
{"id":233,"date":"2015-09-20T12:11:26","date_gmt":"2015-09-20T03:11:26","guid":{"rendered":"http:\/\/164.125.70.63\/itrc\/?p=233"},"modified":"2025-12-23T19:51:10","modified_gmt":"2025-12-23T10:51:10","slug":"%ec%b6%95-%ed%99%94%ec%a0%95%ec%9d%b4%ea%b0%80-ches-2015-%ed%95%99%ed%9a%8c%ed%94%84%eb%9e%91%ec%8a%a4-%ec%83%81%eb%a7%90%eb%a1%9c%ec%97%90%ec%84%9c-%eb%85%bc%eb%ac%b8-%eb%b0%9c%ed%91%9c%eb%a5%bc","status":"publish","type":"post","link":"https:\/\/infosec.pusan.ac.kr\/index.php\/233\/","title":{"rendered":"\ucd95~~ \ud654\uc815\uc774\uac00 CHES 2015 \ud559\ud68c(\ud504\ub791\uc2a4 \uc0c1\ub9d0\ub85c)\uc5d0\uc11c \ub17c\ubb38 \ubc1c\ud45c\ub97c \uc798 \ud588\uc2b5\ub2c8\ub2e4"},"content":{"rendered":"<p>\ucd95~~ \ud654\uc815\uc774\uac00 CHES 2015 \ud559\ud68c(\ud504\ub791\uc2a4 \uc0c1\ub9d0\ub85c)\uc5d0\uc11c \ub17c\ubb38 \ubc1c\ud45c\ub97c \uc131\uacf5\uc801\uc73c\ub85c \uc798 \ud588\uc2b5\ub2c8\ub2e4<\/p>\n<p>CHES(Cryptography Hardware and Embedded System) \ud559\ud68c\ub294 \uad6d\uc81c\uc801\uc73c\ub85c \ub9e4\uc6b0 \uc800\uba85\ud55c \uc554\ud638\/\ubcf4\uc548 \ud559\ud68c\ub85c\uc11c, BK21\uc5d0\uc11c\ub3c4 SCI\uc800\ub110\uae09\uc73c\ub85c \uc778\uc815\uc744 \ud574\uc8fc\ub294 \uc6b0\uc218\ud55c \ud559\ud68c\uc785\ub2c8\ub2e4~~<\/p>\n<p>\ub0b4\ub144\uc5d0\ub294 \ubbf8\uad6d \uc0b0\ud0c0\ubc14\ubc14\ub77c\uc5d0\uc11c \uac1c\ucd5c\ub418\ub294\ub370,\ub0b4\ub144\uc5d0\ub3c4 \ub7a9 \ud559\uc0dd\ub4e4\uc774 \ubcf8 \ud559\ud68c\uc5d0 \ub17c\ubb38\uc774 \ub420 \uc218 \uc788\ub3c4\ub85d \ubc14\ub78d\ub2c8\ub2e4~<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-234 size-large\" src=\"http:\/\/164.125.70.63\/itrc\/wp-content\/uploads\/2017\/06\/CHES-1024x576.jpg\" alt=\"\" width=\"780\" height=\"439\" srcset=\"https:\/\/infosec.pusan.ac.kr\/wp-content\/uploads\/2017\/06\/CHES-1024x576.jpg 1024w, https:\/\/infosec.pusan.ac.kr\/wp-content\/uploads\/2017\/06\/CHES-300x169.jpg 300w, https:\/\/infosec.pusan.ac.kr\/wp-content\/uploads\/2017\/06\/CHES-768x432.jpg 768w, https:\/\/infosec.pusan.ac.kr\/wp-content\/uploads\/2017\/06\/CHES.jpg 1545w\" sizes=\"auto, (max-width: 780px) 100vw, 780px\" \/><\/p>\n<\/p>\n<\/p>\n<\/p>\n<\/p>\n<\/p>\n<\/p>\n<\/p>\n<\/p>\n<\/p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\ucd95~~ \ud654\uc815\uc774\uac00 CHES 2015 \ud559\ud68c(\ud504\ub791\uc2a4 \uc0c1\ub9d0\ub85c)\uc5d0\uc11c \ub17c\ubb38 \ubc1c\ud45c\ub97c \uc131\uacf5\uc801\uc73c\ub85c \uc798 \ud588\uc2b5\ub2c8\ub2e4 CHES(Cryptography Hardware and Embedded System) \ud559\ud68c\ub294 \uad6d\uc81c\uc801\uc73c\ub85c \ub9e4\uc6b0 \uc800\uba85\ud55c \uc554\ud638\/\ubcf4\uc548 \ud559\ud68c\ub85c\uc11c, BK21\uc5d0\uc11c\ub3c4 SCI\uc800\ub110\uae09\uc73c\ub85c \uc778\uc815\uc744 \ud574\uc8fc\ub294 \uc6b0\uc218\ud55c \ud559\ud68c\uc785\ub2c8\ub2e4~~ \ub0b4\ub144\uc5d0\ub294 \ubbf8\uad6d \uc0b0\ud0c0\ubc14\ubc14\ub77c\uc5d0\uc11c \uac1c\ucd5c\ub418\ub294\ub370,\ub0b4\ub144\uc5d0\ub3c4 \ub7a9 \ud559\uc0dd\ub4e4\uc774 \ubcf8 \ud559\ud68c\uc5d0 \ub17c\ubb38\uc774 \ub420 \uc218 \uc788\ub3c4\ub85d \ubc14\ub78d\ub2c8\ub2e4~<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-233","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/posts\/233","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/comments?post=233"}],"version-history":[{"count":3,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/posts\/233\/revisions"}],"predecessor-version":[{"id":9616,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/posts\/233\/revisions\/9616"}],"wp:attachment":[{"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/media?parent=233"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/categories?post=233"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/infosec.pusan.ac.kr\/index.php\/wp-json\/wp\/v2\/tags?post=233"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}