, Shilla Hotel, Seoul,
Oct. 29- Nov., 1 2002,
2. Randomized Signed-Scalar Multiplication of ECC to Resist Power Attacks,
The 4th Workshop on Cryptographic Hardware and Embedded Systems 2002
(CHES 2002), LNCS 2523, pp. 566-583, Hotel Sofitel, San Francisco Bay (Redwood City), USA
August 13 - 15, 2002
1. A Common-multiplicand Method to the Montgomery Algorithm for Speeding Up Exponentiation,
Information Processing Letters(IPL),
Vol.66 No.2 pp.105-107, Elsevier Science, 98.4
22.Fault Injection Attacks Using Clock Glitch Against Deep Neural Networks and Their Countermeasures,
The 7th International Conference on Mobile Internet Security (MobiSec'23), Dec 19-21, 2023
21. Adversarial Patch Attack on Person Detection and Countermeasure Using Input Channel Diversification
The 7th International Conference on Mobile Internet Security (MobiSec'23), Dec 19-21, 2023
20. Enhancing Robustness of Self-Driving Car Regression Models through Feature Squeezing
THE 24th WORLD CONFERENCE ON INFORMATION SECURITY APPLICATIONS (WISA 23), August, 2023
19. Defense Against Adversarial Evasion Attacks on Self-Driving Car Using Image Quantization,
THE 24th WORLD CONFERENCE ON INFORMATION SECURITY APPLICATIONS (WISA 23), August, 2023
18. Secure Deep Neural Network to Counteract against Side-Channel Analysis Attacks
International Conference on Next-generation Convergence Technology (ICNCT2023)
Feb. 2023. *Best Paper Award *
17. Anomaly detection system in vehicle network using ResNet
International Conference on Next-generation Convergence Technology (ICNCT2023), Feb. 2023
16. Instruction-level Disassembler Based on Power Consumption Leakage of IoT devices
The 5th International Symposium on Mobile Internet Security (MobiSec¡¯21), October 7-9, 2021
15. Breaking a Masked AES Implementation Using a Deep Learning-based Attack
ACM International Conference on Intelligent Computing and its Emerging Applications(ICEA'20)
2020 12.
14. Power Analysis Attacks on the Right-to-Left Square-Always Exponentiation Algorithm
6th International Workshop on Managing Insider Security Threats(MIST-2014),
pp. 2014. 11
13. Instruction Fault Attack on the Miller Algorithm in a pairing-Based Cryptosystem
Seventh International Conference on Innovative Mobile and Internet Service in Ubiquitous
Computing, pp. 167-174, 2013. 07
12. A Practical Analysis of Fault Attack Countermeasure on AES using Data Masking
International Conference on Computing and Convergence Technology - ICCCT 2012, pp. 1-7,
2012. 12
11. A Fault-Resistant AES Implementation Using Differential Characteristic of Input and
Output The International Workshop on Managing Insider Security Threats, pp.93-109,
2012.11
10. Differential Fault Analysis by Round Reduction, 6th International Conference on Computer
Sciences and Convergence Information Technology , pp. 607-612, 2011. 11
9. Power Analysis Attack and Countermeasure on the Rabbit Stream Cipher, International
Workshop on Software Engineering for Secure Systems(SESS 2011), pp. 50-56, 2011. 05
8. Fault Resistant CRT-RSA Scheme Adopting a Small Exponent, Computer Sciences and
Convergence Information Technology (ICCIT), pp. 544-549, 2010. 11
7. Fault Attack for the Iterative Operation of AES S-Box, Computer Sciences and Convergence
Information Technology (ICCIT), pp. 550-555, 2010. 11
6. A New Fault Cryptanalysis on Montgomery Ladder Exponentiation Algorithm,
Proceedings of the 2nd International Conference on Interaction Sciences: Information
Technology, Culture and Human pp. 896-899, 2009
5. A New CRT-RSA Scheme Reststant to Power Analysis and Fault Attacks,
ICCIT-08, IEEE-CS, Vol. 2, pp.351-356, 2008. 11
4. Power attack resistant countermeasure using random separation of scalar
multiplication method for ECC, The 7th Joint Workshop on Modern Electronic
Technologies and Applications, Vol. 7, No 1, pp.42-53, 2003.11
3. LM Signcryption and Its Application in WTLS Handshake Protocol for
User Anonymity, The 6th Joint Workshop on Modern Electronic
Technologies and Applications, Vol. 6, No 1, pp. 142-153, 2001.11
2. A Design of Modular Multiplier Based on Multi-precision Carry Save Adder,
Joint Workshop on Information Security and Cryptology
(JW-ISC'2000), Vol. 4, No 1, pp. 45-52, 2000.1
1. A Design of Modular Multiplier based on Systolic Array,
The 4th Joint Workshop on Modern Electronic Technologies and
Applications, Vol. 4, No 1, pp. 145-155, 99.11
113. ºÎä³Î ºÐ¼®À» ÀÌ¿ëÇÑ DNN ±â¹Ý MNIST ºÐ·ù±â °¡ÁßÄ¡ º¹±¸ °ø°Ý ¹× ´ëÀÀÃ¥ ±¸Çö
Çѱ¹Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 33±Ç, 6È£, ppp. 919-928, 2023.12
112. Àû´ëÀû ȸÇÇ °ø°Ý¿¡ ´ëÀÀÇÏ´Â ¾ÈÀüÇÑ ÀÚÀ²ÁÖÇà ÀÚµ¿Â÷ ½Ã½ºÅÛ
Çѱ¹Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 33±Ç, 6È£, pp. 907-917, 2023.12
111. ´ÙÁß ÇÇó µö·¯´× ¸ðµ¨À» ÀÌ¿ëÇÑ ÀüÀÚ±âÆÄ ±â¹ÝÀÇ ¸í·É¾î ¿ª¾î¼Àºí·¯ ±¸Çö
Çѱ¹»êÇбâ¼úÇÐȸ, Á¦ 24±Ç Á¦ 3È£, pp. 24-32, 2023.03
110. ÁØÁöµµ ÇнÀ ¸ðµ¨À» »ç¿ëÇÑ Â÷·® ³»ºÎ ³×Æ®¿öÅ©¿¡¼ÀÇ ÀÌ»ó ¡ÈÄ Å½Áö
