Digital Library


Search: "[ author: Ok Yeon Yi ]" (5)
    Side-channel Attack on the Final Round SHA-3 Candidate Skein
    Ae Sun Park , Jong Yeon Park , Dong Guk Han , Ok Yeon Yi The KIPS Transactions:PartC, Vol. 19, No. 3, pp. 179-184, Jun. 2012
    10.3745/KIPSTC.2012.19.3.179


    Efficient Masking Method to Protect SEED Against Power Analysis Attack
    Young In Cho , Hee Seok Kim , Doo Ho Choi , Dong Guk Han , Seok Hie Hong , Ok Yeon Yi The KIPS Transactions:PartC, Vol. 17, No. 3, pp. 233-242, Jun. 2010
    10.3745/KIPSTC.2010.17.3.233


    A Method of Statistical Randomness Test for Key Derivation Functions
    Ju Sung Kang , Ok Yeon Yi , Ji Sun Youm , Jin Woong Cho The KIPS Transactions:PartC, Vol. 17, No. 1, pp. 47-60, Feb. 2010
    10.3745/KIPSTC.2010.17.1.47


    On the Privacy Preserving Mining Association Rules by using Randomization
    Ju Sung Kang , Sung Hoon Cho , Ok Yeon Yi , Do Won Hong The KIPS Transactions:PartC, Vol. 14, No. 5, pp. 439-452, Aug. 2007
    10.3745/KIPSTC.2007.14.5.439


    Validation Testing Tool for Light-Weight Stream Ciphers
    Ju Sung Kang , Hyun Koo Shin , Ok Yeon Yi , Do Won Hong The KIPS Transactions:PartC, Vol. 12, No. 4, pp. 495-502, Aug. 2005
    10.3745/KIPSTC.2005.12.4.495