Dong-Guk Han

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Single trace analysis of comparison operation based constant-time CDT sampling and its countermeasure
 
2024-05-31Paper
Differential fault attack on AES using maximum four bytes faulty ciphertexts
Lecture Notes in Computer Science
2023-08-21Paper
T_SM: Elliptic Curve Scalar Multiplication Algorithm Secure Against Single-Trace Attacks
Information Security Practice and Experience
2023-06-30Paper
Key Bit-Dependent Attack on Protected PKC Using a Single Trace
Information Security Practice and Experience
2022-12-09Paper
Differential fault attack on lightweight block cipher PIPO
 
2022-12-07Paper
Learning-based side-channel analysis on PIPO
 
2022-12-07Paper
\textsf{PIPO}: a lightweight block cipher with efficient higher-order masking software implementations
 
2022-03-24Paper
Efficient conversion method from arithmetic to Boolean masking in constrained devices
Constructive Side-Channel Analysis and Secure Design
2019-09-16Paper
Novel leakage against realistic masking and shuffling countermeasures -- case study on PRINCE and SEED
 
2018-06-15Paper
Improved Computation of Square Roots in Specific Finite Fields
IEEE Transactions on Computers
2017-08-08Paper
Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations
Smart Card Research and Advanced Applications
2015-11-11Paper
First-order side channel attacks on Zhang's countermeasures
Information Sciences
2012-07-13Paper
A new bit-serial multiplier over \(GF(pm)\) using irreducible trinomials
Computers & Mathematics with Applications
2010-11-08Paper
Further Security Analysis of XTR
Information Security Practice and Experience
2009-04-02Paper
Secure Signed Radix-r Recoding Methods for Constrained-Embedded Devices
Information Security Practice and Experience
2009-04-02Paper
Compressed XTR
Applied Cryptography and Network Security
2009-03-10Paper
New Security Problem in RFID Systems “Tag Killing”
Computational Science and Its Applications - ICCSA 2006
2009-02-10Paper
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields
Cryptology and Network Security
2009-01-09Paper
Progress in Cryptology - INDOCRYPT 2003
Lecture Notes in Computer Science
2007-11-29Paper
Information Security and Privacy
Lecture Notes in Computer Science
2005-09-07Paper
Information and Communications Security
Lecture Notes in Computer Science
2005-08-19Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2005-06-13Paper
scientific article; zbMATH DE number 2043311 (Why is no real title available?)
 
2004-02-16Paper
scientific article; zbMATH DE number 1951623 (Why is no real title available?)
 
2003-07-21Paper


Research outcomes over time


This page was built for person: Dong-Guk Han