Journal
|
2025 |
Effect and Compensation of Polarization-Dependent Loss in Free-Space Reference Frame Independent Quantum Key Distribution
Lim Kyongchun ADVANCED QUANTUM TECHNOLOGIES, v.8, no.3, pp.1-8 |
0 |
원문
|
Journal
|
2023 |
Improvement of the Efficiency of Neural Cryptography-Based Secret Key Exchange Algorithm
Kim Juyoung IEEE Access, v.11, pp.45323-45333 |
2 |
원문
|
Journal
|
2022 |
Chosen-Ciphertext Clustering Attack on CRYSTALS-KYBER using the Side-Channel Leakage of Barrett Reduction
Boyoun Sim IEEE Internet of Things Journal, v.9, no.21, pp.21382-21397 |
20 |
원문
|
Journal
|
2021 |
Table Redundancy Method for Protecting Against Fault Attacks
Lee Seung Kwang IEEE Access, v.9, pp.92214-92223 |
5 |
원문
|
Conference
|
2020 |
De-identification and Restoration Methods for Protecting Privacy in Off-line Documents
Han Jin Hee International Conference on Information and Communication Technology Convergence (ICTC) 2020, pp.1543-1545 |
0 |
원문
|
Journal
|
2020 |
TwinPeaks: An approach for certificateless public key distribution for the internet and internet of things
조은상 Computer Networks, v.175, pp.1-15 |
7 |
원문
|
Journal
|
2020 |
Improvement on a Masked White-Box Cryptographic Implementation
Lee Seung Kwang IEEE Access, v.8, pp.90992-91004 |
16 |
원문
|
Journal
|
2020 |
Wireless Transceiver Aided Run-Time Secret Key Extraction for IoT Device Security
Oh Mi Kyung IEEE Transactions on Consumer Electronics, v.66, no.1, pp.11-21 |
19 |
원문
|
Conference
|
2019 |
Crypto-Protector: Multi-threaded RSA to Prevent EM Attacks
Lee Seung Kwang International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.945-947 |
0 |
원문
|
Conference
|
2019 |
PUF based IoT Device Authentication Scheme
Byoung Koo Kim International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.1460-1462 |
28 |
원문
|
Conference
|
2019 |
Security Enhancement for IoT Device using Physical Unclonable Functions
Yoon Seung Yong International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.1457-1459 |
3 |
원문
|
Journal
|
2019 |
Study on Peak Misdetection Recovery of Key Exchange Protocol using Heartbeat
Kim Juyoung Journal of Supercomputing, v.75, no.6, pp.3288-3301 |
6 |
원문
|
Conference
|
2018 |
A Study of Template Clustering in the Side Channel Template Analysis
Kim Taesung International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.1295-1297 |
1 |
원문
|
Conference
|
2018 |
The Method for Generating a Trust Field in Wireless Distributed Communication Systems
Hwang Hyungu International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.939-942 |
2 |
원문
|
Conference
|
2018 |
A Secret Key Updating Method between Devices for Secure Smart Services
Han Jin Hee International Conference on Information and Communication Technology Convergence (ICTC) 2018, pp.946-948 |
2 |
원문
|
Conference
|
2018 |
False Secret Keys to Disturb Power Analysis
Lee Seung Kwang International Conference on Ubiquitous and Future Networks (ICUFN) 2018, pp.296-298 |
0 |
원문
|
Conference
|
2017 |
Security Consideration of Fuzzy Vault Based on Photoplethysmogram
Kim Juyoung International Conference on Computer Science and its Applications (CSA) 2017, pp.1-7 |
|
|
Conference
|
2017 |
Recovery of Peak Misdetection for IPI-based Key Exchange
Kim Juyoung International Conference on Computer Science and its Applications (CSA) 2017, pp.1-5 |
|
|
Conference
|
2017 |
Balance between Performance and Security in IPI-based Key Schemes using Heartbeats
Kwantae Cho International Conference on Signal Processing Systems (ICSPS) 2017, pp.1-5 |
1 |
원문
|
Conference
|
2017 |
Self-certifying ID based Trustworthy Networking System for IoT Smart Service Domain
Kim Eung Ha International Conference on Information and Communication Technology Convergence (ICTC) 2017, pp.1300-1302 |