Çѱ¹»êÇбâ¼úÇÐȸ, Á¦ 24±Ç Á¦ 2È£, pp. 11-20, 2023.02
109. ½Å¿ø È®ÀÎ °ø°Ý¿¡ ¾ÈÀüÇÑ Å¬¶ó¿ìµå µ¥ÀÌÅÍ Áߺ¹ Á¦°Å ±â¼ú
Çѱ¹»êÇбâ¼úÇÐȸ, Á¦ 24±Ç Á¦ 2È£, pp. 625-634, 2023.02
108. CRYSTALS-Dilithium ´ë»ó ºñÇÁ·ÎÆÄÀϸµ ±â¹Ý Àü·Â ºÐ¼® °ø°Ý ¼º´É °³¼± ¿¬±¸
Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 33±Ç, 1È£, pp.33-43, 2023.2
107. ¾çÀÚ³»¼º¾ÏÈ£ NTRU¿¡ ´ëÇÑ Àü·Â ºÎä³Î °ø°Ý ¹× ´ëÀÀ¹æ¾È
Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 32±Ç, 6È£, pp.1059-1068, 2022.12
106. PQC Ç¥ÁØÈ ¾Ë°í¸®Áò CRYSTALS-KYBER¿¡ ´ëÇÑ ºñÇÁ·ÎÆÄÀϸµ ºÐ¼® °ø°Ý ¹× ´ëÀÀ ¹æ¾È
Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 32±Ç, 6È£, pp.1045-1057, 2022.12
105. ¾çÀÚ ³»¼º ¾ÏÈ£ FALCON¿¡ ´ëÇÑ Â÷ºÐ Àü·Â ºÐ¼® °ø°Ý ¼º´É °³¼±
Çѱ¹»êÇбâ¼úÇÐȸ, Á¦ 23±Ç Á¦ 3È£, pp. 16-24, 2022.03
104. °æ·® ºí·Ï ¾ÏÈ£ ¾Ë°í¸®Áò PIPO¿¡ ´ëÇÑ Å×ÀÌºí ±â¹Ý ¸¶½ºÅ· Àû¿ë ¹× ºÐ¼®
Çѱ¹»êÇбâ¼úÇÐȸ, Á¦ 23±Ç Á¦ 2È£, pp. 161-169, 2022.02
103. ºÎä³Î ºÐ¼®¿¡ °ÀÎÇÑ ºí·Ï ¾ÏÈ£ PIPO ±¸ÇöÀ» À§ÇÑ ºñ¼±Çü ¸¶½ºÅ· ±â¹ý
Çѱ¹»êÇбâ¼úÇÐȸ, Á¦ 23±Ç Á¦ 2È£, pp. 751-759, 2022.02
102. µö·¯´×À» È°¿ëÇÑ »ê¾÷Á¦¾î ½Ã½ºÅÛ¿¡ ´ëÇÑ ÀÌ»ó¡ÈÄ Å½Áö
Çѱ¹»êÇбâ¼úÇÐȸ, Á¦ 23±Ç Á¦ 1È£, pp. 24-32, 2022.01
101. ¿¬¼Ó ¿þÀÌºí¸´ º¯È¯À» »ç¿ëÇÑ ºñÇÁ·ÎÆÄÀϸµ ±â¹Ý Àü·Â ºÐ¼® °ø°Ý
Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 31±Ç, 6È£, pp. 1127-1136, 2021.12
100. Performance Counter Monotor¸¦ ÀÌ¿ëÇÑ ¸Ó½Å·¯´× ±â¹Ý ij½Ã ºÎä³Î °ø°Ý ŽÁö
Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 30±Ç, 6È£, pp.1237-1246, 2020.12
99. ºí·Ï ¾ÏÈ£ ARIA¿¡ ´ëÇÑ Flush+Reload ij½Ã ºÎä³Î °ø°Ý
Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 30±Ç, 6È£, pp.1207-1216, 2020.12
98. CNNÀ» ÀÌ¿ëÇÑ ¼Òºñ Àü·Â ÆÄÇü ±â¹Ý ¸í·É¾î ¼öÁØ ¿ª¾î¼Àºí·¯ ±¸Çö
Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 30±Ç, 4È£, pp.527-536, 2020.08
97. ºí·Ï ¾ÏÈ£ AES¿¡ ´ëÇÑ CNN ±â¹ÝÀÇ Àü·Â ºÐ¼® °ø°Ý
Çѱ¹»êÇбâ¼úÇÐȸ, Á¦ 21±Ç Á¦ 5È£, pp.14-21, 2020.05
96. ºí·Ï ¾ÏÈ£ SM4¿¡ ´ëÇÑ ºÎä³Î °ø°Ý ¹× ¸¶½ºÅ· ±â¹Ý ´ëÀÀ ±â¹ý ºÐ¼®
Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 30±Ç, 1È£, pp.39-49, 2020.02
95. ºí·Ï ¾ÏÈ£ SM4¿¡ ´ëÇÑ ¸Ó½Å·¯´× ±â¹ÝÀÇ ºÎä³Î °ø°Ý
°ø¾÷±â¼ú¿¬±¸ ³í¹®Áö, 38±Ç, 2È£, pp.70-77, 2019.12
94. Multi-Layer Perceptron ±â¹ýÀ» ÀÌ¿ëÇÑ Àü·ÂºÐ¼® °ø°Ý ±¸Çö ¹× ºÐ¼®
Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 29±Ç, 5È£, pp.997-1006, 2019.10
93. ºÎä³Î °ø°Ý¿¡ ´ëÀÀÇÏ´Â °æ·®ºí·Ï ¾ÏÈ£ CHAM ±¸ÇöÀ» À§ÇÑ ¸¶½ºÅ· ±â¹ýÀû¿ë ¹× ºÐ¼®
Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 29±Ç, 4È£, pp.709-718, 2019.08
92. °æ·® ¾ÏÈ£ ¾Ë°í¸®µë CHAM¿¡ ´ëÇÑ ¿À·ù ÁÖÀÔ °ø°Ý
Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 28±Ç, 5È£, pp.1071-1078, 2018.10
91. NTRU ¼¸í ½Ã½ºÅÛ ±¸Çö¿¡ ´ëÇÑ ¿À·ù ÁÖÀÔ °ø°Ý ¹× ´ëÀÀ ¹æ¾È ¿¬±¸
Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 28±Ç, 3È£, pp.551-561, 2018.06
90. ºÎä³Î °ø°Ý ´ëÀÀÀ» À§ÇÑ ¸¶½ºÅ· ±â¹ý¿¡ °üÇÑ ¼º´É ºÐ¼®
È£¼´ëÇб³ °ø¾÷±â¼ú¿¬±¸ ³í¹®Áö, 37±Ç, 1È£, pp.57-63, 2018.06
89. ºÎä³Î °ø°Ý¿¡ ´ëÀÀÇÏ´Â ¸¶½ºÅ· ±â¹ÝÀÇ ºí·Ï ¾ÏÈ£ LEA
Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 27±Ç, 5È£, pp.1023-1032, 2017.10
88. LEA ¾ÏÈ£ ¾Ë°í¸®µë¿¡ ´ëÇÑ ¸¶½ºÅ· ´ëÀÀ ±â¹ý ¿¬±¸
È£¼´ëÇб³ °ø¾÷±â¼ú¿¬±¸ ³í¹®Áö, 36±Ç, 1È£, pp.57-63, 2017.06
87. ¾ÏÈ£¿ë µð¹ÙÀ̽º¿¡ ´ëÇÑ ±¸Çö °ø°Ý¿¡ °ÀÎÇÑ ÀÌÁß ¸è½Â ¾Ë°í¸®µë
º¸¾È°øÇבּ¸³í¹®Áö, 14±Ç, 1È£, pp.43-58, 2017.02
86. Æä¾î¸µ ¿¬»êÀÌ ¾ø´Â ¹«ÀÎÁõ¼ ±â¹ÝÀÇ ÀÎÁõ Å° ÀÏÄ¡ ÇÁ·ÎÅäÄÝ
º¸¾È°øÇבּ¸³í¹®Áö, 13±Ç, 6È£, pp.451-466, 2016.12
85. ½º¸¶Æ® Á¦Á¶ »ê¾÷¿ë ³×Æ®¿öÅ©¿¡ ÀûÇÕÇÑ Snort IDS¿¡¼ÀÇ Àü󸮱⠱¸Çö
Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 26±Ç, 5È£, pp.1313-1322, 2016.10
84. Â÷ºÐ Àü·Â ºÐ¼® °ø°Ý¿¡ ´ëÇÑ Ä³¸® ±â¹Ý ·£´ý ¸®ÄÚµù ¹æ¹ýÀÇ Ãë¾à¼º
Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 26±Ç, 5È£, pp.1099-1103, 2016.10
83. RSA ¾ÏÈ£ ½Ã½ºÅÛÀ» »ç¿ëÇÏ´Â º¸¾È¼º Æò°¡ ´ë»ó Á¦Ç°¿¡ ´ëÇÑ Ãë¾à¼º ºÐ¼® ü°è °³¹ß
È£¼´ëÇб³ °ø¾÷±â¼ú¿¬±¸ ³í¹®Áö, 35±Ç, 1È£, pp.82-90, 2016.06
82. ÀϹæÇâ Àü¼Û ³×Æ®¿öÅ©¿¡¼ÀÇ ¿À·ù Á¦¾î ÇÁ·ÎÅäÄÝ ¹× µ¥ÀÌÅÍ ¾ÏÈ£È ¸ÞÄ¿´ÏÁò
Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 26±Ç, 3È£, pp.613-621, 2016.06
81. Áö¼ö ºÐÇÒ ±â¹ýÀÌ Àû¿ëµÈ RSA ¾Ë°í¸®µë¿¡ ´ëÇÑ Ãæµ¹Àü·ÂºÐ¼® ¾ÈÀü¼º Æò°¡
Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 25±Ç, 5È£, pp.985-991, 2015.10
80. ¹°¸®Àû ±¸Çö °ø°Ý¿¡ ´ëÇÑ ÀÌÁø ¸è½Â ¾Ë°í¸®µëÀÇ ÀúÇ×¼º ºÐ¼®
È£¼´ëÇб³ °ø¾÷±â¼ú¿¬±¸ ³í¹®Áö, 34±Ç, 1È£, pp.101-111, 2015.06
79. ½º¸¶Æ®Ä«µå ±â¹ÝÀÇ ¾ÈÀüÇÏ°í °æ·®ÈµÈ ¸ð¹ÙÀÏ Áö±Þ°áÁ¦ ÇÁ·ÎÅäÄÝ
º¸¾È°øÇבּ¸³í¹®Áö, 12±Ç, 3È£, pp.1-13, 2015.06
78. NFC¿¡ ±â¹ÝÇÑ ¸ð¹ÙÀÏ ÄíÆù ÇÁ·ÎÅäÄÝ¿¡ ´ëÇÑ ¾ÈÀü¼º ºÐ¼® ¹× ´ëÀÀ ¹æ¾È
Çѱ¹»êÇбâ¼úÇÐȸ³í¹®Áö, 16±Ç, 2È£, pp.1388-1397, 2015.02
77. Montgomery Ladder ¸è½Â ¾Ë°í¸®µë¿¡ ´ëÇÑ ÀÔ·Â Ãæµ¹ ±â¹Ý »ê°ü Á¤·ÂºÐ¼® °ø°Ý ¹× ´ëÀÀ¹æ¾È
È£¼´ëÇб³ °ø¾÷±â¼ú ³í¹®Áö, 33±Ç, 2È£, pp.57-66, 2014.12
76. ¸ðµâ¶ó °ö¼ÀÀÇ Ãæµ¹ ÀԷ¿¡ ±â¹ÝÇÑ ºÎä³Î °ø°Ý ¹× ´ëÀÀÃ¥
Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 24±Ç, 6È£, pp.1-12, 2014.12
75. ¼öÆò Ãæµ¹ Àü·Â ºÐ¼® °ø°Ý¿¡ ´ëÀÀÇÏ´Â ¸ðµâ·¯ ¸è½Â ¾Ë°í¸®µë
º¸¾È°øÇבּ¸³í¹®Áö, 11±Ç, 5È£, pp.355-372, 2014.10
74. Square Always ¸è½Â ¾Ë°í¸®µë¿¡ ´ëÇÑ ºÎä³Î °ø°Ý
Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 24±Ç, 3È£, pp.477-489, 2014.06
