Conference
|
2024 |
Applying Lightweight Cryptography to Enhance Drone RC Security
Yun Joungil International Conference on Information and Communication Technology Convergence (ICTC) 2024, pp.1367-1368 |
0 |
원문
|
Journal
|
2023 |
T‐depth reduction method for efficient SHA‐256 quantum circuit construction
Jong-Heon Lee IET Information Security, v.17, no.1, pp.46-65 |
6 |
원문
|
Conference
|
2021 |
T-depth Reduction Method for Efficient SHA-256 Quantum Circuit Construction
Jong-Heon Lee International Conference on Information Security and Cryptology (ICISC) 2021 (LNCS 13218), pp.368-391 |
0 |
원문
|
Journal
|
2020 |
Improvement on a Masked White-Box Cryptographic Implementation
Lee Seung Kwang IEEE Access, v.8, pp.90992-91004 |
16 |
원문
|
Conference
|
2019 |
Crypto-Protector: Multi-threaded RSA to Prevent EM Attacks
Lee Seung Kwang International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.945-947 |
0 |
원문
|
Conference
|
2018 |
False Secret Keys to Disturb Power Analysis
Lee Seung Kwang International Conference on Ubiquitous and Future Networks (ICUFN) 2018, pp.296-298 |
0 |
원문
|
Journal
|
2016 |
Protecting Secret Keys in Networked Devices with Table Encoding Against Power Analysis Attacks
Kim Taesung Journal of High Speed Networks, v.22, no.4, pp.293-307 |
3 |
원문
|
Journal
|
2016 |
An Improved Square-Always Exponentiation Resistant to Side-Channel Attacks on RSA Implementation
Choi Yong-Je Intelligent Automation and Soft Computing, v.22, no.3, pp.353-363 |
7 |
원문
|
Journal
|
2015 |
Conditional Re-encoding Method for Cryptanalysis-Resistant White-Box AES
Lee Seung Kwang ETRI Journal, v.37, no.5, pp.1012-1022 |
13 |
원문
|
Journal
|
2014 |
CMOS Security-Enhanced Passive (SEP) Tag Supporting to Mutual Authentication
Kim Hyunseok IEEE Transactions on Industrial Electronics, v.61, no.9, pp.4920-4930 |
8 |
원문
|
Conference
|
2014 |
Function Masking: A New Countermeasure Against Side Channel Attack
Kim Taesung International Workshop on Information Security Applications 2014 (LNCS 8909), v.8909, pp.331-342 |
0 |
원문
|
Conference
|
2008 |
Data Randomization for Lightweight Secure Data Aggregation in Sensor Network
Abedelaziz Mohaisen International Conference on Ubiquitous Intelligence and Computing (UIC) 2008 (LNCS 5061), v.5061, pp.338-351 |
0 |
원문
|
Conference
|
2006 |
Impact of Embedding Scenarios on the Smart Card-Based Fingerprint Verification
박병관 International Workshop on Information Security Applications (WISA) 2006 (LNCS 4298), v.4298, pp.110-120 |
4 |
원문
|
Conference
|
2006 |
Implementation of 10 Giga VPN Accelerator Board
Kim Ki Hyun International Conference on Advanced Communication Technology (ICACT) 2006, pp.1552-1556 |
0 |
|
Conference
|
2004 |
Hyperelliptic Curve Coprocessors on a FPGA
Kim Ho Won International Workshop on Information Security Applications (WISA) 2004 (LNCS 3325), v.3325, pp.360-374 |
9 |
원문
|
Conference
|
2001 |
ESES/j-Crypto and its application
Jooyoung Lee International Symposium on Industrial Electronics (ISIE) 2001, pp.1373-1377 |
|
원문
|