http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
정철순 ( Cheul Sun Jung ),구영석 ( Young Seok Koo ) 한국의류산업학회 2014 한국의류산업학회지 Vol.16 No.2
This study examined the correlation between a handle evaluation of cosmetic puff textile and a sensory evaluation. The KES-F system was used to analyze the main mechanical factors for the handle evaluation and a statistical method was used for the sensory evaluation. The results revealed different mechanical properties and handle values of the tested cosmetic puff textiles. A material type and structure of the cosmetic textile affected the handle property of the material which is the most important factor for a cosmetic purpose. Particularly, the physical properties of textile material are likely to be important factors for the sensory property of cosmetic material. In addition, the sensory evaluation also revealed different sensory characteristics of the cosmetic efficiency according to the cosmetic puff textile. No close relationship was observed between the mechanical properties and sensory evaluation on the cosmetic puff textiles. The sensory evaluation of a cosmetic efficiency is not only decided by the physical and mechanical characteristics of the cosmetic textile material. Overall, when using textiles used for the cosmetic purposes, it is important to consider not only the proper mechanical properties of the textiles but also the use and sensory satisfaction. Development and selection of the cosmetic textiles should be focused on both the material function and consumer satisfaction.
오류주입을 이용한 DSA 서명 알고리즘 공격 및 대응책
정철조(Jung, Chul-Jo),오두환(Oh, Doo-Hwan),최두식(Choi, Doo-Sik),김환구(Kim, Hwan-Koo),하재철(Ha, Jae-Cheol) 한국산학기술학회 2010 한국산학기술학회논문지 Vol.11 No.8
국제 표준 디지털 서명 알고리즘인 DSA(Digital Signature Algorithm)는 이산 대수 문제에 기반하여 이론적 안전성을 보장하지만 최근 서명 시스템 구동시 오류가 주입되면 디바이스 내부에 있는 비밀키를 노출시킬 수 있는 물리적 공격이 제시되었다. 본 논문에서는 Bao 등이 제시한 DSA의 비밀키 비트에 오류를 주입하는 오류 공격법을 소개하고, 서명에 사용되는 랜덤 수에 오류를 주입하는 새로운 공격 모델을 제안한다. 또한, 오류 확산 기법을 이용하 여 두 가지 오류주입 공격을 모두 방어할 수 있는 대응책을 제시하고 컴퓨터 시뮬레이션을 통해 그 안전성과 효율성을 검증한다. The international standard signature algorithm DSA has been guaranteed its security based on discrete logarithm problem. Recently, the DSA was known to be vulnerable to some fault analysis attacks in which the secret key stored inside of the device can be extracted by occurring some faults when the device performs signature algorithm. After analyzing an existing fault attack presented by Bao et al., this paper proposed a new fault analysis attack by disturbing the random number. Furthermore, we presented a countermeasure to compute DSA signature that has its immunity in the two types of fault attacks. The security and efficiency of the proposed countermeasure were verified by computer simulations.