7 |
원문
|
Conference
|
2017 |
Efficient Secret Key Delivery Using Heartbeats
Kwantae Cho International Conference on Circuits, Systems, Communications and Computers (CSCC) 2017, pp.1-6 |
4 |
원문
|
Journal
|
2016 |
Protecting Secret Keys in Networked Devices with Table Encoding Against Power Analysis Attacks
Kim Taesung Journal of High Speed Networks, v.22, no.4, pp.293-307 |
3 |
원문
|
Journal
|
2016 |
An Improved Square-Always Exponentiation Resistant to Side-Channel Attacks on RSA Implementation
Choi Yong-Je Intelligent Automation and Soft Computing, v.22, no.3, pp.353-363 |
7 |
원문
|
Journal
|
2015 |
Conditional Re-encoding Method for Cryptanalysis-Resistant White-Box AES
Lee Seung Kwang ETRI Journal, v.37, no.5, pp.1012-1022 |
13 |
원문
|
Journal
|
2015 |
Collusion-Resistant Convertible Ring Signature Schemes
Jung Yeon Hwang Science China - Information Sciences, v.58, no.1, pp.1-16 |
3 |
원문
|
Journal
|
2015 |
Inter-Authentication and Session Key Sharing Procedure for Secure M2M/IoT Environment
박남제 Information : An International Interdisciplinary Journal, v.18, no.1, pp.261-266 |
17 |
|
Journal
|
2014 |
KeyQ: A Dynamic Key Establishment Method Using an RFID Anti-Collision Protocol
Yousung Kang IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, v.E97.A, no.12, pp.2662-2666 |
0 |
원문
|
Journal
|
2014 |
An Enhanced (t,n) Threshold Directed Signature Scheme
Jung Yeon Hwang Information Sciences, v.275, pp.284-292 |
11 |
원문
|
Journal
|
2014 |
Improved Shamir''s CRT-RSA Algorithm: Revisit with the Modulus Chaining Method
Lee Seung Kwang ETRI Journal, v.36, no.3, pp.469-478 |
10 |
원문
|
Conference
|
2012 |
Reversible Data Hiding Without Side Information
유향미 International Instrumentation and Measurement Technology Conference (I2MTC) 2012, pp.1-4 |
|
원문
|
Journal
|
2012 |
Constructing Strong Identity-Based Designated Verifier Signatures with Self-Unverifiability
기주희 ETRI Journal, v.34, no.2, pp.235-244 |
17 |
원문
|
Conference
|
2012 |
Fast Alignment Method for Side Channel Analysis System
Kim Ju Han International Conference on Electronics, Information, and Communication (ICEIC) 2012, pp.1-2 |
|
|
Journal
|
2009 |
Efficient Key Detection Method in the Correlation Electromagnetic Analysis Using Peak Selection Algorithm
Yousung Kang Journal of Communications and Networks, v.11, no.6, pp.556-563 |
0 |
원문
|
Journal
|
2009 |
Counterfactual Quantum Cryptography
Noh Tae-Gon Physical Review Letters, v.103, no.23, pp.1-4 |
149 |
원문
|
Conference
|
2009 |
A New Fault Cryptanalysis on Montgomery Ladder Exponentiation Algorithm
박제훈 International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS) 2009, pp.896-899 |
1 |
원문
|
Journal
|
2009 |
Security Vulnerability of ID-Based Key Sharing Schemes
Jung Yeon Hwang IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, v.E92-A, no.10, pp.2641-2643 |
0 |
원문
|
Journal
|
2008 |
Performance Enhancement of Differential Power Analysis Attacks With Signal Companding Methods
류정춘 IEEE Signal Processing Letters, v.15, pp.625-628 |
11 |
원문
|
Journal
|
2007 |
Differential Power Analysis on Countermeasures Using Binary Signed Digit Representations
Tae Hyun Kim ETRI Journal, v.29, no.5, pp.619-632 |
3 |
원문
|
Conference
|
2007 |
Protecting Secret Keys with Fuzzy Fingerprint Vault Based on a 3D Geometric Hash Table
이성주 International Conference on Adaptive and Natural Computing Algorithms (ICANNGA) 2007 (LNCS 4432), v.4432, pp.432-439 |
15 |
원문
|
Conference
|
2005 |
Design of Unified Key Management Model using XKMS
Kim Ju Han International Conference on Advanced Communication Technology (ICACT) 2005, pp.77-80 |
|
원문
|
Journal
|
1998 |
Key Distribution for Secure VSAT Satellite Communications
Park Jeong-Hyun IEEE Transactions on Broadcasting, v.44, no.3, pp.274-277 |
12 |
원문
|