Conference
|
2025 |
BrokenSleep: Remote Power Timing Attack Exploiting Processor Idle States
Kang Kidong International Symposium on High Performance Computer Architecture (HPCA) 2025, pp.409-422 |
0 |
원문
|
Conference
|
2025 |
BrokenSleep: Remote Power Timing Attack Exploiting Processor Idle States
김효상 International Symposium on High Performance Computer Architecture (HPCA) 2025, pp.409-422 |
0 |
원문
|
Journal
|
2022 |
Chosen-Ciphertext Clustering Attack on CRYSTALS-KYBER using the Side-Channel Leakage of Barrett Reduction
Boyoun Sim IEEE Internet of Things Journal, v.9, no.21, pp.21382-21397 |
20 |
원문
|
Conference
|
2018 |
A Study of Template Clustering in the Side Channel Template Analysis
Kim Taesung International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.1295-1297 |
1 |
원문
|
Conference
|
2018 |
Free-Space Daylight Quantum Key Distribution without Source Side Channel Effects
Ko Heasin Frontiers in Optics (FiO)/Laser Science ((LS) 2018, pp.1-2 |
0 |
원문
|
Journal
|
2018 |
High-speed and high-performance polarization-based quantum key distribution system without side channel effects caused by multiple lasers
Ko Heasin Photonics Research, v.6, no.3, pp.214-219 |
21 |
원문
|
Conference
|
2017 |
Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors
서화정 International Conference on Information Security and Cryptology (ICISC) 2017, pp.37-50 |
4 |
원문
|
Conference
|
2017 |
Side Channel Attack on Digital Door Lock with Vibration Signal Analysis: Longer Password does not Guarantee Higher Security Level
Youngmok Ha International Conference on Multisensor Fusion and Integration for Intelligent Systems (MFI) 2017, pp.103-110 |
5 |
원문
|
Journal
|
2017 |
Critical Side Channel Effects in Random Bit Generation with Multiple Semiconductor Lasers in a Polarization-based Quantum Key Distribution System
Ko Heasin Optics Express, v.25, no.17, pp.20045-20055 |
18 |
원문
|
Journal
|
2016 |
Protecting Secret Keys in Networked Devices with Table Encoding Against Power Analysis Attacks
Kim Taesung Journal of High Speed Networks, v.22, no.4, pp.293-307 |
3 |
원문
|
Journal
|
2016 |
An Improved Square-Always Exponentiation Resistant to Side-Channel Attacks on RSA Implementation
Choi Yong-Je Intelligent Automation and Soft Computing, v.22, no.3, pp.353-363 |
7 |
원문
|
Journal
|
2016 |
A Secure Exponentiation Algorithm Resistant to a Combined Attack on RSA Implementation
김형동 International Journal of Computer Mathematics, v.93, no.2, pp.258-272 |
11 |
원문
|
Conference
|
2015 |
Improved Differential Cluster Analysis with Power Model
Kim Taesung International Conference on Computers, Communications and Systems (ICCCS) 2015, pp.1-3 |
|
|
Conference
|
2014 |
Implementation of Side Channel Analysis Evaluation Boards for Cryptographic Software of Embedded Systems
Choi Yong-Je International Conference on Computer Science and its Applications (CSA) 2014 (LNEE 330), v.330, pp.343-348 |
1 |
원문
|
Conference
|
2014 |
Function Masking: A New Countermeasure Against Side Channel Attack
Kim Taesung International Workshop on Information Security Applications 2014 (LNCS 8909), v.8909, pp.331-342 |
0 |
원문
|
Journal
|
2014 |
An Improved Side Channel Attack Using Event Information of Subtraction
Park Jong-Yeon Journal of Network and Computer Applications, v.38, no.1, pp.99-105 |
6 |
원문
|
Conference
|
2012 |
An Equidistant Message Power Attack Using Restricted Number of Traces on Reduction Algorithm
Park Jong-Yeon International Conference on Ubiquitous Information Technologies and Applications (CUTE) 2012 (LNEE 214), v.214, pp.315-322 |
0 |
원문
|
Conference
|
2012 |
Privacy-Preserving Cross-User Source-Based Data Deduplication in Cloud Storage
Lee Seung Kwang International Conference on Information and Communication Technology Convergence (ICTC) 2012, pp.329-330 |
33 |
원문
|
Conference
|
2012 |
SCARF: profile-based Side Channel Analysis Resistant Framework
Kim Ju Han International Conference on Security and Management (SAM) 2012, pp.1-6 |
|
|
Conference
|
2012 |
Fast Alignment Method for Side Channel Analysis System
Kim Ju Han International Conference on Electronics, Information, and Communication (ICEIC) 2012, pp.1-2 |
|
|
Journal
|
2009 |
Efficient Key Detection Method in the Correlation Electromagnetic Analysis Using Peak Selection Algorithm
Yousung Kang Journal of Communications and Networks, v.11, no.6, pp.556-563 |
0 |
원문
|
Journal
|
2008 |
Performance Enhancement of Differential Power Analysis Attacks With Signal Companding Methods
류정춘 IEEE Signal Processing Letters, v.15, pp.625-628 |
11 |
원문
|
Journal
|
2008 |
Efficient and Secure Self-Organized Public Key Management for Mobile Ad Hoc Networks
Choi Dae Seon IEICE Transactions on Communications, v.E91-B, no.11, pp.3574-3583 |
1 |
원문
|
Conference
|
2008 |
Center Channel Separation based on Spatial Analysis
Jang Dae Young International Conference on Digital Audio Effects (DAFx-08) 2008, pp.1-4 |
|
|
Journal
|
2008 |
Performance Enhancement of Differential Power Analysis Attack with Signal Companding Methods
류정춘 정보보호학회논문지, v.18, no.2, pp.39-47 |
|
|
Journal
|
2008 |
Power Analysis Attacks and Countermeasures on ηT Pairing Over Binary Fields
김태현 ETRI Journal, v.30, no.1, pp.68-80 |
9 |
원문
|
Journal
|
2007 |
Differential Power Analysis on Countermeasures Using Binary Signed Digit Representations
Tae Hyun Kim ETRI Journal, v.29, no.5, pp.619-632 |
3 |
원문
|
Conference
|
2007 |
SPA Countermeasure Based on Unsigned Left-to-Right Recodings
김성경 International Conference on Autonomic and Trusted Computing (ATC) 2007 (LNCS 4610), v.4610, pp.286-295 |
0 |
원문
|
Conference
|
2006 |
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields
김태현 International Conference on Cryptology and Network Security (CANS) 2006 (LNCS 4301), v.4301, pp.168-181 |
22 |
원문
|