Single-trace attacks on message encoding in lattice-based KEMs BY Sim, J Kwon, J Lee, IJ Kim, TH Lee, J Han, H Yoon, J Cho, DG Han IEEE Access 8, 183175-183191, 2020 | 75 | 2020 |
TinyECCK: Efficient Elliptic Curve Cryptography Implementation over GF(2m) on 8-Bit Micaz Mote SC Seo, DG Han, HC Kim, S Hong IEICE transactions on information and systems 91 (5), 1338-1347, 2008 | 58 | 2008 |
PIPO: A Lightweight Block Cipher with Efficient Higher-Order Masking Software Implementations H Kim, Y Jeon, G Kim, J Kim, BY Sim, DG Han, H Seo, S Kim, S Hong, ... Information Security and Cryptology–ICISC 2020: 23rd International …, 2021 | 55 | 2021 |
Countermeasures against power analysis attacks for the NTRU public key cryptosystem MK Lee, JE Song, D Choi, DG Han IEICE transactions on fundamentals of electronics, communications and …, 2010 | 54 | 2010 |
Chosen ciphertext simple power analysis on software 8-bit implementation of ring-LWE encryption A Park, DG Han 2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), 1-6, 2016 | 47 | 2016 |
Side-channel attacks on post-quantum signature schemes based on multivariate quadratic equations:-rainbow and uov A Park, KA Shim, N Koo, DG Han IACR Transactions on Cryptographic Hardware and Embedded Systems, 500-523, 2018 | 46 | 2018 |
Side channel attacks and countermeasures on pairing based cryptosystems over binary fields TH Kim, T Takagi, DG Han, HW Kim, J Lim Cryptology and Network Security: 5th International Conference, CANS 2006 …, 2006 | 39 | 2006 |
Efficient implementation of pairing-based cryptography on a sensor node M Shirase, Y Miyazaki, T Takagi, DG Han, D Choi IEICE transactions on information and systems 92 (5), 909-917, 2009 | 36 | 2009 |
Improved computation of square roots in specific finite fields DG Han, D Choi, H Kim IEEE Transactions on Computers 58 (2), 188-196, 2008 | 32 | 2008 |
Novel side-channel attacks on quasi-cyclic code-based cryptography BY Sim, J Kwon, KY Choi, J Cho, A Park, DG Han IACR Transactions on Cryptographic Hardware and Embedded Systems, 180-212, 2019 | 27 | 2019 |
A new method for designing lightweight S-boxes with high differential and linear branch numbers, and its application H Kim, Y Jeon, G Kim, J Kim, BY Sim, DG Han, H Seo, S Kim, S Hong, ... IEEE Access 9, 150592-150607, 2021 | 25 | 2021 |
Non-profiled side-channel attack based on deep learning using picture trace YS Won, DG Han, D Jap, S Bhasin, JY Park IEEE Access 9, 22480-22492, 2021 | 24 | 2021 |
Performance enhancement of differential power analysis attacks with signal companding methods JC Ryoo, DG Han, SK Kim, S Lee IEEE signal processing letters 15, 625-628, 2008 | 24 | 2008 |
Side channel attack on Ha-Moon’s countermeasure of randomized signed scalar multiplication K Okeya, DG Han Progress in Cryptology-INDOCRYPT 2003: 4th International Conference on …, 2003 | 23 | 2003 |
An efficient CRT-RSA algorithm secure against power and fault attacks SK Kim, TH Kim, DG Han, S Hong Journal of Systems and Software 84 (10), 1660-1669, 2011 | 21 | 2011 |
New security problem in RFID systems “Tag Killing” DG Han, T Takagi, HW Kim, KI Chung Computational Science and Its Applications-ICCSA 2006: International …, 2006 | 20 | 2006 |
Chosen-ciphertext clustering attack on CRYSTALS-KYBER using the side-channel leakage of Barrett reduction BY Sim, A Park, DG Han IEEE Internet of Things Journal 9 (21), 21382-21397, 2022 | 19 | 2022 |
Security analysis on dummy based side-channel countermeasures—Case study: AES with dummy and shuffling JH Lee, DG Han Applied Soft Computing 93, 106352, 2020 | 19 | 2020 |
Novel single-trace ML profiling attacks on NIST 3 round candidate Dilithium IJ Kim, TH Lee, J Han, BY Sim, DG Han Cryptology ePrint Archive, 2020 | 19 | 2020 |
A more compact representation of XTR cryptosystem M Shirase, DG Han, Y Hibino, H Kim, T Takagi IEICE transactions on fundamentals of electronics, communications and …, 2008 | 19 | 2008 |