Journal
|
2024 |
DTR-SHIELD: Mutual Synchronization for Protecting against DoS Attacks on the SHIELD Protocol with AES-CTR Mode
Sang-su Lee
Sensors, v.24, no.13, pp.1-18 |
1 |
|
Conference
|
2024 |
Implementation of PCB Board Comparison Program for Hardware Supply Chain Security at User End
최용제
통신 정보 합동 학술 대회 (JCCI) 2024, pp.421-422 |
|
|
Conference
|
2023 |
Research on Automated Binary Restoration of Firmware Bit Information on Mask ROM
김대원
한국 인공지능 학술대회 2023, pp.384-385 |
|
|
Journal
|
2021 |
Trends of Hardware-based Trojan Detection Technologies
최양서
전자통신동향분석, v.36, no.6, pp.78-87 |
|
|
Journal
|
2020 |
Trends in Supply-Chain Security Technologies
김대원
전자통신동향분석, v.35, no.4, pp.149-157 |
|
|
Journal
|
2016 |
An Improved Square-Always Exponentiation Resistant to Side-Channel Attacks on RSA Implementation
Yongje Choi
Intelligent Automation and Soft Computing, v.22, no.3, pp.353-363 |
7 |
|
Journal
|
2016 |
A Secure Exponentiation Algorithm Resistant to a Combined Attack on RSA Implementation
HyeongDong Kim
International Journal of Computer Mathematics, v.93, no.2, pp.258-272 |
11 |
|
Journal
|
2015 |
Conditional Re-encoding Method for Cryptanalysis-Resistant White-Box AES
Seungkwang Lee
ETRI Journal, v.37, no.5, pp.1012-1022 |
13 |
|
Conference
|
2014 |
Implementation of Side Channel Analysis Evaluation Boards for Cryptographic Software of Embedded Systems
Yongje Choi
International Conference on Computer Science and its Applications (CSA) 2014 (LNEE 330), v.330, pp.343-348 |
1 |
|
Journal
|
2014 |
Side-Channel Analysis based on Input Collisions in Modular Multiplications and its Countermeasure
최용제
정보보호학회논문지, v.24, no.6, pp.1091-1102 |
|
|
Journal
|
2014 |
Improved Shamir''s CRT-RSA Algorithm: Revisit with the Modulus Chaining Method
Seungkwang Lee
ETRI Journal, v.36, no.3, pp.469-478 |
9 |
|
Journal
|
2014 |
Implementing Side Channel Analysis Evaluation Boards of KLA-SCARF System
최용제
정보보호학회논문지, v.24, no.1, pp.229-240 |
|
|
Conference
|
2013 |
Electromagnetic Wave Side Channel Analysis Using SCARF
김주한
한국정보과학회 학술 발표회 (추계) 2013, pp.814-816 |
|
|
Journal
|
2013 |
Technical Trends of Side Channel Analysis System
김주한
전자통신동향분석, v.28, no.3, pp.47-56 |
|
|
Conference
|
2013 |
Design of EM Waves Collection and Control Module for Side Channel Analysis
김주한
한국 컴퓨터 종합 학술 대회 2013, pp.704-705 |
|
|
Journal
|
2013 |
User-centric Side Channel Analysis System
김주한
정보과학회논문지 : 컴퓨팅의 실제 및 레터, v.19, no.1, pp.56-60 |
|
|
Conference
|
2012 |
Analysis of Security Architecture of Electric Vehicle Charging Infrastructure
강유성
대한전자공학회 종합 학술 대회 (하계) 2012, pp.1869-1871 |
|
|
Conference
|
2012 |
Side Channel Analysis System - SCARF
김주한
한국 컴퓨터 종합 학술 대회 2012, pp.C266-C268 |
|
|
Journal
|
2012 |
Secure Hardware Implementation of ARIA Based on Adaptive Random Masking Technique
Junki Kang
ETRI Journal, v.34, no.1, pp.76-86 |
4 |
|
Journal
|
2010 |
Design Implementation of Lightweight and High Speed Security Protocol Suitable for UHF Passive RFID Systems
강유성
정보보호학회논문지, v.20, no.4, pp.117-134 |
|
|
Conference
|
2010 |
Wireless Sensor Network Platform of a Practical Implementation
오경희
한국통신학회 종합 학술 발표회 (하계) 2010, pp.1161-1162 |
|
|
Conference
|
2009 |
Implementation of Light-weight Elliptic Curve Crypto Coporcessor over GF(p) for Wireless Sensor Network Systems
최용제
대한전자공학회 종합 학술 대회 (하계) 2009, pp.84-85 |
|
|
Conference
|
2009 |
Implementation of Pseudo-Tag Generator for Mobile RFID Advertising Service Systems
최용제
한국통신학회 종합 학술 발표회 (하계) 2009, pp.940-941 |
|
|
Conference
|
2009 |
Performance Comparisons of Software and Hardware Implementations for Wireless Sensor Network
오경희
한국정보처리학회 학술 대회 (춘계) 2009, pp.1402-1405 |
|
|
Conference
|
2008 |
Design of Security Module and Protocol for Passive RFID ㄴystems
최용제
한국통신학회 종합 학술 발표회 (하계) 2008, pp.249-252 |
|
|
Conference
|
2007 |
