ETRI-Knowledge Sharing Plaform

KOREAN

Researchers

연구자 검색
Keyword

Detail

사진

Choi Yong-Je
Department
System Security Research Section
Contact
KSP Keywords
논문 검색결과
Type Year Title Cited Download
Journal
2024 DTR-SHIELD: Mutual Synchronization for Protecting against DoS Attacks on the SHIELD Protocol with AES-CTR Mode   Sang-su Lee   Sensors, v.24, no.13, pp.1-18 1
Conference
2024 Implementation of PCB Board Comparison Program for Hardware Supply Chain Security at User End   최용제   통신 정보 합동 학술 대회 (JCCI) 2024, pp.421-422
Conference
2023 Research on Automated Binary Restoration of Firmware Bit Information on Mask ROM   김대원   한국 인공지능 학술대회 2023, pp.384-385
Journal
2021 Trends of Hardware-based Trojan Detection Technologies   최양서   전자통신동향분석, v.36, no.6, pp.78-87
Journal
2020 Trends in Supply-Chain Security Technologies   김대원   전자통신동향분석, v.35, no.4, pp.149-157
Journal
2016 An Improved Square-Always Exponentiation Resistant to Side-Channel Attacks on RSA Implementation   Yongje Choi   Intelligent Automation and Soft Computing, v.22, no.3, pp.353-363 7
Journal
2016 A Secure Exponentiation Algorithm Resistant to a Combined Attack on RSA Implementation   HyeongDong Kim  International Journal of Computer Mathematics, v.93, no.2, pp.258-272 11
Journal
2015 Conditional Re-encoding Method for Cryptanalysis-Resistant White-Box AES   Seungkwang Lee   ETRI Journal, v.37, no.5, pp.1012-1022 13
Conference
2014 Implementation of Side Channel Analysis Evaluation Boards for Cryptographic Software of Embedded Systems   Yongje Choi   International Conference on Computer Science and its Applications (CSA) 2014 (LNEE 330), v.330, pp.343-348 1
Journal
2014 Side-Channel Analysis based on Input Collisions in Modular Multiplications and its Countermeasure   최용제   정보보호학회논문지, v.24, no.6, pp.1091-1102
Journal
2014 Improved Shamir''s CRT-RSA Algorithm: Revisit with the Modulus Chaining Method   Seungkwang Lee   ETRI Journal, v.36, no.3, pp.469-478 9
Journal
2014 Implementing Side Channel Analysis Evaluation Boards of KLA-SCARF System   최용제   정보보호학회논문지, v.24, no.1, pp.229-240
Conference
2013 Electromagnetic Wave Side Channel Analysis Using SCARF   김주한   한국정보과학회 학술 발표회 (추계) 2013, pp.814-816
Journal
2013 Technical Trends of Side Channel Analysis System   김주한   전자통신동향분석, v.28, no.3, pp.47-56
Conference
2013 Design of EM Waves Collection and Control Module for Side Channel Analysis   김주한   한국 컴퓨터 종합 학술 대회 2013, pp.704-705
Journal
2013 User-centric Side Channel Analysis System   김주한   정보과학회논문지 : 컴퓨팅의 실제 및 레터, v.19, no.1, pp.56-60
Conference
2012 Analysis of Security Architecture of Electric Vehicle Charging Infrastructure   강유성   대한전자공학회 종합 학술 대회 (하계) 2012, pp.1869-1871
Conference
2012 Side Channel Analysis System - SCARF   김주한   한국 컴퓨터 종합 학술 대회 2012, pp.C266-C268
Journal
2012 Secure Hardware Implementation of ARIA Based on Adaptive Random Masking Technique   Junki Kang  ETRI Journal, v.34, no.1, pp.76-86 4
Journal
2010 Design Implementation of Lightweight and High Speed Security Protocol Suitable for UHF Passive RFID Systems   강유성   정보보호학회논문지, v.20, no.4, pp.117-134
Conference
2010 Wireless Sensor Network Platform of a Practical Implementation   오경희   한국통신학회 종합 학술 발표회 (하계) 2010, pp.1161-1162
Conference
2009 Implementation of Light-weight Elliptic Curve Crypto Coporcessor over GF(p) for Wireless Sensor Network Systems   최용제   대한전자공학회 종합 학술 대회 (하계) 2009, pp.84-85
Conference
2009 Implementation of Pseudo-Tag Generator for Mobile RFID Advertising Service Systems   최용제   한국통신학회 종합 학술 발표회 (하계) 2009, pp.940-941
Conference
2009 Performance Comparisons of Software and Hardware Implementations for Wireless Sensor Network   오경희   한국정보처리학회 학술 대회 (춘계) 2009, pp.1402-1405
Conference
2008 Design of Security Module and Protocol for Passive RFID ㄴystems   최용제   한국통신학회 종합 학술 발표회 (하계) 2008, pp.249-252
