본문 바로가기 메뉴바로가기

Papers

Total Posts 341
121

[SCIE]Algebraic Fault Analysis of UOV and Rainbow with the Leakage of Random Vinegar Values

Namhun Koo,심경아 | IEEE Transactions on Information Forensics and Security | 2020

A public-key cryptographic algorithm based on multivariate quadratic equations is one of promising post-quantum alternatives for current public-key cryptography. The security of multivariate quadratic schemes has been sufficiently analyzed mathematically, but few works have been devoted to implementation attacks. In this paper, we present algebraic fault analysis of two well-known multivariate quadratic schemes, UOV and Rainbow, which combines fault attacks with key recovery attacks using good keys. We focus on fault attacks which cause faults on random Vinegar values used in signing.

More

120

[SCIE]An Efficient MQ-Signature Scheme based on Sparse Polynomials

Namhun Koo,박철민,심경아 | IEEE Access | 2020

Multivariate quadratic (MQ) equations-based cryptography is one of the most promising alternatives for currently used public-key cryptographic algorithms in the post-quantum era.

More

119

[SCIE]A Hidden Markov Model Characterizing Fish Escape in Response to a Bird Attack

Seungwoo Sim,이상희 | Journal of the Korean Physical Society | 2020

A fish school scatters rapidly when it encounters a predator and then returns to schooling once the predator passed by.

More

118

[비SCIE]초음파 B-모드 영상에서 FCN(fully convolutional network) 모델을 이용한 간 섬유화 단계 분류 알고리즘 (A Fully Convolutional Network Model for Classifying Liver Fibrosis Stages from Ultrasound B-mode Images)

Jeong Eun Lee,Sun Kyung You,강성호,안치영 | Journal of biomedical Engineering Research (의공학회지) | 2020

In this paper, we deal with a liver fibrosis classification problem using ultrasound B-mode images.

More

117

[SCIE]ASYMPTOTIC BEHAVIOR OF A SECOND-ORDER SWARM SPHERE MODEL AND ITS KINETIC LIMIT

김도현 | Kinetic and Related Models | 2020

We study the asymptotic behavior of a second-order swarm model on the unit sphere in both particle and kinetic regimes for the identical cases.

More

116

[SCIE]EMERGENT DYNAMICS OF AN ORIENTATION FLOCKING MODEL FOR MULTI-AGENT SYSTEM

Jaeseung Lee,SEUNG-YEAL HA,Se Eun Noh,김도현 | DISCRETE AND CONTINUOUS DYNAMICAL SYSTEMS | 2020

We study the orientation flocking for the deterministic counterpart of a stochastic agent-based model introduced by Degond, Frouvelle and Merino-Aceituno in 2017

More

115

[SCIE]Exploring the effect of the installation position of bait station on bait spreading in termite colonies: Simulation study

Sang-Bin Lee,이상희 | Ecological Informatics | 2020

Subterranean termites cause serious damage to wooden structures and manmade structures on the ground.

More

114

[비SCIE]Automatic three-dimensional cephalometric annotation system using three-dimensional convolutional neural networks: a developmental trial

Hak-jin Kim,Jin Keun Seo,Sang-Hwy Lee,강성호,전기완 | Computer Methods in Biomechanics and Biomedical Engineering: Imaging and Visualization | 2020

Automatic annotation for three-dimensional (3D) cephalometric analysis has been limited by computational complexity and computing performance.

More

113

[SCIE]Emergent dynamics of the Lohe matrix ensemble on a network under time-delayed interactions

Doheon Kim,Hansol Park,Seung-Yeal Ha,Woojoo Shim,김도현 | Journal of Mathematical Physics | 2020

We study emergent dynamics of the Lohe matrix model on the unitary group in the presence of several external factors.

More

112

[SCIE]Forgery Attacks on Two Provably Secure Certificateless Signature Scheme

심경아 | Information Sciences | 2020

Recently, Hashimoto and Ogata proposed a constant-size certificateless aggregate signature scheme based on bilinear pairings. Karati et al. constructed a new certificateless signature scheme without bilinear pairings. The schemes were proven secure against both Type I and Type II adversaries in the random oracle model under the hardness assumptions of the Elliptic Curve discrete logarithm problem and the Computational Diffie?Hellman problem. In this paper, we first show that Hashimoto and Ogata is insecure against a Super-Type I adversary who knows the user secret key associated to the replaced public key and suggest its improvement to prevent our attack.

More