关注
Dong-Guk Han
Dong-Guk Han
Professor of Information Security, Cryptology, and Mathematics, Kookmin University
在 kookmin.ac.kr 的电子邮件经过验证
标题
引用次数
引用次数
年份
Single-trace attacks on message encoding in lattice-based KEMs
BY Sim, J Kwon, J Lee, IJ Kim, TH Lee, J Han, H Yoon, J Cho, DG Han
IEEE Access 8, 183175-183191, 2020
752020
TinyECCK: Efficient Elliptic Curve Cryptography Implementation over GF(2m) on 8-Bit Micaz Mote
SC Seo, DG Han, HC Kim, S Hong
IEICE transactions on information and systems 91 (5), 1338-1347, 2008
582008
PIPO: A Lightweight Block Cipher with Efficient Higher-Order Masking Software Implementations
H Kim, Y Jeon, G Kim, J Kim, BY Sim, DG Han, H Seo, S Kim, S Hong, ...
Information Security and Cryptology–ICISC 2020: 23rd International …, 2021
552021
Countermeasures against power analysis attacks for the NTRU public key cryptosystem
MK Lee, JE Song, D Choi, DG Han
IEICE transactions on fundamentals of electronics, communications and …, 2010
542010
Chosen ciphertext simple power analysis on software 8-bit implementation of ring-LWE encryption
A Park, DG Han
2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), 1-6, 2016
472016
Side-channel attacks on post-quantum signature schemes based on multivariate quadratic equations:-rainbow and uov
A Park, KA Shim, N Koo, DG Han
IACR Transactions on Cryptographic Hardware and Embedded Systems, 500-523, 2018
462018
Side channel attacks and countermeasures on pairing based cryptosystems over binary fields
TH Kim, T Takagi, DG Han, HW Kim, J Lim
Cryptology and Network Security: 5th International Conference, CANS 2006 …, 2006
392006
Efficient implementation of pairing-based cryptography on a sensor node
M Shirase, Y Miyazaki, T Takagi, DG Han, D Choi
IEICE transactions on information and systems 92 (5), 909-917, 2009
362009
Improved computation of square roots in specific finite fields
DG Han, D Choi, H Kim
IEEE Transactions on Computers 58 (2), 188-196, 2008
322008
Novel side-channel attacks on quasi-cyclic code-based cryptography
BY Sim, J Kwon, KY Choi, J Cho, A Park, DG Han
IACR Transactions on Cryptographic Hardware and Embedded Systems, 180-212, 2019
272019
A new method for designing lightweight S-boxes with high differential and linear branch numbers, and its application
H Kim, Y Jeon, G Kim, J Kim, BY Sim, DG Han, H Seo, S Kim, S Hong, ...
IEEE Access 9, 150592-150607, 2021
252021
Non-profiled side-channel attack based on deep learning using picture trace
YS Won, DG Han, D Jap, S Bhasin, JY Park
IEEE Access 9, 22480-22492, 2021
242021
Performance enhancement of differential power analysis attacks with signal companding methods
JC Ryoo, DG Han, SK Kim, S Lee
IEEE signal processing letters 15, 625-628, 2008
242008
Side channel attack on Ha-Moon’s countermeasure of randomized signed scalar multiplication
K Okeya, DG Han
Progress in Cryptology-INDOCRYPT 2003: 4th International Conference on …, 2003
232003
An efficient CRT-RSA algorithm secure against power and fault attacks
SK Kim, TH Kim, DG Han, S Hong
Journal of Systems and Software 84 (10), 1660-1669, 2011
212011
New security problem in RFID systems “Tag Killing”
DG Han, T Takagi, HW Kim, KI Chung
Computational Science and Its Applications-ICCSA 2006: International …, 2006
202006
Chosen-ciphertext clustering attack on CRYSTALS-KYBER using the side-channel leakage of Barrett reduction
BY Sim, A Park, DG Han
IEEE Internet of Things Journal 9 (21), 21382-21397, 2022
192022
Security analysis on dummy based side-channel countermeasures—Case study: AES with dummy and shuffling
JH Lee, DG Han
Applied Soft Computing 93, 106352, 2020
192020
Novel single-trace ML profiling attacks on NIST 3 round candidate Dilithium
IJ Kim, TH Lee, J Han, BY Sim, DG Han
Cryptology ePrint Archive, 2020
192020
A more compact representation of XTR cryptosystem
M Shirase, DG Han, Y Hibino, H Kim, T Takagi
IEICE transactions on fundamentals of electronics, communications and …, 2008
192008
系统目前无法执行此操作,请稍后再试。
文章 1–20