73. ÀÎÅÍ³Ý ¹ðÅ· ½Ã½ºÅÛÀÇ º¸¾È¿ä±¸»çÇ× ºÐ¼® ¹× º¸È£ÇÁ·ÎÆÄÀÏ °³¹ß
°ø¾÷±â¼ú¿¬±¸ ³í¹®Áö, 33±Ç, 1È£, pp.53-64, 2014.06
72. m-ary ¸è½Â ¿¬»ê¿¡ ´ëÇÑ »õ·Î¿î ´Ü¼ø Àü·Â ºÐ¼® °ø°Ý
Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 24±Ç, 1È£, pp.261-266, 2014.2
71. GOOSE ÇÁ·ÎÅäÄÝ È¯°æ¿¡¼ Snort ±â¹ÝÀÇ Ä§ÀÔ Å½Áö ½Ã½ºÅÛ °³¹ß
Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 23±Ç, 6È£, pp.1-10,2013.12
70. ½º¸¶Æ® Æù¿¡¼ »ç¿ëÇϴ ȸé Àá±Ý ±â´É¿¡ ´ëÇÑ º¸¾È Ãë¾à¼º ºÐ¼®
°ø¾÷±â¼ú¿¬±¸ ³í¹®Áö, 32±Ç, 2È£, pp.1-7,2013.12
69. BNP ¸è½Â ¾Ë°í¸®µë¿¡ ´ëÇÑ ¹«¸®Àû Á¶ÇÕ °ø°Ý ¹× ´ëÀÀÃ¥
Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 23±Ç, 4È£, pp.585-591,2013.08
68. Çϵåµð½ºÅ© µ¥ÀÌÅÍ º¸È£¿ë ¼ÒÇÁÆ®¿þ¾î TrueCrypt¿¡ ´ëÇÑ ¾ÈÀü¼º ºÐ¼®
°ø¾÷±â¼ú¿¬±¸ ³í¹®Áö, 32±Ç, 1È£, pp.43-50,2013.06
67. ºí·Ï ¾ÏÈ£ ARIA¿¡ ´ëÇÑ ¿À·ù ÁÖÀÔ °ø°Ý ´ëÀÀ ¹æ¾È
Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 23±Ç, 3È£, pp.371-381,2013.06
66. ÀÔÃâ·Â Â÷ºÐ Ư¼ºÀ» ÀÌ¿ëÇÑ ¿À·ù ÁÖÀÔ °ø°Ý¿¡ °ÀÎÇÑ AES ±¸Çö ¹æ¾È
Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 22±Ç, 5È£, pp.1-9,2012.10
65. ¹Ýº¹¹® ¿À·ù ÁÖÀÔÀ» ÀÌ¿ëÇÑ °³¼±µÈ Triple DES ¶ó¿îµå Ãà¼Ò °ø°Ý
Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 22±Ç, 4È£, pp.709-717,2012.08
64. OpenSSLÀÇ DLL ÆÄÀϳ»ÀÇ AES ¾ÏÈ£ ¾Ë°í¸®µë¿¡ ´ëÇÑ ¿À·ù ÁÖÀÔ °ø°Ý
°ø¾÷±â¼ú ³í¹®Áö, 31±Ç, 1È£, pp.57-64,2012.06
63. ID ±â¹Ý ¾ÏÈ£ ±â¹ýÀ» ÀÌ¿ëÇÑ SCADA ½Ã½ºÅÛ¿¡¼ ºñ¹Ð Å° °ü¸® ¹× º¹±¸ ¹æ¾È
Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 22±Ç, 3È£, pp.427-438,2012.06
62. AES ¾ÏÈ£ ¾Ë°í¸®µë¿¡ ´ëÇÑ ¹Ýº¹¹® µÞ ¶ó¿îµå Ãà¼Ò °ø°Ý
Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 22±Ç, 3È£, pp.439-445,2012.06
61. µðÁöÅÐ º¹Çձ⿡¼ º¸¾È ¹®¼ °ü¸® Ãë¾àÁ¡ ºÐ¼® ¹× ´ëÀÀ¹æ¾È
Çѱ¹Á¤º¸±â¼úÇÐȸ ³í¹®Áö, 10±Ç, 6È£, pp.133-143,2012.06
60. ¼ÒÇÁÆ®¿þ¾î ±â¹Ý ½ºÆ®¸² ¾ÏÈ£ Salsa20/12¿¡ ´ëÇÑ »ó°üµµ Àü·ÂºÐ¼® °ø°Ý
Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 21±Ç, 5È£, pp.1-12,2011.10
59. ¾ÆÇÉ ÁÂÇ¥¸¦ »ç¿ëÇÏ´Â Æä¾î¸µ ¿¬»êÀÇ Miller ¾Ë°í¸®µë¿¡ ´ëÇÑ È¿°úÀûÀÎ ¿À·ù ÁÖÀÔ °ø°Ý
Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 21±Ç, 3È£, pp.11-25,2011.06
58. ¿ø¹æ°¨½Ã ½Ã½ºÅÛ¿¡¼ Æä¾îÁúÀ» ÀÌ¿ëÇÑ ID±â¹Ý Å° °ü¸® ¹æ½Ä
È£¼´ëÇб³ °ø¾÷±â¼ú¿¬±¸, 30±Ç, 1È£, pp.49-58,2011.06
57. TPM¿¡¼ ¸í·É¾î Àΰ¡¿¡ ´ëÇÑ ¿ÀÇÁ¶óÀÎ »çÀü °ø°Ý°ú ´ëÀÀÃ¥
Çѱ¹»êÇбâ¼úÇÐȸ³í¹®Áö, 12±Ç, 4È£, pp.1876-1883,2011.04
56. ¿À·ù ÁÖÀÔÀ» ÀÌ¿ëÇÑ Triple DES¿¡ ´ëÇÑ ¶ó¿îµå Ãà¼Ò °ø°Ý
Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 21±Ç, 2È£, pp.91-100,2011.04
55. TPM ¸í·É¾î Àΰ¡ ÇÁ·ÎÅäÄÝ¿¡ ´ëÇÑ ³»ºÎÀÚ °ø°Ý Ãë¾àÁ¡ ºÐ¼® ¹× ´ëÀÀÃ¥
Çѱ¹»êÇбâ¼úÇÐȸ³í¹®Áö, 12±Ç, 3È£, pp.1356-1366,2011.03
54. Wi-Fi¸¦ ÀÌ¿ëÇÑ ½º¸¶Æ®Æù¿¡¼ »çÀü °ø°Ý¿¡ ¾ÈÀüÇÑ WPA-PSK ÇÁ·ÎÅäÄÝ
Çѱ¹»êÇбâ¼úÇÐȸ ³í¹®Áö, 13±Ç, 4È£, pp. 1839-1848, 2012.4
53. AES¿¡ ´ëÇÑ ¹Ýº¹¹® ¿À·ù ÁÖÀÔ °ø°Ý
Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 20±Ç, 6È£, pp.59-65,2010.12
52. ¿À·ù ºÐ¼® °ø°Ý¿¡ ´ëÀÀÇÏ´Â È¿À²ÀûÀÎ DSA ¼¸í ±â¹ý
Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 20±Ç, 5È£, pp.49-57,2010.10
51. ¿À·ù ÁÖÀÔÀ» ÀÌ¿ëÇÑ DSA ¼¸í ¾Ë°í¸®Áò °ø°Ý ¹× ´ëÀÀÃ¥
Çѱ¹»êÇбâ¼úÇÐȸ³í¹®Áö, 11±Ç, 8È£, pp.3045-3052,2010.08
50. ¿¬»êÀÚ Á¶ÀÛ°ø°Ý¿¡ ´ëÇÑ CRT-RSA ¾Ë°í¸®µëÀÇ ¾ÈÀü¼º ÀçºÐ¼®
Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 20±Ç, 4È£, pp.155-160,2010.08
49. ¿À·ùÈ®»ê ±â¹ý¿¡ ±â¹ÝÇÑ RSA-CRT ´ëÀÀÃ¥¿¡ ´ëÇÑ ¼±Åà ¸Þ½ÃÁö °ø°Ý
Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 20±Ç, 3È£, pp.135-140,2010.06
48. ÀÌÁß ¸è½Â°ú ¿À·ù È®»ê ±â¹ýÀ» ÀÌ¿ëÇÑ RSA-CRT¿¡¼ÀÇ ¹°¸®Àû °ø°Ý ´ëÀÀ ¹æ¹ý
Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 20±Ç, 2È£, pp.33-41,2010.04
47. Á¤º¸º¸È£¿ë ¾ÏȣĨ¿¡ ´ëÇÑ ÇØÅ· ¹× ´ëÀÀÃ¥
Á¤º¸Ã³¸®ÇÐȸ ÇÐȸÁö, 17±Ç, 2È£, pp.70-78,2010.03
46. RSA ¸è½Â ¾Ë°í¸®ÁòÀÇ Á¦¾î¹®¿¡ ´ëÇÑ¿À·ùÁÖÀÔ °ø°Ý
Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 19±Ç, 6È£, pp.63-70, 2009.12
45. »ç¿ëÀÚ ÀÍ¸í¼ºÀ» Á¦°øÇÏ´Â ½º¸¶Æ®Ä«µå ±â¹Ý ¿ø°Ý ÀÎÁõ ÇÁ·ÎÅäÄÝ
ÀÎÅͳÝÁ¤º¸ÇÐȸ³í¹®Áö, 10±Ç, 6È£, pp.229-239,2009.12
44. Áß°£ ¾ÏÈ£¹® º¹±¸ ¹æ¹ýÀ» ÀÌ¿ëÇÑ AES Â÷ºÐ ¿À·ù °ø°Ý
Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 19±Ç, 5È£, pp.167-174,2009.10
43. ºñÁ¤»ó Àü¿ø Àü¾ÐÀ» ÀÌ¿ëÇÑ RSA ¾ÏÈ£½Ã½ºÅÛÀÇ ½ÇÇèÀû ¿À·ù ÁÖÀÔ °ø°Ý
Á¤º¸º¸È£ÇÐȸ³í¹®Áö, 19±Ç, 5È£, pp.195-200,2009.10
42. Á¦ 3ÀÚ¿¡°Ô »ç¿ëÀÚ ÀÍ¸í¼ºÀ» Á¦°øÇÏ´Â ½º¸¶Æ® Ä«µå±â¹Ý ¿ø°ÝÀÎÁõ ½Ã½ºÅÛ ±¸Çö
Çѱ¹»êÇбâ¼úÇÐȸ³í¹®Áö, 10±Ç, 10È£, pp.2750-2759,2009.10
41. Çؽ¬ ÇÔ¼ö¿¡ ±â¹ÝÇÑ °æ·®ÈµÈ RFID ÀÎÁõ ÇÁ·ÎÅäÄÝ
Çѱ¹Á¤º¸º¸È£ÇÐȸ³í¹®Áö, Á¦19±Ç Á¦ 3È£, pp. 61-72, 2009. 6
40. CRT-RSA ¾ÏÈ£ ½Ã½ºÅÛ¿¡ ´ëÇÑ ±¤ÇÐÀû ¿À·ù ÁÖÀÔ °ø°ÝÀÇ ½ÇÇèÀû ¿¬±¸
Çѱ¹Á¤º¸º¸È£ÇÐȸ³í¹®Áö, Á¦19±Ç Á¦ 3È£, pp. 51-60, 2009. 6
39. ¹«¼±¼¾¼ ³×Æ®¿öÅ©¿¡¼ °æ·®ÈµÈ ÀÎÁõ°ú Å° µ¿ÀÇ ÇÁ·ÎÅäÄÝ
Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ³í¹®Áö, Á¦10±Ç Á¦ 2È£, pp. 41-52, 2009. 4
38. Á¤º¸º¸È£ÀåÄ¡¿¡ ´ëÇÑ ºÎä³Î °ø°Ý µ¿Çâ
Çѱ¹Á¤º¸º¸È£ÇÐȸÇÐȸÁö, Á¦19±Ç Á¦ 2È£, pp. 53-62, 2009, 4
37. °øÇб³À°ÀÎÁõÀ» À§ÇÑ Á¤º¸º¸È£ÇÐ ½ÉÈ ÇÁ·Î±×·¥
Çѱ¹Á¤º¸º¸È£ÇÐȸÇÐȸÁö, Á¦19±Ç Á¦ 1È£, pp. 1-8, 2009. 2
36. RFID ½Ã½ºÅÛ¿¡¼ ű×-DB°£ °æ·®ÈµÈ ÀÎÁõ ¹æ½Ä
È£¼´ëÇб³ °ø¾÷ ±â¼ú ¿¬±¸¼Ò ³í¹®Áö, pp. 71-78, 2008. 12