Implementation of the Crypto Module for a Passive RFID Tag using Low Power AES Hardware
최용제
대한전자공학회 종합 학술 대회 (추계) 2007, pp.220-221 |
|
|
Conference
|
2007 |
Implementation of the Elliptic Curve Crypto Processor for a Sensor Network
최용제
대한전자공학회 종합 학술 대회 (추계) 2007, pp.222-223 |
|
|
Conference
|
2007 |
Design of Light-Wight RSA H/W Module for Sensor Node
이해동
대한전자공학회 종합 학술 대회 (하계) 2007, pp.457-458 |
|
|
Conference
|
2007 |
Side-Channel Analysis for Wireless Sensor Mote Using Peak Value Selection
강유성
대한전자공학회 종합 학술 대회 (추계) 2007, pp.114-115 |
|
|
Conference
|
2006 |
Implementation and Analysis of ECC over Polynomial basis on Sensor Network Process
최용제
차세대 통신 소프트웨어 학술 대회 (NCS) 2006, pp.1-4 |
|
|
Conference
|
2006 |
Low Power AES Hardware Architecture for Radio Frequency Identification
Moo Seop Kim
International Workshop on Security (IWSEC) 2006 (LNCS 4266), v.4266, pp.353-363 |
9 |
|
Journal
|
2006 |
ONB 타원곡선 연산기와 Polynomial 기저타원곡선 연산기 구현 및 분석
최용제
정보보호학회지, v.16, no.3, pp.18-24 |
|
|
Conference
|
2006 |
Low Power Implementation of SHA-1 Algorithm for RFID System
Yong Je Choi
International Symposium on Consumer Electronics (ISCE) 2006, pp.682-686 |
5 |
|
Conference
|
2006 |
Analysis of Implementation of SHA-1 Hash Function for Low Power Sensor Network
최용제
대한전자공학회 종합 학술 대회 (하계) 2006, pp.475-476 |
|
|
Conference
|
2006 |
Low-Cost Cryptographic Circuits for Authentication in Radio Frequency Identification Systems
Moo Seop Kim
International Symposium on Consumer Electronics (ISCE) 2006, pp.687-691 |
2 |
|
Conference
|
2005 |
Implementation of TinyHash based on Hash Algorithm for Sensor Network
이항록
차세대 통신 소프트웨어 학술 대회 (NCS) 2005, pp.543-548 |
|
|
Conference
|
2005 |
Implementation and Analysis of finite field operators over Optimal Normal Basis
최용제
차세대 통신 소프트웨어 학술 대회 (NCS) 2005, pp.531-535 |
|
|
Conference
|
2004 |
Hyperelliptic Curve Coprocessors on a FPGA
Ho Won Kim
International Workshop on Information Security Applications (WISA) 2004 (LNCS 3325), v.3325, pp.360-374 |
9 |
|
Conference
|
2004 |
Implementation of a hybrid multiplier for GF(2m) with an irreducible trinomial xm+xⁿ+1(n≤m/2)
최용제
한국통신학회 종합 학술 발표회 (하계) 2004, pp.109-109 |
|
|
Journal
|
2004 |
Hybrid Multiplier for GF(2m) Defined by Some Irreducible Trinomials
Y.J. Choi
Electronics Letters, v.40, no.14, pp.852-853 |
7 |
|
Journal
|
2002 |
Design of RSA cryptographic circuit for small chip area using refined Montgomery algorithm
김무섭
정보보호학회논문지, v.12, no.5, pp.95-105 |
|
|
Conference
|
2002 |
FPGA Implementation of RSA Public-Key Cryptographic Coprocessor for Restricted System
Mooseop Kim
International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2002, pp.1554-1557 |
|
|
Conference
|
2002 |
Design and Implementation of a Crypto Processor and Its Application to Security System
HoWon Kim
International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2002, pp.315-318 |
|
|
Conference
|
2002 |
Hardware Implementation of the 3GPP KASUMI crypto algorithm
HoWon Kim
International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2002, pp.319-322 |
|
|
Conference
|
2002 |
Implementation of Elliptic Curve Cryptographic Coprocessor over GF(2163) for ECC protocols
YongJe Choi
International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2002, pp.675-678 |
|
|
Conference
|
2002 |
Hardware Implementation of the Integrity Algorithm for the IMT-2000 System
최용제
통신 정보 합동 학술 대회 (JCCI) 2002, pp.148-148 |
|
|
Conference
|
2001 |
Design of RSA Crypto-module for IC Card
김무섭
한국통신학회 종합 학술 발표회 (하계) 2001, pp.1829-1832 |
|
|
Conference
|
2001 |
Design of JavaCard with enhanced Public Key Cryptograhy and Its performance Evaluation
김호원
대한전자공학회 종합 학술 대회 (하계) 2001 : 컴퓨터 소사이어티, pp.55-58 |
|
|
Journal
|
2001 |
Implementation of the high performance elliptic curve crypto coprocessor
이병윤
정보보호학회논문지, v.11, no.1, pp.37-46 |
|
|