Conference
2007 Implementation of the Crypto Module for a Passive RFID Tag using Low Power AES Hardware   최용제   대한전자공학회 종합 학술 대회 (추계) 2007, pp.220-221
Conference
2007 Implementation of the Elliptic Curve Crypto Processor for a Sensor Network   최용제   대한전자공학회 종합 학술 대회 (추계) 2007, pp.222-223
Conference
2007 Design of Light-Wight RSA H/W Module for Sensor Node   이해동   대한전자공학회 종합 학술 대회 (하계) 2007, pp.457-458
Conference
2007 Side-Channel Analysis for Wireless Sensor Mote Using Peak Value Selection   강유성   대한전자공학회 종합 학술 대회 (추계) 2007, pp.114-115
Conference
2006 Implementation and Analysis of ECC over Polynomial basis on Sensor Network Process   최용제   차세대 통신 소프트웨어 학술 대회 (NCS) 2006, pp.1-4
Conference
2006 Low Power AES Hardware Architecture for Radio Frequency Identification   Moo Seop Kim   International Workshop on Security (IWSEC) 2006 (LNCS 4266), v.4266, pp.353-363 9
Journal
2006 ONB 타원곡선 연산기와 Polynomial 기저타원곡선 연산기 구현 및 분석   최용제   정보보호학회지, v.16, no.3, pp.18-24
Conference
2006 Low Power Implementation of SHA-1 Algorithm for RFID System   Yong Je Choi   International Symposium on Consumer Electronics (ISCE) 2006, pp.682-686 5
Conference
2006 Analysis of Implementation of SHA-1 Hash Function for Low Power Sensor Network   최용제   대한전자공학회 종합 학술 대회 (하계) 2006, pp.475-476
Conference
2006 Low-Cost Cryptographic Circuits for Authentication in Radio Frequency Identification Systems   Moo Seop Kim   International Symposium on Consumer Electronics (ISCE) 2006, pp.687-691 2
Conference
2005 Implementation of TinyHash based on Hash Algorithm for Sensor Network   이항록   차세대 통신 소프트웨어 학술 대회 (NCS) 2005, pp.543-548
Conference
2005 Implementation and Analysis of finite field operators over Optimal Normal Basis   최용제   차세대 통신 소프트웨어 학술 대회 (NCS) 2005, pp.531-535
Conference
2004 Hyperelliptic Curve Coprocessors on a FPGA   Ho Won Kim   International Workshop on Information Security Applications (WISA) 2004 (LNCS 3325), v.3325, pp.360-374 9
Conference
2004 Implementation of a hybrid multiplier for GF(2m) with an irreducible trinomial xm+xⁿ+1(n≤m/2)   최용제   한국통신학회 종합 학술 발표회 (하계) 2004, pp.109-109
Journal
2004 Hybrid Multiplier for GF(2m) Defined by Some Irreducible Trinomials   Y.J. Choi   Electronics Letters, v.40, no.14, pp.852-853 7
Journal
2002 Design of RSA cryptographic circuit for small chip area using refined Montgomery algorithm   김무섭   정보보호학회논문지, v.12, no.5, pp.95-105
Conference
2002 FPGA Implementation of RSA Public-Key Cryptographic Coprocessor for Restricted System   Mooseop Kim   International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2002, pp.1554-1557
Conference
2002 Design and Implementation of a Crypto Processor and Its Application to Security System   HoWon Kim   International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2002, pp.315-318
Conference
2002 Hardware Implementation of the 3GPP KASUMI crypto algorithm   HoWon Kim   International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2002, pp.319-322
Conference
2002 Implementation of Elliptic Curve Cryptographic Coprocessor over GF(2163) for ECC protocols   YongJe Choi   International Technical Conference on Circuits Systems, Computers and Communications (ITC-CSCC) 2002, pp.675-678
Conference
2002 Hardware Implementation of the Integrity Algorithm for the IMT-2000 System   최용제   통신 정보 합동 학술 대회 (JCCI) 2002, pp.148-148
Conference
2001 Design of RSA Crypto-module for IC Card   김무섭   한국통신학회 종합 학술 발표회 (하계) 2001, pp.1829-1832
Conference
2001 Design of JavaCard with enhanced Public Key Cryptograhy and Its performance Evaluation   김호원   대한전자공학회 종합 학술 대회 (하계) 2001 : 컴퓨터 소사이어티, pp.55-58
Journal
2001 Implementation of the high performance elliptic curve crypto coprocessor   이병윤  정보보호학회논문지, v.11, no.1, pp.37-46