35. Â÷ºÐ Àü·Â ºÐ¼® °ø°ÝÀ» À§ÇÑ Çâ»óµÇ°í ½ÇÁ¦ÀûÀÎ ½ÅÈ£ Á¤·Ä ¹æ¹ý
Çѱ¹Á¤º¸º¸È£ÇÐȸ³í¹®Áö, Á¦18±Ç Á¦ 5È£, pp. 93-102, 2008. 10
34. ¿À·ù È®»ê ±â¹ýÀ» ÀÌ¿ëÇÑ CRT-RSA ¿À·ù ÁÖÀÔ °ø°Ý ´ëÀÀ ¹æ¾È
Çѱ¹Á¤º¸º¸È£ÇÐȸ ³í¹®Áö Á¦ 18±Ç Á¦ 2È£, pp. 75-83 , 2008. 4
33. °Ë»öÁ¤º¸ »çÀü µ¿±âȸ¦ ÀÌ¿ëÇÑ Àúºñ¿ë RFID ÀÎÁõ¹æ½Ä
Çѱ¹Á¤º¸º¸È£ÇÐȸ ³í¹®Áö 18±Ç Á¦ 1È£, pp. 77-88, 2008. 2
32. º¸È£ÇÁ·ÎÆÄÀÏ °³¹ßÀ» À§ÇÑ º¸Áõµî±Þ »êÁ¤ ±âÁØ¿¡ °üÇÑ ¿¬±¸
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÐȸÁö 17±Ç Á¦ 6È£, pp.57-66, 2007. 12
31. ºñ¹ÐÁ¤º¸ µ¿±âÈ¿¡ ±â¹ÝÇÑ Strong RFID ÀÎÁõ ÇÁ·ÎÅäÄÝ
Çѱ¹Á¤º¸º¸È£ÇÐȸ ³í¹®Áö 17±Ç Á¦ 5È£, pp. 99-109, 2007. 10
30. A Blinding-based Scalar Multiplication Algorithm secure gainst Power Analysis Attacks
Çѱ¹Á¤º¸º¸È£ÇÐȸ ³í¹®Áö 17±Ç Á¦ 3È£, pp. 117-121, 2007. 6
29. »çÀ̵å ä³Î °ø°Ý¿¡ ´ëÇÑ ½º¸¶Æ®Ä«µå ¾ÈÀü¼ºÀÇ ½ÇÇèÀû ºÐ¼®
Á¤º¸º¸È£ÇÐȸ³í¹®Áö 16±Ç Á¦ 4È£, 2006. 8
* 2006³â 2¿ù Çѱ¹Á¤º¸º¸È£ÇÐȸ ¿µ³²ÁöºÎ Çмú´ëȸ ¿ì¼ö³í¹®
28. Àú ¸Þ¸ð¸® ȯ°æ¿¡ ÀûÇÕÇÑ ¸¶½ºÅ· ±â¹ÝÀÇ ARIA ±¸Çö
Çѱ¹Á¤º¸º¸È£ÇÐȸ ³í¹®Áö, 16±Ç Á¦ 3È£, pp. 143-156, 2006. 6
27. ·£´ý ¸¶½ºÅ· ±â¹ýÀ» ÀÌ¿ëÇÑ DPA °ø°Ý¿¡ ¾ÈÀüÇÑ ARIA ±¸Çö
Çѱ¹Á¤º¸º¸È£ÇÐȸ ³í¹®Áö, 16±Ç Á¦ 2È£, pp. 129-139, 2006. 4
26. ºÎä³Î °ø°ÝºÐ¼® ÅøÀ» ÀÌ¿ëÇÑ ¾ÈÀü¼º Æò°¡¿¡ °üÇÑ ¿¬±¸
Áö¼º°úâÁ¶ 9±Ç 1È£ Áý, 2006. 2
25. Modified Priority queuing packet scheduling algorithm
International Digital Contents Conference, Digital Contents Society, 2005. 12
24. Á¤º¸º¸È£¿ë ½Ã½ºÅÛ¿¡ ´ëÇÑ Hybrid ¹°¸®Àû ºÐ¼® °ø°Ý ¹× ¹æ¾î´ëÃ¥
Áö¼º°úâÁ¶ 8±Ç 1È£ Áý, 2005. 2
23. ºí·° ¾ÏÈ£ ARIA¿¡ ´ëÇÑ Â÷ºÐ Àü·ÂºÐ¼® °ø°Ý
Á¤º¸º¸È£ÇÐȸ³í¹®Áö 15±Ç 1È£ 7Áý, 2005. 2
* 2004³â Çѱ¹Á¤º¸º¸È£ÇÐȸ Çмú´ëȸ ¿ì¼ö³í¹®
22. Ÿ¿ø °î¼± ¾ÏÈ£½Ã½ºÅÛ¿¡¼ Àü·ÂºÐ¼®°ø°Ý¿¡ ´ëÀÀÇÏ´Â ºñ¹Ð Å° ·£´ýÈ ¹æ¹ý
Á¤º¸°úÇÐȸ Á¤º¸º¸È£ ¿¬±¸È¸, Vol. 4, No 1, pp. 38-43,2004.4
21. RSA ½Ã½ºÅÛ¿¡¼ºÀÇ Fault ÁÖÀÔ °ø°Ý°ú ±× ´ëÀÀ¹æ¾È
Áö¼º°ú âÁ¶, Vol. 7 No 1. pp. 551-566, ³ª»ç·¿´ëÇб³, 2004. 2
20. »ç¿ëÀÚ ÀÍ¸í¼ºÀ» À§ÇÑ Distributed Signcryption
Çѱ¹Á¤º¸º¸È£ÇÐȸ³í¹®Áö, Á¦ 13È£, Á¦ 4±Ç
pp. 169-176, 2003. 8
* 2003³â Çѱ¹Á¤º¸º¸È£ÇÐȸ ¿µ³²ÁöºÎ Çмú´ëȸ ¿ì¼ö³í¹®
19. ºñ¹Ð Å°¸¦ NAF·Î »ç¿ëÇÏ´Â ¾ÏÈ£½Ã½ºÅÛÀÇ Â÷ºÐÀü·ÂºÐ¼®°ø°Ý
Çѱ¹ÀÎÅͳÝÁ¤º¸ÇÐȸ³í¹®Áö, Á¦ 4È£, Á¦ 3±Ç
pp. 1-8, 2003. 6
18. Folding ±â¹ýÀ» ÀÌ¿ëÇ× Àü·ÂºÐ¼® °ø°Ý¿¡ ´ëÀÀÇÏ´Â °í¼Ó ½ºÄ®¶ó °ö¼À,
Çѱ¹Á¤º¸º¸È£ÇÐȸ³í¹®Áö, Á¦ 13È£, Á¦ 3±Ç
pp. 57-64, 2003. 6
17. Ÿ¿ø°î¼±¾ÏÈ£½Ã½ºÅÛ¿¡¼ ·£´ý m-ary ¹æ¹ýÀ» »ç¿ëÇÑ Àü·ÂºÐ¼® °ø°ÝÀÇ ´ëÀÀ¹æ¾È,
Çѱ¹ Á¤º¸º¸È£ÇÐȸ³í¹®Áö, Á¦ 13È£, Á¦ 3±Ç
pp. 35-44, 2003. 6
16. ´ëÇÐÀÇ Á¤º¸º¸È£ °ü·ÃÇаú ±³À°°úÁ¤ ºÐ¼®°ú ¸ðµ¨ °³¹ß¿¡ °üÇÑ ¿¬±¸,
Çѱ¹ Á¤º¸º¸È£ÇÐȸ³í¹®Áö, Á¦ 13È£, Á¦ 3±Ç
pp. 17-26, 2003. 6
15. ´ëÇпø¿¡¼ÀÇ Á¤º¸º¸È£Àü°ø ±³°ú °úÁ¤¿¡ °üÇÑ °íÂû
Çѱ¹Á¤º¸º¸È£ÇÐȸÇÐȸÁö, Vol, 13, No. 2, pp. 1-14, 2003. 4
14. ±¹³» 4³âÁ¦ ÁÖ¿ä´ëÇÐ Á¤º¸º¸È£ °ü·ÃÇаú ÇкΠ±³À° °úÁ¤ ºñ±³ ºÐ¼® ¿¬±¸
Çѱ¹Á¤º¸º¸È£ÇÐȸÇÐȸÁö, Vol, 13, No. 2, pp. 1-14, 2003. 4
13. Àü·ÂºÐ¼®°ø°Ý¿¡ ´ëÀÀÇÏ´Â ½ºÄ®¶ó °ö¼À ¾Ë°í¸®µëÀÇ °í¼Ó º´·ÄÈ
³ª»ç·¿ ³íÃÑ Vol. 8, No. 1, ³ª»ç·¿´ëÇб³, 2003. 2
12. ECC¿¡¼ÀÇ ºÎ-ä³Î °ø°Ý ´ëó¹æ¾È ¹× Markov chain ºÐ¼®
³ª»ç·¿ ³íÃÑ Vol. 7, No. 1, ³ª»ç·¿´ëÇб³, 2002.2
11. Montgomery °ö¼À±â¸¦ ÀÌ¿ëÇÑ È¿À²ÀûÀÎ ¸ðµâ¶ó ¸è½Â±â ±¸Á¶
Çѱ¹Á¤º¸º¸È£ÇÐȸ ³í¹®Áö, Vol. 11, No. 5,
10. GF(2^m)ü»óÀÇ Å¸¿ø°î¼±À» ÀÌ¿ëÇÑ ¼¸í½Ã½ºÅÛ ±¸Çö
³ª»ç·¿ ³íÃÑ Vol. 6, No. 1, ³ª»ç·¿´ëÇб³, 2001.2
9. ºÐÇÒÇü CSA¸¦ ÀÌ¿ëÇÑ Montgomery °ö¼À±â
Åë½ÅÁ¤º¸º¸È£ÇÐȸ ³í¹®Áö, Vol.10, No.3, pp. 77-84,
Åë½ÅÁ¤º¸º¸È£ÇÐȸ, 2000.9
8. Ÿ¿ø°î¼±¿¡ ±âÃÊÇÑ µðÁöÅÐ ¼¸í ¾Ë°í¸®µëÀÇ ¼ÒÇÁÆ®¿þ¾î ±¸Çö
³ª»ç·¿ ³íÃÑ Vol. 5, No. 1, pp. 467-490,
³ª»ç·¿´ëÇб³, 2000.2
7. ½Ã½ºÅ丯 ¾î·¹À̸¦ ÀÌ¿ëÇÑ Montgomery ¸ðµâ¶ó °ö¼À±â ¼³°è
Åë½ÅÁ¤º¸º¸È£ÇÐȸ ³í¹®Áö, Vol.9, No.1, pp. 135-146,
Åë½ÅÁ¤º¸º¸È£ÇÐȸ,99.3
6. µðÁöÅ» ¼¸í ¾Ë°í¸®µëÀÇ ±¸Çö
³ª»ç·¿ ³íÃÑ Vol. 4, No. 1, pp. 335-356, ³ª»ç·¿´ëÇб³, 99.2
5. °øÅë Çǽ¼ö ¸ðµâ¶ó °ö¼ÀÀ» ÀÌ¿ëÇÑ °í¼Ó ¸è½Â
Á¤º¸°úÇÐȸ ³í¹®Áö(C) Vol. 3, No. 5, pp. 491-497,
Á¤º¸°úÇÐȸ, 97.10
4. Montgomery ¸ðµâ¶ó °ö¼ÀÀ» º¯ÇüÇÑ °í¼Ó ¸è½Â
Åë½ÅÇÐȸ ³í¹®Áö, Vol. 22, No. 5, pp. 1036-1044,
Åë½ÅÇÐȸ, 97.5
3. °³ÀÎÁ¤º¸¿¡ ±âÃÊÇÑ ¼¸í ¹× Å°ºÐ¹è ÅëÇÕ ¾ÏÈ£½Ã½ºÅÛÀÇ Á¦¾È
Åë½ÅÁ¤º¸º¸È£ÇÐȸ ³í¹®Áö, Vol.6, No.3, pp. 57-70,
Åë½ÅÁ¤º¸º¸È£ÇÐȸ,96.9
2. µðÁöÅ» À̵¿Åë½Å ÀÎÁõ ¼ºñ½ºÀÇ ±â¼úµ¿Çâ
TELECOMMUNICATIONS REVIEW, Vol. 6, No. 2, pp. 145-160,
Çѱ¹À̵¿Åë½Å, 96.5
1. °³ÀÎÁ¤º¸¿¡ ±âÃÊÇÑ È¿À²ÀûÀÎ Å° ºÐ¹è ½Ã½ºÅÛÀÇ Á¦¾È
°æºÏ´ë ÀüÀÚ±â¼ú ¿¬±¸Áö, Vol. 17, No. 1, pp. 9-17,
°æºÏ´ëÇб³, 96.1
156. Àû´ëÀû ÆÐÄ¡ °ø°Ý¿¡ ´ëÀÀÇÏ´Â °æÀïÇнÀ ±â¹ÝÀÇ ÀâÀ½ ÁÖÀÔ ±â¹ý
Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÇмú´ëȸ, pp. 194-198. 2024. 12
* ¿ì¼ö³í¹®»ó(Çѱ¹ÀÎÅͳÝÁøÈï¿øÀå»ó) ¼ö»ó
155. ÇÕ¼º°ö ½Å°æ¸Á¿¡¼ Ŭ·° ±Û¸®Ä¡ ¿À·ù ÁÖÀÔÀ» ÀÌ¿ëÇÑ ¿ÀºÐ·ù °ø°Ý
Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÇмú´ëȸ, pp. 603-606. 2024. 12
154. µö·¯´× È°¼ºÈ ÇÔ¼ö Softmax¿¡ ´ëÇÑ ¿À·ù ÁÖÀÔ °ø°Ý ¹× ´ëÀÀÃ¥
±¹Á¦Â÷¼¼´ëÀ¶ÇÕ±â¼úÇÐȸ Ãß°èÀ¶ÇÕÇмú¹ßÇ¥´ëȸ, 2024. 10
* ¿ì¼ö³í¹®»ó(ÇÐȸÀå»ó) ¼ö»ó
153. Áö½Ä Áõ·ù¸¦ ÀÌ¿ëÇÑ °æ·®ÈÇÑ µö·¯´× ±â¹Ý CAN ¹ö½º ÀÌ»ó ŽÁö±â
±¹Á¦Â÷¼¼´ëÀ¶ÇÕ±â¼úÇÐȸ Ãß°èÀ¶ÇÕÇмú¹ßÇ¥´ëȸ, 2024. 10
152. DNN ±¸Á¶ MNIST ºÐ·ù±â¿¡¼ ³»ºÎ °¡ÁßÄ¡ º¹¿ø ºÎä³Î °ø°Ý¿¡ ´ëÇÑ ´ëÀÀÃ¥ ±¸Çö
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÃæûÁöºÎÇмú´ëȸ, 2024. 9
* ¿ì¼ö³í¹®»ó(ETRI ¿øÀå»ó) ¼ö»ó
