http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Evaluation of Design Issues and the Social Perceptions of the Asian Culture Complex, South Korea
Seungkwang Shon,Donghwa Shon 대한건축학회 2017 Architectural research Vol.19 No.3
This study aims to understand and analyze the social recognition and debate shown during the progress of the Asian Culture Complex (ACC) public project as well as the environmental evaluation performed by provincial community members. A 30-question survey based on a Likert scale was conducted with 150 experts. The study showed, first, that despite controversies over landmarks and historical locations, the quality of the architect’s first draft was considered fairly high. However, vibrant landmarks were greatly desired. Furthermore, respondents reported conflicting recognitions of the same concept, which were defined differently depending on the terms and concepts used by the architect. Second, historical locations were considered important. The architects’ final design was modified based on quality and in response to social pressure, resulting in the partial retention of the provincial government annex building. Although the first draft was considered to be of high quality, the modified plan was considered even better than the original design, revealing the 2-fold characteristics of the identical phenomenon in the environmental evaluation. Third, many groups held opinions that were balanced between the architects’ originality and the value of community-based recognition; hence, the social inclination and evaluation of the project differed across the public.
Lee, Seungkwang,Kim, Taesung,Kang, Yousung IEEE 2018 IEEE transactions on information forensics and sec Vol.13 No.10
<P>Recently, gray-box attacks on white-box cryptographic implementations have succeeded. These attacks are more efficient than white-box attacks because they can be performed without detailed knowledge of the target implementation. The success of the gray-box attack is reportedly due to the unbalanced encodings used to generate the white-box lookup table. In this paper, we propose a method to protect the gray-box attack against white-box implementations. The basic idea is to apply the masking technique before encoding intermediate values during the white-box lookup table generation. Because we do not require any random source in runtime, it is possible to perform efficient encryption and decryption using our method. The security and performance analysis shows that the proposed method can be a reliable and efficient countermeasure.</P>
One-Bit to Four-Bit Dual Conversion for Security Enhancement against Power Analysis
LEE, Seungkwang,JHO, Nam-Su 'Institute of Electronics, Information and Communi 2016 IEICE transactions on fundamentals of electronics, Vol.ea99 No.10
<P>Power analysis exploits the leaked information gained from cryptographic devices including, but not limited to, power consumption generated during cryptographic operations. If a number of power traces are given to an attacker, it is possible to reveal a cryptographic key efficiently, sometimes within a few minutes, using various statistical methods. In this sense, software countermeasures including higher-order masking or software dual-rail with precharge logic have been proposed to produce randomized or constant power consumption during the key-dependent operations. However, they have critical disadvantages in terms of computational time and security. In this paper, we propose a new solution called 'one-bit to four-bit dual conversion' for enhanced security against power analysis. For an exemplary embodiment of the proposed scheme, we apply it to an AES implementation and demonstrate its security and performance. The overall costs are approximately 148 KB memory space for the lookup tables and about a 3-fold increase in execution time than the straightforward implementation of AES.</P>