Digital Library[ Search Result ]
Search : "[ author: Ok Yeon Yi ]" (5)
Side-channel Attack on the Final Round SHA-3 Candidate Skein
Ae Sun Park Jong Yeon Park Dong Guk Han Ok Yeon Yi
Vol. 19, No. 3, pp. 179-184, Jun. 2012
10.3745/KIPSTC.2012.19.3.179
Vol. 19, No. 3, pp. 179-184, Jun. 2012
10.3745/KIPSTC.2012.19.3.179
Efficient Masking Method to Protect SEED Against Power Analysis Attack
Young In Cho Hee Seok Kim Doo Ho Choi Dong Guk Han Seok Hie Hong
Ok Yeon Yi
Vol. 17, No. 3, pp. 233-242, Jun. 2010
10.3745/KIPSTC.2010.17.3.233
Ok Yeon Yi
Vol. 17, No. 3, pp. 233-242, Jun. 2010
10.3745/KIPSTC.2010.17.3.233
A Method of Statistical Randomness Test for Key Derivation Functions
Ju Sung Kang Ok Yeon Yi Ji Sun Youm Jin Woong Cho
Vol. 17, No. 1, pp. 47-60, Feb. 2010
10.3745/KIPSTC.2010.17.1.47
Vol. 17, No. 1, pp. 47-60, Feb. 2010
10.3745/KIPSTC.2010.17.1.47
On the Privacy Preserving Mining Association Rules by using Randomization
Ju Sung Kang Sung Hoon Cho Ok Yeon Yi Do Won Hong
Vol. 14, No. 5, pp. 439-452, Aug. 2007
10.3745/KIPSTC.2007.14.5.439
Vol. 14, No. 5, pp. 439-452, Aug. 2007
10.3745/KIPSTC.2007.14.5.439
Validation Testing Tool for Light-Weight Stream Ciphers
Ju Sung Kang Hyun Koo Shin Ok Yeon Yi Do Won Hong
Vol. 12, No. 4, pp. 495-502, Aug. 2005
10.3745/KIPSTC.2005.12.4.495
Vol. 12, No. 4, pp. 495-502, Aug. 2005
10.3745/KIPSTC.2005.12.4.495