151. DNN È°¼ºÈ ÇÔ¼ö¿¡ ´ëÇÑ ¿À·ù ÁÖÀÔ °ø°Ý ´ëÀÀÃ¥
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÃæûÁöºÎÇмú´ëȸ, 2024. 9
150. CAN ¹ö½º¿¡¼ 1D ConvolutionÀ» ÀÌ¿ëÇÑ ±â°è ÇнÀ ±â¹Ý ÀÌ»óŽÁö
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÃæûÁöºÎÇмú´ëȸ, 2024. 9
149. ÀÚÀ²ÁÖÇà ÀÚµ¿Â÷¿¡ ´ëÇÑ Àû´ëÀû ȸÇÇ °ø°Ý ¹× ´ëÀÀ ½Ã½ºÅÛ
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp. 166-169, 2023. 6
* ¿ì¼ö³í¹®»ó(Çѱ¹Á¤º¸º¸È£ÇÐȸÀå»ó) ¼ö»ó
148. ½Ã°è¿ ÇÕ¼º°ö ¿ÀÅäÀÎÄÚ´õ¸¦ È°¿ëÇÑ DoS°ø°Ý ŽÁö
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp. 477-480, 2023. 6
147. Siamese Neural Network¸¦ ÅëÇÑ One-Shot Learning À̹ÌÁö ÀÎ½Ä ½Ã½ºÅÛ
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp.449-452. 2023. 6
146. ÀÚÀ²ÁÖÇàÂ÷ ½ºÆ¼¾î¸µ °¢µµ ¿¹Ãø ¸ðµ¨¿¡ ´ëÇÑ Àû´ëÀû °ø°Ý ¹× ´ëÀÀ ºÐ¼®
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp. 170-173. 2023. 6
145. ºÎä³Î ºÐ¼®À» ÀÌ¿ëÇÑ MNIST À̹ÌÁö DNN ºÐ·ù±âÀÇ °¡ÁßÄ¡ º¹¿ø °ø°Ý
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp. 61-64. 2023. 6
* ¿ì¼ö³í¹®»ó(ºÎä³Î Á¤º¸ºÐ¼®°æÁø´ëȸ ÀÎÅͳÝÁøÈï¿øÀå»ó) ¼ö»ó
144. ¾çÀÚ³»¼º¾ÏÈ£ Classic McEliece¿¡ ´ëÇÑ µö·¯´×À» ÀÌ¿ëÇÑ ÇÁ·ÎÆÄÀϸµ °ø°Ý
Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÇмú´ëȸ, pp. 521-524. 2022. 11
* ¿ì¼ö³í¹®»ó(Çѱ¹Á¤º¸º¸È£ÇÐȸÀå»ó) ¼ö»ó
143. ¾çÀÚ ³»¼º ¾ÏÈ£ CRYSTALS-Dilithium¿¡ ´ëÇÑ È¿°úÀûÀÎ ºñÇÁ·ÎÆÄÀϸµ °ø°Ý
Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÇмú´ëȸ, pp. 517-520. 2022. 11
142. Transformer¸¦ ÀÌ¿ëÇÑ ºÎä³Î Á¤º¸ Çؼ® ¹× ¿ª¾î¼Àºí·¯ ¼º´É Çâ»ó
Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÇмú´ëȸ, pp. 373-376, 2022. 11
141. ´ÙÁß ÇÇó ¼±ÅÃÀ» ÅëÇÑ ºÎä³Î ±â¹Ý ¿ª¾î¼Àºí·¯ ¼º´É Çâ»ó
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÃæûÁöºÎÇмú´ëȸ, 2022. 10
* ¿ì¼ö³í¹®»ó(NSR ¼ÒÀå»ó) ¼ö»ó
140. Ŭ¶ó¿ìµå ½ºÅ丮Áö¿¡¼ ¾ÈÀüÇÑ µ¥ÀÌÅÍ Áߺ¹ Á¦°Å ±â¼ú ¿¬±¸ µ¿Çâ
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÃæûÁöºÎÇмú´ëȸ, 2022. 10
139. ºí·ÏüÀÎÀ» È°¿ëÇÑ ÀÚµ¿Â÷ °ü¸® ½Ã½ºÅÛ ±¸Çö
±¹Á¦Â÷¼¼´ëÀ¶ÇÕ±â¼úÇÐȸ Ãß°èÀ¶ÇÕÇмú¹ßÇ¥´ëȸ, 2022. 7
138. Longformer ¹× ALBERT¸¦ ÀÌ¿ëÇÑ ½Ã½ºÅÛ ÀÌ»ó ·Î±× ŽÁö
±¹Á¦Â÷¼¼´ëÀ¶ÇÕ±â¼úÇÐȸ Ãß°èÀ¶ÇÕÇмú¹ßÇ¥´ëȸ, 2022. 7
137. ¾çÀÚ ³»¼º ¾ÏÈ£ CRYSTALS-Kyber¿¡ ´ëÇÑ ºñÇÁ·ÎÆÄÀϸµ ±â¹Ý Àü·Â ºÐ¼® °ø°Ý
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp. 806-811, 2022. 6
136. ¾çÀÚ³»¼º¾ÏÈ£ NTRU¿¡ ´ëÇÑ Àü·Â ºÎä³Î °ø°Ý
Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÇмú´ëȸ, pp. 415-419,, 2022. 6
* ¿ì¼ö³í¹®»ó ¼ö»ó
135. DualBERT¿Í ºÎä³Î Á¤º¸¸¦ ÀÌ¿ëÇÑ ½Ã½ºÅÛ ¹«°á¼º °ËÁõ
Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÇмú´ëȸ, pp. 406-410,, 2022. 6
134. µö·¯´× ±â¹ýÀ» ÀÌ¿ëÇÑ µöÆäÀÌÅ© ŽÁö ½Ã½ºÅÛ ±¸Çö
Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÇмú´ëȸ, pp. 265-269,, 2022. 6
133. ¿Âº¸µå ÀÎÅÍÆäÀ̽º¸¦ È°¿ëÇÑ ¼ÒÇÁÆ®¿þ¾î ±â¹Ý ºÎä³Î Àü·Â ºÐ¼® °ø°Ý
Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÇмú´ëȸ, pp. 265~268, 2021. 11
132. °æ·® ºí·Ï ¾ÏÈ£ PIPO¿¡ ´ëÇÑ ºÎä³Î ºÐ¼® ¹× ¸¶½ºÅ· ´ëÀÀ ±â¹ý
Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÇмú´ëȸ, pp. 539~542, 2021. 11
131. Wav2Vec 2.0 À½¼º ÀÎ½Ä ¸ðµ¨À» »ç¿ëÇÑ µö·¯´× ±â¹ýÀÇ º¸À̽ºÇÇ½Ì °¨Áö
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÃæûÁöºÎÇмú´ëȸ, 2021. 8
130. ¿¬¼Ó ¿þÀÌºí¸´ º¯È¯À» ÀÌ¿ëÇÑ Àü·Â ºÐ¼® °ø°ÝÀÇ ¼º´É Çâ»ó ¹æ¾È
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÃæûÁöºÎÇмú´ëȸ, 2021. 8
* ÃÖ¿ì¼ö³í¹®»ó ¼ö»ó
129. ±â°è¾î ¼öÁØ ºÎä³Î ´©¼³ Á¤º¸ ºÐ¼® ¹× ¿ª¾î¼Àºí·¯ ±¸Çö
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp. 328~332, 2021. 6
128. CUDA ±â¹Ý º´·Ä󸮸¦ ÅëÇÑ »ó°ü Àü·Â ºÐ¼®(CPA)ÀÇ °í¼Ó ±¸Çö
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp. 311~314, 2021. 6
127. ÇعֿþÀÌÆ® ±â¹Ý ÀÌÁø ·¹À̺íÀ» ÀÌ¿ëÇÑ ºñÇÁ·ÎÆÄÀϸµ µö·¯´× ºÎä³Î °ø°Ý
Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÇмú´ëȸ, pp. 570~574, 2020. 11
126. ij½Ã ºÎä³Î °ø°Ý¿¡ ´ëÀÀÇÏ´Â T-Table ¼ÅÇøµ ±â¹Ý AES ±¸Çö
Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÇмú´ëȸ, pp. 579~583, 2020. 11
125. ¸¶ÀÌÅ©·Î ÄÁÆ®·Ñ·¯ ¼Òºñ Àü·Â ±â¹Ý ¸í·É¾î ¼öÁØ ¿ª¾î¼Àºí·¯ ±¸Çö
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp. 649-653, 2020. 7
* ÃÖ¿ì¼ö³í¹®»ó ¼ö»ó
124. ¸Ó½Å·¯´× ±â¹Ý ³×Æ®¿öÅ© Æ®·¡ÇÈ ºÐ¼® ±â¹ý ¼º´É ºñ±³
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp. 404~408, 2020. 6
123. ºí·Ï ¾ÏÈ£¿¡ ´ëÇÑ ºÎä³Î ºÐ¼®¿ë Àü·Â ÆÄÇü µ¥ÀÌÅÍ ¼Â ±¸Ãà
Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÇмú´ëȸ,pp 263~266, 2019.12
122. Áß±¹ Ç¥ÁØ ºí·Ï ¾ÏÈ£ ¾Ë°í¸®Áò SM4¿¡ ´ëÇÑ Àü·Â ºÐ¼® °ø°Ý ¹× ´ëÀÀ ±â¹ý
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÃþûÁöºÎÇмú´ëȸ, ¼¼¼Ç E, 2019. 10
* ³í¹® Àå·Á»ó ¼ö»ó
121. MLP µö·¯´× ±â¹ý¿¡ ±â¹ÝÇÑ Àü·Â ºÐ¼® °ø°Ý ±¸Çö ¹× ºÐ¼®
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp. 75~78, 2019. 6
120. Àü·Â ºÐ¼® °ø°ÝÀ» À§ÇÑ AutoEncoder ±â¹ÝÀÇ È¿À²ÀûÀÎ POI ºÐ¼® ±â¹ý ¿¬±¸
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp.110~113, 2019. 6
119. ºÎä³Î ºÐ¼® °ø°Ý¿¡ ´ëÀÀÇÏ´Â ÃÊ°æ·® ºí·Ï ¾ÏÈ£ CHAM ±¸ÇöÀ» À§ÇÑ Ãà¼Ò ¸¶½ºÅ· ±â¹ý Àû¿ë
Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÇмú´ëȸ, pp. 371~375, 2018.12
* ÃÖ¿ì¼ö³í¹®»ó ¼ö»ó
118. ºÎä³Î ºÐ¼® °ø°Ý¿¡ ´ëÀÀÇÏ´Â SIMON ¾ÏÈ£ ±¸ÇöÀ» À§ÇÑ ¸¶½ºÅ· ±â¹ý Á¦¾È
