[go: up one dir, main page]

Follow
Jihoon Kwon
Jihoon Kwon
Samsung SDS
Verified email at samsung.com
Title
Cited by
Cited by
Year
Single-trace attacks on message encoding in lattice-based KEMs
BY Sim, J Kwon, J Lee, IJ Kim, TH Lee, J Han, H Yoon, J Cho, DG Han
IEEE Access 8, 183175-183191, 2020
1022020
: white-box secure block cipher using parallel table look-ups
J Kwon, BH Lee, J Lee, D Moon
Cryptographers’ Track at the RSA Conference, 106-128, 2020
322020
Novel side-channel attacks on quasi-cyclic code-based cryptography
BY Sim, J Kwon, KY Choi, J Cho, A Park, DG Han
IACR Transactions on Cryptographic Hardware and Embedded Systems, 180-212, 2019
312019
Efficient isogeny computations on twisted Edwards curves
S Kim, K Yoon, J Kwon, S Hong, YH Park
Security and Communication Networks 2018 (1), 5747642, 2018
312018
AIM: symmetric primitive for shorter signatures with stronger security
S Kim, J Ha, M Son, B Lee, D Moon, J Lee, S Lee, J Kwon, J Cho, H Yoon, ...
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023
282023
New hybrid method for isogeny-based cryptosystems using Edwards curves
S Kim, K Yoon, J Kwon, YH Park, S Hong
IEEE transactions on Information Theory 66 (3), 1934-1943, 2019
262019
Single-trace attack on NIST round 3 candidate Dilithium using machine learning-based profiling
J Han, T Lee, J Kwon, J Lee, IJ Kim, J Cho, DG Han, BY Sim
IEEE Access 9, 166283-166292, 2021
192021
The aimer signature scheme
S Kim, J Ha, M Son, B Lee, D Moon, J Lee, S Lee, J Kwon, J Cho, H Yoon, ...
Technical report. NIST, 2023
52023
Systematization of shuffling countermeasures: With an application to CRYSTALS-Dilithium
J Lee, J Han, S Lee, J Kwon, KH Choi, JW Huh, J Cho, DG Han
IEEE Access 11, 142862-142873, 2023
42023
Method and apparatus for performing operation using encrypted data
EK Kim, DJ MOON, HJ Yoon, JH Sohn, JH Ahn, JH JEONG, JH KWON, ...
US Patent 11,277,257, 2022
42022
Efficient continuous key agreement with reduced bandwidth from a decomposable KEM
J Lee, J Kwon, JS Shin
IEEE Access 11, 33224-33235, 2023
32023
Efficient implementations of four-dimensional GLV-GLS scalar multiplication on 8-bit, 16-bit, and 32-bit microcontrollers
J Kwon, SC Seo, S Hong
Applied Sciences 8 (6), 900, 2018
32018
An efficient implementation of pairing-based cryptography on MSP430 processor
J Kwon, SC Seo, S Hong
The Journal of Supercomputing 74 (3), 1394-1417, 2018
3*2018
AIM: Symmetric primitive for shorter signatures with stronger security (full version)
S Kim, J Ha, M Son, B Lee, D Moon, J Lee, S Lee, J Kwon, J Cho, H Yoon, ...
Cryptology ePrint Archive, 2022
22022
Apparatus and method for encryption
E Kim, Y Hyo-Jin, DJ Moon, MW Jeong, JH Sohn, YH Kim, HH Yu, J Kwon
US Patent App. 16/666,098, 2021
22021
An Implementation of Supersingular Isogeny Diffie-Hellman and Its Application to Mobile Security Product
K Yoon, JY Lee, S Kim, J Kwon, YH Park
Journal of The Korea Institute of Information Security & Cryptology 28 (1 …, 2018
22018
Apparatus and method for preventing side channel attack for NTRU LPRime algorithm
JH KWON, JH Lee, HJ Yoon, JH CHO, DG HAN, BY SIM, IJ KIM, TH Lee, ...
US Patent 11,853,419, 2023
12023
Apparatus and method for encryption and decryption based on tweak converter to which key table is applied
DJ Moon, J Kwon, J Lee
US Patent 11,522,675, 2022
12022
Efficient Implementations of AIMer Post-Quantum Signature Scheme for Low-End to High-End IoT Devices
J Kwon, S Lee, B Lee, H Seo, J Cho
IEEE Internet of Things Journal, 2025
2025
Apparatus and method for ciphertext comparison capable of preventing side channel attack
K Jihoon, J Lee, J Cho, HAN Jaeseung, T Lee, DG Han
US Patent App. 18/702,071, 2024
2024
The system can't perform the operation now. Try again later.
Articles 1–20