Single trace side-channel attack on key reconciliation in quantum key distribution system and its efficient countermeasures D Park, GS Kim, D Heo, S Kim, HS Kim, S Hong ICT Express 7 (1), 36-40, 2021 | 13 | 2021 |
Stealing keys from hardware wallets: A single trace side-channel attack on elliptic curve scalar multiplication without profiling D Park, M Choi, G Kim, D Bae, H Kim, S Hong IEEE Access 11, 44578-44589, 2023 | 5 | 2023 |
Autoscaled-Wavelet Convolutional Layer for Deep Learning-Based Side-Channel Analysis D Bae, D Park, G Kim, M Choi, N Lee, H Kim, S Hong IEEE Access 11, 95381-95395, 2023 | 3 | 2023 |
Single trace attack on key reconciliation process for quantum key distribution D Park, D Heo, S Kim, S Hong 2020 International Conference on Information and Communication Technology …, 2020 | 3 | 2020 |
참조 테이블 기반 스칼라 곱 알고리즘에 대한 충돌 특성을 이용한 향상된 수평상관분석 박동준, 이상엽, 조성민, 김희석, 홍석희 정보보호학회논문지 30 (2), 179-187, 2020 | 2* | 2020 |
Side Channel Vulnerability in Parity Computation of Generic Key Reconciliation Process on QKD GS Kim, D Park, HS Kim, S Hong 2021 International Conference on Information and Communication Technology …, 2021 | 1 | 2021 |
NIST PQC Round 3 FALCON 전자서명 알고리즘의 전력 분석 취약점 연구 GS Kim, DJ Park, SH Hong Review of KIISC 31 (1), 57-64, 2021 | 1 | 2021 |
Cloning Hardware Wallet without Valid Credentials Through Side-Channel Analysis of Hash Function D Park, J Kim, HS Kim, S Hong IEEE Access 12, 132677-132688, 2024 | | 2024 |