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp. 291~ 295, 2018. 6
117. °æ·® ºí·Ï ¾ÏÈ£ SPECK¿¡ ´ëÇÑ µ¥ÀÌÅÍ ¸¶½ºÅ· ±â¹ý ¼³°è ¹× ±¸Çö
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp. 281~ 285, 2018. 6
116. ¾ÈÀüÇÑ ½º¸¶Æ®°øÀå ¿¬°è¸¦ À§ÇÑ Å©·Î½º µµ¸ÞÀÎ º¸¾È ¹æ¹ý
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp. 154-161, 2018. 6
115. ÀÚ¹Ù½ºÅ©¸³Æ® ÄÚµå º¸È£¸¦ À§ÇÑ ÄÚµå ³µ¶È ÇÁ·Î±×·¥ ½Ã¹Ä·¹À̼Ç
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÃæûÁöºÎÇмú´ëȸ, pp. 8~11, 2018. 2
114. NTRU ¼¸í ½Ã½ºÅÛ¿¡ ´ëÇÑ ¿À·ù ÁÖÀÔ °ø°Ý µ¿Çâ ¹× ±¸Çö¿¡ °üÇÑ ¿¬±¸
Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÇмú´ëȸ, pp. 300~302, 2017,12
113. ÇüÅ º¸Á¸ ¾ÏÈ£ ¾Ë°í¸®Áò ±¸Çö¿¡ °üÇÑ ¿¬±¸
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, Æ÷½ºÅÍ ¹ßÇ¥, 2017. 6
112. ºÎä³Î ºÐ¼®¿¡ ´ëÀÀÇϱâ À§ÇÑ LEA ¸¶½ºÅ· ¾Ë°í¸®Áò
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp. 7~11, 2017. 6
* ¿ì¼ö³í¹®»ó ¼ö»ó
111. ¼¸í ¹× Å° ÀÏÄ¡ ±â´ÉÀ» Á¦°øÇÏ´Â ¹«ÀÎÁõ¼ ±â¹ÝÀÇ ÅëÇÕ ¾ÏÈ£½Ã½ºÅÛ
Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÇмú´ëȸ, Æ®·¢ E-5, 2016. 12
110. ¼öÆòÃæµ¹ Àü·ÂºÐ¼® °ø°Ý¿¡ ´ëÀÀÇÏ´Â Square- Multiply Ladder ¾Ë°í¸®Áò
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, Æ®·¢ B-1, 2016. 6
* ÃÖ¿ì¼ö ³í¹®»ó ¼ö»ó
109. °¡»óÄ«µå¹øÈ£¸¦ ÀÌ¿ëÇÏ´Â °áÁ¦ ½Ã½ºÅÛÀÇ Ãë¾à¼º ºÐ¼® ¹× °³¼±
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, Æ®·¢ A-6, 2016. 6
108. ÀϹæÇâ Àü¼Ûµ¥ÀÌÅÍ ¾ÏÈ£ ¹× Å° ºÐ¹è ¹æ¹ý
Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÇмú´ëȸ, Æ®·¢ A-2, 2015. 12
* ¿ì¼ö³í¹®»ó ¼ö»ó
107.ÀϹæÇâ ÀÚ·áÀü¼Û Àåºñ¿¡ ´ëÇÑ ±â¼ú ºÐ·ù
Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÇмú´ëȸ, Æ®·¢ A-2, 2015. 12
106. ij½Ã±â¹Ý ºÎä³Î °ø°Ý¿¡ °üÇÑ °íÂû
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÃæûÁöºÎÇмú´ëȸ, pp. 17~23, 2015. 10
105. º¯ÇüµÈ ¼±Åø޽ÃÁö °ø°Ý¿¡ ´ëÇÑ Left-to-RightÇü ÀÌÁø ¸è½Â ¹æ½ÄÀÇ Ãë¾à¼º
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÃæûÁöºÎÇмú´ëȸ, pp. 9~12, 2015. 10
104. ºÒºÐ¸í ¼ú¾î¸¦ ÀÌ¿ëÇÑ °¡»ó¸Ó½Å¿¡¼ÀÇ µ¿Àû ºÐ¼® ȸÇÇ °ø°Ý ±â¹ý
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÃæûÁöºÎÇмú´ëȸ, 2014. 9
103. È帧Á¦¾î ³µ¶È¸¦ ÅëÇÑ Á¤»óÇàÀ§ ±â¹ÝÀÇ µ¿Àû ºÐ¼® ¿ìȸ °ø°Ý
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, Æ®·¢ D-4 2014. 6
102. ħÀÔ Å½Áö ½Ã½ºÅÛ Snort¿¡¼ PE ÆÄÀÏ Å½Áö ¼³°è¿¡ °üÇÑ ¿¬±¸
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp. 71~76, 2013. 12
* ¿ì¼ö ³í¹®»ó ¼ö»ó
101. ½º¸¶Æ® Æù¿¡¼ »ç¿ëÇÏ´Â ÆÄÀÏ ¾ÏÈ£¿ë ¾Û¿¡ ´ëÇÑ Ãë¾à¼º ºÐ¼®
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp.128~133, 2013. 12
100. ´Ü¼ø Àü·Â ºÐ¼® °ø°Ý¿¡ ´ëÇÑ ½º¸¶Æ®Æù¿ë ¸è½Â ¾Ë°í¸®µëÀÇ Ãë¾à¼º,
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÃæûÁöºÎÇмú´ëȸ, pp. 16~20 , 2013. 9
99. °ø°³ ¼ÒÇÁÆ®¿þ¾î Snort¸¦ ÀÌ¿ëÇÑ GOOSE ÇÁ·ÎÅäÄÝ IDS °³¹ß
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp.127~132, 2013. 6
*
¿ì¼ö ³í¹®»ó ¼ö»ó
98. AES¿¡¼ ÀÔÃâ·Â Â÷ºÐ °ª¿¡ ±â¹ÝÇÑ ¿À·ù ÁÖÀÔ°ø°Ý ¹æ¾î ´ëÃ¥
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp.34~38 , 2012. 6
* ¿ì¼ö ³í¹®»ó ¼ö»ó
97. µ¥ÀÌÅÍ ¸¶½ºÅ· ±â¹ýÀ» ÀÌ¿ëÇÑ ¿À·ù ÁÖÀÔ°ø°Ý ¹æ¾î ±â¹ý,
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp.20~24, 2012.6
96. °æ·® ºí·Ï ¾ÏÈ£ HIGHT¿¡ ´ëÇÑ ¿À·ù ÁÖÀÔ °ø°Ý
Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÇмú´ëȸ, pp. 107~111, 2011.12
95. ºí·Ï¾ÏÈ£ HIGHT¿¡ ´ëÇÑ ¿À·ù ÁÖÀÔ °ø°Ý
2011³â Á¤º¸º¸È£ÇÐȸ ÃæûÁöºÎ Çмú¹ßǥȸ, pp. 288~294, 2011.11
94. Triple DES ¿¡ ´ëÇÑ °³¼±µÈ ¶ó¿îµå Ãà¼Ò ¿À·ù ÁÖÀÔ °ø°Ý
2011³â Á¤º¸º¸È£ÇÐȸ ÃæûÁöºÎ Çмú¹ßǥȸ, pp. 278~287, 2011.11
* ¿ì¼ö³í¹®»ó ¼ö»ó
93. OpenSSL µ¿Àû ¶óÀ̺귯¸® ¿À·ù ÁÖÀÔÀ» ÀÌ¿ëÇÑ RSA ¼¸í °ø°Ý
Á¤º¸º¸È£¿Í ¾ÏÈ£¿¡ °üÇÑ Çмú´ëȸ(WISC-2011), pp. 96~106, 2011.09
92. SCADA ½Ã½ºÅÛ¿¡¼ ID-±â¹Ý Å° ºÐ¹è ¹× º¹±¸ ÇÁ·ÎÅäÄÝ
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp. 196~201, 2011.06
* ¿ì¼ö³í¹®»ó ¼ö»ó
91. QR Code¿¡ ´ëÇÑ º¸¾È À§Çù ¹× ´ëÀÀ ¹æ¹ý Á¦¾È
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp. 168~171, 2011.06
90. ¾ÏÈ£¿ë µð¹ÙÀ̽º¿¡ ´ëÇÑ ¹°¸®Àû °ø°Ý À§Ç輺 ¹× ´ëÀÀ ¹æ¾È
Á¦ 9ȸ ±¹¹æ º¡º¸º¸È£ ÄÁÆÛ·±½º, pp. 317~340, 2011.06
89. Rabbit ¾Ë°í¸®µë¿¡ ´ëÇÑ Àü·ÂºÐ¼® °ø°ÝÀÇ ´ëÀÀ ¹æ¹ý
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp. 333~337, 2010.12
88. ¹Ýº¹¹® ¿À·ù ÁÖÀÔÀ» ÀÌ¿ëÇÑ Triple DES Â÷ºÐ ¿À·ù °ø°Ý
Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÇмú´ëȸ, pp. 308~312, 2010.12
87. CRT-RSA ¾ÏÈ£ ½Ã½ºÅÛÀÇ È¿À²ÀûÀÎ ÀÌÁß µ¡¼À üÀÎ ¸è½Â ±¸Á¶¿¡ °üÇÑ ¿¬±¸
Çѱ¹Á¤º¸º¸È£ÇÐȸ Çмú¹ßǥȸ, pp. 3~11, 2010.10
86. TPM ÀÎÁõÇÁ·ÎÅäÄÝÀÇ Ãë¾à¼º ºÐ¼®°ú ´ëÀÀÃ¥
Çѱ¹Á¤º¸º¸È£ÇÐȸ Çмú ¹ßǥȸ, pp. 119~127, 2010.10
85. TPM¿¡¼ ¸í·É¾î ÀÎÁõ ÇÁ·ÎÅäÄÝ¿¡ ´ëÇÑ °ø°Ý ¹× ´ëÀÀ¹æ¹ý
Çѱ¹Á¤º¸º¸È£ÇÐȸ Çмú´ëȸ, pp. 144~154, 2010.10
84. ¹Ýº¹¹®¿¡ ´ëÇÑ ¿À·ù ÁÖÀÔÀ» ÀÌ¿ëÇÑ AES ¾ÏÈ£°ø°Ý
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp. 68~73, 2010.06
83. DSA¿¡ ´ëÇÑ ¿À·ùÁÖÀÔ °ø°Ý ¹× ´ëÀÀÃ¥
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp. 57~60, 2010.06
82. DLP±â¹Ý µðÁöÅÐ ¼¸í¿¡ ´ëÇÑ ¿À·ùÁÖÀÔ °ø°Ý ¹× ´ëÀÀÃ¥
Çѱ¹Á¤º¸º¸È£ÇÐȸ Çмú ¹ßǥȸ, pp. 84~87, 2010.04
81. ³í¸® ÇÔ¼ö¸¦ ÀÌ¿ëÇÑ ¿À·ù ÁÖÀÔ °ø°Ý ´ëÀÀ¹æ¹ý
Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÇмú´ëȸ, pp. 105~119, 2009.12
