Journal
|
2020 |
Improvement on a Masked White-Box Cryptographic Implementation
Lee Seung Kwang IEEE Access, v.8, pp.90992-91004 |
16 |
원문
|
Conference
|
2019 |
Crypto-Protector: Multi-threaded RSA to Prevent EM Attacks
Lee Seung Kwang International Conference on Information and Communication Technology Convergence (ICTC) 2019, pp.945-947 |
0 |
원문
|
Conference
|
2018 |
False Secret Keys to Disturb Power Analysis
Lee Seung Kwang International Conference on Ubiquitous and Future Networks (ICUFN) 2018, pp.296-298 |
0 |
원문
|
Journal
|
2018 |
Field-Measurement-Based Received Power Analysis for Directional Beamforming Millimeter-Wave Systems: Effects of Beamwidth and Beam Misalignment
Juyul Lee ETRI Journal, v.40, no.1, pp.26-38 |
44 |
원문
|
Journal
|
2018 |
A White-box Cryptographic Implementation for Protecting against Power Analysis
Lee Seung Kwang IEICE Transactions on Information and Systems, v.E101.D, no.1, pp.249-252 |
4 |
원문
|
Journal
|
2016 |
One-Bit to Four-Bit Dual Conversion for Security Enhancement against Power Analysis
Lee Seung Kwang IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, v.E99.A, no.10, pp.1833-1842 |
1 |
원문
|
Journal
|
2016 |
Protecting Secret Keys in Networked Devices with Table Encoding Against Power Analysis Attacks
Kim Taesung Journal of High Speed Networks, v.22, no.4, pp.293-307 |
3 |
원문
|
Journal
|
2016 |
An Improved Square-Always Exponentiation Resistant to Side-Channel Attacks on RSA Implementation
Choi Yong-Je Intelligent Automation and Soft Computing, v.22, no.3, pp.353-363 |
7 |
원문
|
Journal
|
2016 |
A Secure Exponentiation Algorithm Resistant to a Combined Attack on RSA Implementation
김형동 International Journal of Computer Mathematics, v.93, no.2, pp.258-272 |
11 |
원문
|
Conference
|
2015 |
Improved Differential Cluster Analysis with Power Model
Kim Taesung International Conference on Computers, Communications and Systems (ICCCS) 2015, pp.1-3 |
|
|
Conference
|
2014 |
Function Masking: A New Countermeasure Against Side Channel Attack
Kim Taesung International Workshop on Information Security Applications 2014 (LNCS 8909), v.8909, pp.331-342 |
0 |
원문
|
Journal
|
2014 |
An Improved Side Channel Attack Using Event Information of Subtraction
Park Jong-Yeon Journal of Network and Computer Applications, v.38, no.1, pp.99-105 |
6 |
원문
|
Conference
|
2012 |
An Equidistant Message Power Attack Using Restricted Number of Traces on Reduction Algorithm
Park Jong-Yeon International Conference on Ubiquitous Information Technologies and Applications (CUTE) 2012 (LNEE 214), v.214, pp.315-322 |
0 |
원문
|
Journal
|
2012 |
Secure Hardware Implementation of ARIA Based on Adaptive Random Masking Technique
강준기 ETRI Journal, v.34, no.1, pp.76-86 |
4 |
원문
|
Conference
|
2010 |
A Study on Index Bits of Features in Context-based Audio Retrieval
Jeong Hyuk 대한전자공학회 종합 학술 대회 (하계) 2010, pp.18-21 |
|
|
Conference
|
2009 |
A New Fault Cryptanalysis on Montgomery Ladder Exponentiation Algorithm
박제훈 International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS) 2009, pp.896-899 |
1 |
원문
|
Journal
|
2008 |
Performance Enhancement of Differential Power Analysis Attacks With Signal Companding Methods
류정춘 IEEE Signal Processing Letters, v.15, pp.625-628 |
11 |
원문
|
Journal
|
2008 |
Performance Enhancement of Differential Power Analysis Attack with Signal Companding Methods
류정춘 정보보호학회논문지, v.18, no.2, pp.39-47 |
|
|
Journal
|
2008 |
Power Analysis Attacks and Countermeasures on ηT Pairing Over Binary Fields
김태현 ETRI Journal, v.30, no.1, pp.68-80 |
9 |
원문
|
Journal
|
2007 |
Differential Power Analysis on Countermeasures Using Binary Signed Digit Representations
Tae Hyun Kim ETRI Journal, v.29, no.5, pp.619-632 |
3 |
원문
|
Conference
|
2005 |
A DPA Countermeasure by Randomized Frobenius Decomposition
Park Tae Jun International Workshop on Information Security Applications (WISA) 2005 (LNCS 3786), v.3786, pp.271-282 |
0 |
|