|
Journal
|
2025 |
Quantum Implementation of S-Boxes Based on Polynomial Evaluation
Chung Do Young Electronics Letters, v.61, no.1, pp.1-7 |
0 |
원문
|
|
Journal
|
2024 |
Balanced Encoding of Near-Zero Correlation for an AES Implementation
이승광 IEEE Transactions on Information Forensics and Security, v.19, pp.6589-6603 |
0 |
원문
|
|
Journal
|
2023 |
Partition and mix: generalizing the swap-or-not shuffle
Jho Nam-Su Designs, Codes, and Cryptography, v.91, no.6, pp.2237-2254 |
1 |
원문
|
|
Journal
|
2021 |
Table Redundancy Method for Protecting Against Fault Attacks
Lee Seung Kwang IEEE Access, v.9, pp.92214-92223 |
6 |
원문
|
|
Conference
|
2018 |
False Secret Keys to Disturb Power Analysis
Lee Seung Kwang International Conference on Ubiquitous and Future Networks (ICUFN) 2018, pp.296-298 |
0 |
원문
|
|
Journal
|
2016 |
Protecting Secret Keys in Networked Devices with Table Encoding Against Power Analysis Attacks
Kim Taesung Journal of High Speed Networks, v.22, no.4, pp.293-307 |
3 |
원문
|
|
Conference
|
2016 |
Switchable Dual-Rail Representation for Power-Analysis-Resistant Implementations of Block Ciphers
Lee Seung Kwang International Conference on Electric Vehicle, Smart Grid and Information Technology (ICESI) 2016, pp.313-317 |
|
|
|
Conference
|
2015 |
Performance Analysis of Format-Preserving Encryption Based on Unbalanced-Feistel Structure
Keonwoo Kim International Conference on Ubiquitous Information Technologies and Applications (CUTE) 2015 (LNEE 373), pp.425-430 |
1 |
원문
|
|
Conference
|
2014 |
Implementation of Side Channel Analysis Evaluation Boards for Cryptographic Software of Embedded Systems
Choi Yong-Je International Conference on Computer Science and its Applications (CSA) 2014 (LNEE 330), v.330, pp.343-348 |
1 |
원문
|
|
Journal
|
2012 |
Secure Hardware Implementation of ARIA Based on Adaptive Random Masking Technique
강준기 ETRI Journal, v.34, no.1, pp.76-86 |
4 |
원문
|
|
Journal
|
2008 |
High-Speed Hardware Architectures for ARIA with Composite Field Arithmetic and Area-Throughput Trade-Offs
Lee Sang-Woo ETRI Journal, v.30, no.5, pp.707-717 |
5 |
원문
|
|
Conference
|
2007 |
Hardware Implementation of Block Cipher ARIA
Lee Sang-Woo International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2007, pp.406-407 |
|
|
|
Conference
|
2006 |
Provably-Secure Two-Round Password-Authenticated Group Key Exchange in the Standard Model
권정옥 International Workshop on Security (IWSEC) 2006 (LNCS 4266), v.4266, pp.322-336 |
9 |
원문
|
|
Conference
|
2005 |
Design of an Authentication Protocol for Secure Electronic Seals
박성수 International Conference on Information Systems (ICIS) 2005, pp.1-5 |
|
|
|
Conference
|
2002 |
Implementation of Rijndael Block Cipher Algorithm
Lee Yun-Kyung International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2002, pp.165-168 |
|
|