80. RSA-CRT ¿¡¼ÀÇ ¿À·ù ÁÖÀÔ °ø°Ý ´ëÀÀÃ¥ ºñ±³ ºÐ¼®
Çѱ¹»êÇбâ¼úÇÐȸ Ãß°èÇмú´ëȸ, pp. 449~452, 2009.12
79. ¹°¸®Àû °ø°Ý¿¡ ¾ÈÀüÇÑ ¸è½Â ±â¹ýÀÇ Ãë¾àÁ¡ ºÐ¼® ¹× ´ëÀÀ ¹æ¾È
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÃæûÁöºÎ Çмú´ëȸ, pp. 167~175, 2009.10
78. ¿À·ù °ø°Ý¿¡ ´ëÀÀÇÏ´Â ÀÌÁ߸è½Â ±â¹ýÀÇ Ãë¾àÁ¡ ºÐ¼® ¹× °³¼± ¹æ¾È
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÃæûÁöºÎ Çмú´ëȸ, pp. 160~166, 2009.10
77. Universally composable RFID Anonymous authentication and key-exchange protocols
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp. 384-389, 2009. 6
76. ARIA ºí·Ï ¾ÏÈ£¿¡ ´ëÇÑ Â÷ºÐ¿À·ù ºÐ¼® °ø°Ý
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp. 219-223, 2009. 6
75. ¾ÏÈ£ Áß°£°ª ÃßÃâÀ» ÅëÇÑ AES Â÷ºÐ ¿À·ù °ø°Ý
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp. 190-195, 2009. 6
* ¿ì¼ö³í¹®»ó ¼ö»ó
74. RSA-CRT¿¡ ´ëÇÑ Second-oder ¿À·ù °ø°ÝÀÇ ´ëÀÀÃ¥ ºÐ¼®
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp. 3-8, 2009. 6
73. ÀüÀÚÈÆó Ä«µå ½Ã½ºÅÛÀÇ ÇÁ·ÎÅäÄÝ Ãë¾à¼º ºÐ¼® ¹× ºÎä³Î °ø°Ý
Çѱ¹Á¤º¸º¸È£ÇÐȸ ¿µ³²ÁöºÎ Çмú´ëȸ, pp. 202- 207, 2009. 2
72. ÀÍ¸í¼ºÀ» Á¦°øÇÏ´Â È¿À²ÀûÀÎ ¿ø°Ý »ç¿ëÀÚ ÀÎÁõ ÇÁ·ÎÅäÄÝ
Çѱ¹Á¤º¸º¸È£ÇÐȸ ¿µ³²ÁöºÎ Çмú´ëȸ, pp. 144- 148, 2009. 2
71. ÀÌÁß ¸è½ÂÀ» ÀÌ¿ëÇÑ RSA-CRT¿¡¼ÀÇ È¿À²ÀûÀÎ ¿À·ù °ø°Ý ´ëÀÀ ¹æ¹ý
Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°è Çмú ³í¹® ¹ßǥȸ, pp. 92-98, 2008. 12
70. Montgomery Ladder ¸è½Â ¾Ë°í¸®µë¿¡ ´ëÇÑ ¿À·ù ÁÖÀÔ °ø°Ý
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÃæûÁöºÎ Çмú ³í¹® ¹ßǥȸ, pp. 211-218, 2008. 10
69. ¿¬»ê ¿À·ù °Ë»ç¸¦ ÀÌ¿ëÇÑ ¿À·ù ÁÖÀÔ °ø°Ý ¹æ¾î ¹æ¹ý
Çѱ¹Á¤º¸º¸È£ÇÐȸ Çмú ³í¹® ¹ßǥȸ, pp. 223-226, 2008. 6
68. ¿À·ù ¹× Àü·ÂºÐ¼® °ø°Ý¿¡ °ÀÎÇÑ CRT-RSA ¾ÏÈ£½Ã½ºÅÛ
Çѱ¹Á¤º¸º¸È£ÇÐȸ Çмú ³í¹® ¹ßǥȸ, pp. 350-355, 2008. 6
67. ¼¾¼ ³×Æ®¿öÅ©¿¡¼ È¿À²ÀûÀÎ ÀÎÁõ°ú Å° µ¿ÀÇ ±â¹ý,
Çѱ¹Á¤º¸º¸È£ÇÐȸ Çмú´ëȸ, pp. 65-70, 2008.2
66. RFID¿ë HB ÀÎÁõ ÇÁ·ÎÅäÄÝÀÇ ½Ç¿ëÈ¿¡ °üÇÑ ¿¬±¸,
Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°è Çмú´ëȸ, pp. 59-63, 2007. 12
65. º¸È£ÇÁ·ÎÆÄÀÏ °³¹ßÀ» À§ÇÑ º¸Áõµî±Þ »êÁ¤ ¹æ¹ý¿¡ °üÇÑ ¿¬±¸,
Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°è Çмú´ëȸ, pp. 655-660, 2007. 12
64. ISO/IEC 11770-3 Å° Àü¼Û ÇÁ·ÎÅäÄݸÞÄ¿´ÏÁò 5ÀÇ ¾ÈÀü¼º ºÐ¼®,
Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°è Çмú´ëȸ, pp. 239-243, 2007. 12
63. °æ·®ÈµÈ RFID »óÈ£ÀÎÁõ ÇÁ·ÎÅäÄÝ Á¦¾È
Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°è Çмú´ëȸ, pp. 331-336, 2007. 12
62. CRT-RSA ¿À·ù °ø°Ý¿¡ ´ëÀÀÇÏ´Â ¿À·ù È®»ê ±â¹ý,
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÃæûÁöºÎ Çмú´ëȸ, pp. 81-85, 2007. 10
61. GEN-2 RFID Çü½ÄÀ» ¸¸Á·ÇÏ´Â ÀÎÁõÇÁ·ÎÅäÄÝ¿¡ ´ëÇÑ Ãë¾à¼º ºÐ¼®
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp. 109-113, 2007. 6
60. ºñ¹ÐÁ¤º¸ µ¿±âÈ¿¡ ±â¹ÝÇÑ String RFID ÀÎÁõ ÇÁ·ÎÅäÄÝ
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp. 84-88, 2007. 6 - ¿ì¼ö ³í¹®
* ¿ì¼ö³í¹®»ó ¼ö»ó
59. ºÐ»êȯ°æ¿¡ ÀûÇÕÇÑ Àúºñ¿ë RFID ÀÎÁõ ÇÁ·ÎÅäÄÝ
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp. 78-83, 2007. 6
58. (2,n)-threshold ±â¹ýÀ» ÀÌ¿ëÇÑ ¼¾¼ ³×Æ®¿öÅ© »çÀüÅ° ºÐ¹è ¹æ½Ä
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°èÇмú´ëȸ, pp. 47-51, 2007. 6
57. Á¤º¸º¸È£ÇаúÀÇ ÀÎÅϽ± :È£¼´ë »ç·Ê
Çѱ¹Á¤º¸º¸È£ÇÐȸ Á¤º¸º¸È£±³À°¿öÅ©¼ó, pp. 91-100, 2007. 6
56. º¸°£°ú ÃßÃâ¹æ¹ýÀ» ÀÌ¿ëÇÑ Çâ»óµÈ ºÎä³Î °ø°Ý½ÅÈ£ Á¤·Ä¹ý
Çѱ¹Á¤º¸º¸È£ÇÐȸ ¿µ³²ÁöºÎ Çмú´ëȸ, pp. 215-220. 2007. 2
55. Partial ID¸¦ ÀÌ¿ëÇÑ RFID ÀÎÁõ ÇÁ·ÎÅäÄÝ¿¡ ´ëÇÑ Ãë¾à¼º ºÐ¼®
Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°è Çмú´ëȸ, pp. 217-220. 2006. 12
54. ÀúºÎÇÏ ¹× À絿±â Ư¼ºÀ» °¡Áø ¾ÈÀüÇÑ RFID ÀÎÁõ ÇÁ·ÎÅäÄÝ
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°è Çмú´ëȸ, pp. 563-568. 2006. 6
53. ½º¸¶Æ® Ä«µå¿¡ ´ëÇÑ ÀüÀÚÆÄ ºÐ¼® °ø°Ý
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°è Çмú´ëȸ, pp. 148-152. 2006. 6
52. ´Éµ¿Çü RFID¿¡ ´ëÇÑ Â÷ºÐÀü·Â ÁÖÆļö ºÐ¼® °ø°Ý
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÇÏ°è Çмú´ëȸ, pp. 141-147. 2006. 6
51. ½º¸¶Æ®Ä«µå »çÀ̵å ä³Î °ø°ÝºÐ¼® µµ±¸ °³¹ß
Çѱ¹Á¤º¸º¸È£ÇÐȸ ¿µ³²ÁöºÎ Çмú´ëȸ, pp. 165-169. 2006. 2,
* ¿ì¼ö³í¹®»ó ¼ö»ó
50. USB Token¿¡ ´ëÇÑ ºÎä³Î °ø°Ý µ¿Çâ
CISC2005-W, 2005. 12
49. ½º¸¶Æ®Ä«µå¸¦ ÀÌ¿ëÇÑ È¿À²ÀûÀÎ ¿ø°Ý »ç¿ëÀÚ ÀÎÁõ ½ºÅ´,
CISC2005-W, 2005. 12
48. ¼±Åà Æò¹®À» ÀÌ¿ëÇÑ SPA¿¡ ¾ÈÀüÇÑ ºí¶óÀεù ±â¹Ý ¸è½Â ¾Ë°í¸®Áò
WISC Çмú´ëȸ, 2005. 9
47. Áß°£°ª ·£´ýÈ ¹æ¹ýÀ» ÀÌ¿ëÇÑ Àü·ÂºÐ¼®°ø°Ý ¹æ¾î¹ý
CISC2005-S, 2005. 7
46. ´ÙÁß°èÃþÅ° °ü¸®¹®Á¦ÀÇ ¾ÏÈ£ÇÐÀû Çعý
CISC2005-S, 2005. 7
45. ÇعֿþÀÌÆ® ¸ðµ¨ Àü·ÂºÐ¼® °ø°ÝÀ» ÅëÇÑ ARIAºÎä³Î °ø°Ý
Çѱ¹Á¤º¸º¸È£ÇÐȸ ¿µ³²ÁöºÎ Çмú´ëȸ, 2005. 2
44. ÀÚüÀÎÁõ °ø°³Å°¸¦ ÀÌ¿ëÇÑ È¿À²ÀûÀÎ ÀÓ°èÄ¡ ¼¸í ±â¹ý,
Çѱ¹Á¤º¸º¸È£ÇÐȸ Çмú´ëȸ ³í¹®¹ßÇ¥ (CISC2004-W), 2004. 12
43. ½º¸¶Æ® Ä«µå¿¡¼ÀÇ ARIA ±¸Çö¿¡ ´ëÇÑ Â÷ºÐÀü·ÂºÐ¼®°ø°Ý,
Çѱ¹Á¤º¸º¸È£ÇÐȸ Çмú´ëȸ ³í¹®¹ßÇ¥ (CISC2004-W), 2004. 12
* ¿ì¼ö³í¹®»ó ¼ö»ó
42. ºñ¹Ð Å° ·£´ýÈ ¹æ¹ý¿¡ ÀÇÇÑ Àü·ÂºÐ¼®°ø°Ý ¹æ¾î´ëÃ¥,
Çѱ¹Á¤º¸º¸È£ÇÐȸ Çмú´ëȸ ³í¹®¹ßÇ¥ (CISC2004-W), 2004. 12
41. Ÿ¿ø°î¼±¾ÏÈ£½Ã½ºÅÛ¿¡ ´ëÇÑ Àü·ÂºÐ¼® °ø°Ý ¹× ¹æ¾î ¾Ë°í¸®µë,
Çѱ¹ µðÁöÅÐÄÁÅÙÃ÷ ÇÐȸ Çмú´ëȸ ³í¹®¹ßÇ¥ DCS2004, 2004. 12
40. ºÎä³Î °ø°Ý
Á¦1ȸ Â÷¼¼´ë ¾ÏÈ£±â¼ú ¿öÅ©¼¥ ³í¹®¹ßÇ¥, 2004. 10
