http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Oh, Yongje,Conte, Matthew,Kang, Seungho,Kim, Jangsuk,Hwang, Jaehoon Cambridge University Press 2017 Radiocarbon Vol.59 No.6
<B>Abstract</B><P>Population growth has been evoked both as a causal factor and consequence of the transition to agriculture. The use of radiocarbon (<SUP>14</SUP>C) dates as proxies for population allows for reevaluations of population as a variable in the transition to agriculture. In Korea, numerous rescue excavations during recent decades have offered a wealth of <SUP>14</SUP>C data for this application. A summed probability distribution (SPD) of <SUP>14</SUP>C dates is investigated to reconstruct population trends preceding and following adoptions of food production in prehistoric Korea. Important cultivars were introduced to Korea in two episodes: millets during the Chulmun Period (ca. 6000-1500 BCE) and rice during the Mumun Period (ca. 1500-300 BCE). The SPD suggests that while millet production had little impact on Chulmun populations, a prominent surge in population appears to have followed the introduction of rice. The case in prehistoric Korea demonstrates that the adoption of food production does not lead inevitably towards sustained population growth. Furthermore, the data suggest that the transition towards intensive agriculture need not occur under conditions of population pressure resulting from population growth. Rather, intensive rice farming in prehistoric Korea began during a period of population stagnation.</P>
모듈라 곱셈의 충돌 입력에 기반한 부채널 공격 및 대응책
최용제(Yongje Choi),최두호(Dooho Choi),하재철(Jaecheol Ha) 한국정보보호학회 2014 정보보호학회논문지 Vol.24 No.6
전력 분석 공격은 물리적 장치에 내장된 암호 알고리듬을 수행할 때 발생하는 부채널 전력 정보를 이용하여 사용자의 비밀 키를 찾아내는 공격 기법이다. 특히, RSA와 같은 공개 키 암호 시스템에 사용되는 멱승은 수백 번의 모듈라 곱셈으로 이루어져 있는데 이 연산이 전력 분석 공격의 목표가 되어 왔다. 최근에는 동일한 입력을 가지는 두 개의 모듈라 곱셈에서 발생한 전력의 상관 분석을 통해 비밀 키를 추출하는 공격이 제안되었다. 본 논문에서는 모듈라 곱셈의 입력 충돌에 기반한 부채널 공격의 원리를 살펴보고 정규화 특성을 갖는 멱승 알고리듬에 대한 취약성을 분석하였다. 또한, 충돌 입력쌍을 이용한 상관 전력 분석 공격을 포함한 기존 부채널 공격에 대응할 수 있는 효율적인 멱승 방법을 제안하고 안전성을 비교 분석하였다. The power analysis attack is a cryptanalytic technique to retrieve an user"s secret key using the side-channel power leakage occurred during the execution of cryptographic algorithm embedded on a physical device. Especially, many power analysis attacks have targeted on an exponentiation algorithm which is composed of hundreds of squarings and multiplications and adopted in public key cryptosystem such as RSA. Recently, a new correlation power attack, which is tried when two modular multiplications have a same input, is proposed in order to recover secret key. In this paper, after reviewing the principle of side-channel attack based on input collisions in modular multiplications, we analyze the vulnerability of some exponentiation algorithms having regularity property. Furthermore, we present an improved exponentiation countermeasure to resist against the input collision-based CPA(Correlation Power Analysis) attack and existing side channel attacks and compare its security with other countermeasures.
Shin, Yongje,Yoo, Changho,Moon, Youngtaek,Lee, Yunho,Hong, Sungwoo Wiley-VCH 2015 Chemistry - An Asian Journal Vol.10 No.4
<P>Frutinone???A, a biologically active ingredient of an antimicrobial herbal extract, demonstrates potent inhibitory activity towards the CYP1A2 enzyme. A three-step total synthesis of frutinone???A with an overall yield of 44???% is presented. The construction of the chromone-annelated coumarin core was achieved through palladium-catalyzed C전?H carbonylation of 2-phenolchromones. The straightforward synthetic route allowed facile substitutions around the frutinone???A core and thus rapid exploration of the structure-activity relationship (SAR) profile of the derivatives. The inhibitory activity of the synthesized frutinone???A derivatives were determined for CYP1A2, and ten compounds exhibited one-to-two digit nanomolar inhibitory activity towards the CYP1A2 enzyme.</P>