|
Journal
|
2020 |
Improvement on a Masked White-Box Cryptographic Implementation
Lee Seung Kwang IEEE Access, v.8, pp.90992-91004 |
18 |
원문
|
|
Journal
|
2016 |
Protecting Secret Keys in Networked Devices with Table Encoding Against Power Analysis Attacks
Kim Taesung Journal of High Speed Networks, v.22, no.4, pp.293-307 |
3 |
원문
|
|
Conference
|
2015 |
Improved Differential Cluster Analysis with Power Model
Kim Taesung International Conference on Computers, Communications and Systems (ICCCS) 2015, pp.1-3 |
|
|
|
Conference
|
2014 |
Function Masking: A New Countermeasure Against Side Channel Attack
Kim Taesung International Workshop on Information Security Applications 2014 (LNCS 8909), v.8909, pp.331-342 |
0 |
원문
|
|
Journal
|
2014 |
An Improved Side Channel Attack Using Event Information of Subtraction
Park Jong-Yeon Journal of Network and Computer Applications, v.38, no.1, pp.99-105 |
6 |
원문
|
|
Conference
|
2012 |
An Equidistant Message Power Attack Using Restricted Number of Traces on Reduction Algorithm
Park Jong-Yeon International Conference on Ubiquitous Information Technologies and Applications (CUTE) 2012 (LNEE 214), v.214, pp.315-322 |
0 |
원문
|
|
Journal
|
2012 |
Secure Hardware Implementation of ARIA Based on Adaptive Random Masking Technique
강준기 ETRI Journal, v.34, no.1, pp.76-86 |
4 |
원문
|
|
Journal
|
2008 |
Performance Enhancement of Differential Power Analysis Attacks With Signal Companding Methods
류정춘 IEEE Signal Processing Letters, v.15, pp.625-628 |
11 |
원문
|
|
Conference
|
2008 |
A 2.4-GHz HBT Power Amplifier Using an On-Chip Transformer as an Output Matching Network
설호석 International Microwave Symposium (IMS) 2008, pp.875-878 |
5 |
원문
|
|
Journal
|
2008 |
Performance Enhancement of Differential Power Analysis Attack with Signal Companding Methods
류정춘 정보보호학회논문지, v.18, no.2, pp.39-47 |
|
|
|
Journal
|
2007 |
Differential Power Analysis on Countermeasures Using Binary Signed Digit Representations
Tae Hyun Kim ETRI Journal, v.29, no.5, pp.619-632 |
3 |
원문
|
|
Conference
|
2005 |
A DPA Countermeasure by Randomized Frobenius Decomposition
Park Tae Jun International Workshop on Information Security Applications (WISA) 2005 (LNCS 3786), v.3786, pp.271-282 |
0 |
|