39. Á¤º¸º¸È£Àü°ø ÀÎÅϽ±¿¡ °üÇÑ ¿¬±¸
Á¤º¸º¸È£ ±³À° ¿öÅ©¼¥(WISE2004), Vol 3. No 1, pp. 231-250, Çѱ¹Á¤º¸º¸È£ÇÐȸ
38. A CRT-Based RSA System resistant to physical cryptanalysis
ITRC Forum 2004, .407-415, 2004. 6
37. An efficient algorithm for simultaneous elliptic
curve scalar multiplication, Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÇмú´ëȸ, Vol. 13, No. 1,
pp.412-416 , 2003.12
36. SEED¿¡ ´ëÇÑ ¿À·ù ºÐ¼® °ø°Ý
Çѱ¹Á¤º¸º¸È£ÇÐȸ µ¿°èÇмú´ëȸ, Vol. 13, No. 1,
pp.39-44, 2003.12
35. ¿ø°ÝÁö Á¤º¸º¸È£ ±³À° È°¼ºÈ¹æ¾È, Á¤º¸º¸È£±³À°¿öÅ©¼¥
(WISE2003)³í¹®Áý, pp. 195-216, 2003. 6
34. Smart Card Security and Stream Cipher for Mobile Terminal Devices
ITRC Forum 2003, 2003. 6
33. ½º¸¶Æ® Ä«µå¿¡¼ÀÇ DPA °ø°Ý¿¡ ´ëÇÑ ¾ÈÀü¼º Æò°¡ ±âÁØ Á¦¾È
Çѱ¹Á¤º¸º¸È£ÇÐȸ ¿µ³²ÁöºÎÇмú´ëȸ ³í¹®Áý,
Vol. 4, No. 1, pp. 115-122, 2003. 2
32. Àü·ÂºÐ¼®°ø°Ý¿¡ ´ëÀÀÇϴ Ÿ¿ø°î¼±¿¡¼ÀÇ ½ºÄ®¶ó °ö¼À
Çѱ¹µðÁöÅÐ ÄÜÅÙÃ÷ ÇÐȸ Ãß°è Çмú´ëȸ, Vol. 2, No. 1,
pp.234-237, 2002.12
31. Ÿ¿ø°î¼± ¾ÏÈ£½Ã½ºÅÛ¿¡¼ ·£´ý ºÐÇÒ »ó¼ö¹è¸¦ ÀÌ¿ëÇÑ Àü·Â°ø°ÝÀÇ ´ëÀÀ¹æ¹ý
Çѱ¹Á¤º¸º¸È£ÇÐȸ Á¾ÇÕÇмú´ëȸ, Vol. 12, No. 1,
pp. 580-583, 2002.11
30. ½º¸¶Æ® Ä«µåÀÇ MESD °ø°Ý¿¡ ´ëÇÑ ½ÇÇèÀû ºÐ¼®
Çѱ¹Á¤º¸º¸È£ÇÐȸ Á¾ÇÕÇмú´ëȸ, Vol. 12, No. 1,
pp. 575-579, 2002.11
29. À̵¿ ¹× ¹«¼± ³×Æ®¿öÅ© º¸¾È ±â¼ú
NETSEC-KR 2002, COEX, 2002. 5
28. ¹«¼± ÀÎÅÍ³Ý º¸¾È ¸ÞÄ«´ÏÁò
ITRC Forum 2002, ¼¿ï±³À°¹®Èȸ°ü, 2002. 5
27. ºÎä³Î ¿À·ù °ø°Ý¿¡ ´ëÀÀÇÏ´Â CRT ±â¹Ý RSA ½Ã½ºÅÛ
ITRC Forum 2002, ¼¿ï±³À°¹®Èȸ°ü, 2002. 5
26. ¸è½Â ¾Ë°í¸®µëÀÇ µ¥ÀÌÅÍ º¯È¸¦ ÀÌ¿ëÇÑ ½º¸¶Æ® Ä«µåÀÇ Â÷ºÐ Àü·ÂºÐ¼® °ø°Ý
Á¦12ȸ Åë½ÅÁ¤º¸ÇÕµ¿Çмú´ëȸ(JCCI 2002), Vol. 12, No.1 pp. IV A.1.1-4, 2002. 4
25. ºÎä³Î ¿À·ù °ø°Ý¿¡ ´ëÀÀÇÏ´Â CRT ±â¹Ý RSA ½Ã½ºÅÛ
Çѱ¹Á¤º¸º¸È£ÇÐȸ ¿µ³²ÁöºÎ Çмú´ëȸ, Vol. 3, No. 1,
pp. 114-122, 2002. 2
24. NAF¸¦ »ç¿ëÇϴ Ÿ¿ø°î¼±¾ÏÈ£ ½Ã½ºÅÛ¿¡¼ÀÇ Â÷ºÐ Àü·ÂºÐ¼®°ø°Ý
Çѱ¹Á¤º¸º¸È£ÇÐȸ ¿µ³²ÁöºÎ Çмú´ëȸ, Vol. 3, No. 1,
pp. 114-122, 2002. 2
23. µ¥ÀÌÅÍ »óÅ õÀ̸¦ ÀÌ¿ëÇÑ S/Nºñ¸¦ Çâ»ó½ÃŲ DPA °ø°Ý
Çѱ¹Á¤º¸º¸È£ÇÐȸ Á¾ÇÕÇмú´ëȸ, Vol. 11, No. 1,
pp. 127-131, 2001.11
22. ·£´ý¿¬»ê ¹æ¹ýÀ» ÀÌ¿ëÇÑ Å¸¿ø°î¼±¾ÏÈ£½Ã½ºÅÛ¿¡¼ÀÇ Àü·ÂºÐ¼® °ø°Ý ´ëó ¹æ¾È
Çѱ¹Á¤º¸º¸È£ÇÐȸ ÃæûÁöºÎ Çмú´ëȸ, Vol. 4, No. 1,
pp. 13-26, 2001.11
21. ºÐÇÒ °¡´ÉÇÑ Ä³¸® ÀúÀåÇü µ¡¼À±â¸¦ »ç¿ëÇÑ ¸ðµâ¶ó °ö¼ÀÀåÄ¡
IRTC Forum-2001, pp. D3-9~12, 2001.5
20. Á¤º¸º¸È£¿ë ¿¬»êȸ·Î °³¹ß
IRTC Forum-2001, pp. D3-5, 2001.5
19. Montgomery °ö¼À ±â¹ÝÀÇ ¸ðµâ¶ó ¸è½Â±â ±¸Á¶
Åë½ÅÁ¤º¸º¸È£ÇÐȸ Á¾ÇÕÇмú´ëȸ, Vol. 10, No. 1,
pp. 561-572, 2000.11
18. È¿À²ÀûÀÎ ¸ðµâ¶ó ¸è½Â±â ¼³°è¿¡ °üÇÑ ¿¬±¸
Åë½ÅÁ¤º¸º¸È£ÇÐȸ ÃæûÁöºÎ Çмú´ëȸ, Vol. 3, No. 1,
pp. 419-430, 2000.11
17. ¹Ýº¹ÀûÀÎ °¡»êÀ» ÀÌ¿ëÇÑ ÀûÀÀÀûÀÎ ¸ðµâ¶ó °ö¼À±â
Á¦ 3ȸ °³¹æÇü º¸¾È±â¼ú°ú Á¤º¸º¸È£ ÀÀ¿ë ¿öÅ©¼¥,
Vol. 3, No. 1, pp. 189-203, 2000. 4,
16. ´ÙÁ¤µµ CSA¸¦ ÀÌ¿ëÇÑ °í¼Ó ¸ðµâ¶ó °ö¼À±â
Åë½ÅÁ¤º¸º¸È£ÇÐȸ Á¾ÇÕÇмú´ëȸ, Vol. 9, No. 1,
pp. 541-552, 99.11
15. Á¤º¸º¸È£ ÀåÄ¡¿ë ¸ðµâ¶ó °ö¼À±â ¼³°è
Åë½ÅÁ¤º¸º¸È£ÇÐȸ ÃæûÁöºÎ Çмú´ëȸ, Vol. 2, No. 1,
pp. 137-147, 99.10
14. À̵¿ Åë½Å ÀÎÁõ ±â¼ú°ú Ç¥Áص¿Çâ,
Á¤º¸º¸¾È ±â¼ú ¿öÅ©¼¥, Vol. 5, No. 1, pp. 325-342, 99.8
13. Montgomery ¸ðµâ¶ó °ö¼À±âÀÇ Á¦¾È
Åë½ÅÁ¤º¸ÇÕµ¿Çмú´ëȸ ³í¹®Áý, Vol. 9, No. 1, pp. 371-375,
´ëÇÑÅë½ÅÇÐȸ, 99.4
12. Ÿ¿ø °î¼± ¾ÏÈ£½Ã½ºÅÛÀ» À§ÇÑ ½ºÄ®¶ó °ö¼À ¾Ë°í¸®µë ±¸Çö°ú ºÐ¼®
Åë½ÅÁ¤º¸ÇÕµ¿Çмú´ëȸ ³í¹®Áý, Vol. 8, No. 1, pp. 332-336,
´ëÇÑÀüÀÚ°øÇÐȸ, 98.4
11. °í¼Ó ¸è½ÂÀ» À§ÇÑ ¸ðµâ¶ó °ö¼À±â ȸ·Î ¼³°è
Åë½ÅÁ¤º¸º¸È£ÇÐȸÇмú´ëȸ ³í¹®Áý, Vol. 7, No. 1,
pp. 222-231, Åë½ÅÁ¤º¸º¸È£ÇÐȸ, 97.11
10. IEEE º¸¾È Ç¥ÁØÈ µ¿Ç⠺м®
Á¤º¸º¸¾È±â¼ú Ç¥ÁØÈ ¿öÅ©˜Þ ³í¹®Áý, Vol. 3, No. 1,
pp. 665-673, Çѱ¹»ê¾÷Ç¥ÁØ¿ø, 97.9
9. °í¼Ó ¸è½ÂÀ» À§ÇÑ Montgomery ¾Ë°í¸®µëÀÇ º¯Çü ¹× Àû¿ë
Åë½ÅÁ¤º¸ÇÕµ¿Çмú´ëȸ ³í¹®Áý, Vol. 7, No. 1, pp. 49-53,
Á¤º¸°úÇÐȸ, 97.4
8. °í¼Ó ¸è½ÂÀ» À§ÇÑ ¸ðµâ¶ó °¨¼Ò ¾Ë°í¸®µë
ºÎÈ£ ¹× Á¤º¸ÀÌ·Ð ¿öÅ©˜Þ ³í¹®Áý, Vol. 1, No. 1,
pp. 83-89, Åë½ÅÇÐȸ, 96.12
7. SMÀ» »ç¿ëÇÑ ICÄ«µåÀÇ ÀÎÁõ ¹× ¼¸í ÇÁ·ÎÅäÄÝ
Åë½ÅÁ¤º¸º¸È£ÇÐȸ Çмú´ëȸ ³í¹®Áý, Vol. 6, No. 1,
pp. 374-382, Åë½ÅÁ¤º¸º¸È£ÇÐȸ 96.11
6. Montgomery ¾Ë°í¸®µëÀ» ÀÌ¿ëÇÑ »õ·Î¿î °ö¼À¹æ½Ä
Åë½ÅÁ¤º¸º¸È£ÇÐȸÇмú´ëȸ ³í¹®Áý, Vol. 6, No. 1,
pp. 160-164, Åë½ÅÁ¤º¸º¸È£ÇÐȸ,
96.11
5. °í¼Ó ¸è½ÂÀ» À§ÇÑ »õ·Î¿î ¸ðµâ¶ó °¨¼Ò ¾Ë°í¸®µë
Åë½ÅÁ¤º¸º¸È£ÇÐȸÇмú´ëȸ ³í¹®Áý, Vol. 6, No. 1,
pp. 151-159, Åë½ÅÁ¤º¸º¸È£ÇÐȸ, 96.11
4. ÀÎÁõ,¼¸í ¹× Å°ºÐ¹è¸¦ ÅëÇÕÇÏ´Â °³ÀÎÁ¤º¸¿¡ ±âÃÊÇÑ ¾ÏÈ£½Ã½ºÅÛ
Åë½ÅÁ¤º¸ÇÕµ¿Çмú´ëȸ ³í¹®Áý, Vol. 6, No. 1,
pp. 66-70, Åë½ÅÁ¤º¸º¸È£ÇÐȸ, 96.4
3. °³ÀÎÁ¤º¸¿¡ ±âÃÊÇÑ ÀÎÁõ, ¼¸í ¹× Å° ºÐ¹è ÅëÇÕ ½Ã½ºÅÛ
Åë½ÅÁ¤º¸º¸È£ÇÐȸÇмú´ëȸ ³í¹®Áý, Vol. 5, No. 1,
pp. 275-287, Åë½ÅÁ¤º¸º¸È£ÇÐȸ, 95.11
2. Àú¼Ó CELP À½¼º ºÎÈ£È ¹æ½ÄÀÇ °è»ê·® °¨¼Ò¿¡ °üÇÑ ¿¬±¸
Åë½ÅÁ¤º¸ÇÕµ¿Çмú´ëȸ ³í¹®Áý, Vol. 5, No. 1, pp. 466-469,
Åë½ÅÇÐȸ, 95.4
1. µðÁöÅ» À½¼º º¸È£½Ã½ºÅÛÀÇ ±¸Çö
½Åȣó¸®ÇÕµ¿Çмú´ëȸ ³í¹®Áý, Vol. 6, No. 1, pp. 54-57,
½Åȣó¸®ÇÐȸ, 93.9
8. µðÁöÅÐ ³í¸®È¸·Î, Çö¿ì»ç, 2021. 3(°³Á¤ÆÇ)
7. (C·Î ¹è¿ì´Â) ¾ÏÈ£ÇÐ ÇÁ·Î±×·¡¹Ö, ¹Ì·¡ÄÄ, 2009. 2, 2018. 2(°³Á¤ÆÇ, Çö¿ì»ç)
6. (½Ç¹«·Î ¹è¿ì´Â) ³×Æ®¿öÅ© º¸¾È, ¹Ì·¡ÄÄ, 2008. 8
5. ÇÙ½É C ¾ð¾î ¹× ½Ç½À, 21¼¼±â»ç 2003. 2, 2008. 2(°³Á¤ÆÇ, ¹Ì·¡ÄÄ)
4. »ýÈ°¼ÓÀÇ ÄÄÇ»ÅÍ, 21¼¼±â»ç, 2002. 3
3. ÃֽŠµðÁöÅÐ ³í¸®È¸·Î, ¿µÁø¼°ü, 2000, 3, 2008. 2(°³Á¤ÆÇ, Çö¿ì»ç)
2. Windows'95¿Í ÇѱÛ'97, ¿µÁø¼°ü, 99.3
1. ÇÑ±Û Excel'97°ú Power Point'97, ¿µÁø¼°ü, 98.8