| Single-trace attacks on message encoding in lattice-based KEMs BY Sim, J Kwon, J Lee, IJ Kim, TH Lee, J Han, H Yoon, J Cho, DG Han IEEE Access 8, 183175-183191, 2020 | 102 | 2020 |
| : white-box secure block cipher using parallel table look-ups J Kwon, BH Lee, J Lee, D Moon Cryptographers’ Track at the RSA Conference, 106-128, 2020 | 32 | 2020 |
| Novel side-channel attacks on quasi-cyclic code-based cryptography BY Sim, J Kwon, KY Choi, J Cho, A Park, DG Han IACR Transactions on Cryptographic Hardware and Embedded Systems, 180-212, 2019 | 31 | 2019 |
| Efficient isogeny computations on twisted Edwards curves S Kim, K Yoon, J Kwon, S Hong, YH Park Security and Communication Networks 2018 (1), 5747642, 2018 | 31 | 2018 |
| AIM: symmetric primitive for shorter signatures with stronger security S Kim, J Ha, M Son, B Lee, D Moon, J Lee, S Lee, J Kwon, J Cho, H Yoon, ... Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 28 | 2023 |
| New hybrid method for isogeny-based cryptosystems using Edwards curves S Kim, K Yoon, J Kwon, YH Park, S Hong IEEE transactions on Information Theory 66 (3), 1934-1943, 2019 | 26 | 2019 |
| Single-trace attack on NIST round 3 candidate Dilithium using machine learning-based profiling J Han, T Lee, J Kwon, J Lee, IJ Kim, J Cho, DG Han, BY Sim IEEE Access 9, 166283-166292, 2021 | 19 | 2021 |
| The aimer signature scheme S Kim, J Ha, M Son, B Lee, D Moon, J Lee, S Lee, J Kwon, J Cho, H Yoon, ... Technical report. NIST, 2023 | 5 | 2023 |
| Systematization of shuffling countermeasures: With an application to CRYSTALS-Dilithium J Lee, J Han, S Lee, J Kwon, KH Choi, JW Huh, J Cho, DG Han IEEE Access 11, 142862-142873, 2023 | 4 | 2023 |
| Method and apparatus for performing operation using encrypted data EK Kim, DJ MOON, HJ Yoon, JH Sohn, JH Ahn, JH JEONG, JH KWON, ... US Patent 11,277,257, 2022 | 4 | 2022 |
| Efficient continuous key agreement with reduced bandwidth from a decomposable KEM J Lee, J Kwon, JS Shin IEEE Access 11, 33224-33235, 2023 | 3 | 2023 |
| Efficient implementations of four-dimensional GLV-GLS scalar multiplication on 8-bit, 16-bit, and 32-bit microcontrollers J Kwon, SC Seo, S Hong Applied Sciences 8 (6), 900, 2018 | 3 | 2018 |
| An efficient implementation of pairing-based cryptography on MSP430 processor J Kwon, SC Seo, S Hong The Journal of Supercomputing 74 (3), 1394-1417, 2018 | 3* | 2018 |
| AIM: Symmetric primitive for shorter signatures with stronger security (full version) S Kim, J Ha, M Son, B Lee, D Moon, J Lee, S Lee, J Kwon, J Cho, H Yoon, ... Cryptology ePrint Archive, 2022 | 2 | 2022 |
| Apparatus and method for encryption E Kim, Y Hyo-Jin, DJ Moon, MW Jeong, JH Sohn, YH Kim, HH Yu, J Kwon US Patent App. 16/666,098, 2021 | 2 | 2021 |
| An Implementation of Supersingular Isogeny Diffie-Hellman and Its Application to Mobile Security Product K Yoon, JY Lee, S Kim, J Kwon, YH Park Journal of The Korea Institute of Information Security & Cryptology 28 (1 …, 2018 | 2 | 2018 |
| Apparatus and method for preventing side channel attack for NTRU LPRime algorithm JH KWON, JH Lee, HJ Yoon, JH CHO, DG HAN, BY SIM, IJ KIM, TH Lee, ... US Patent 11,853,419, 2023 | 1 | 2023 |
| Apparatus and method for encryption and decryption based on tweak converter to which key table is applied DJ Moon, J Kwon, J Lee US Patent 11,522,675, 2022 | 1 | 2022 |
| Efficient Implementations of AIMer Post-Quantum Signature Scheme for Low-End to High-End IoT Devices J Kwon, S Lee, B Lee, H Seo, J Cho IEEE Internet of Things Journal, 2025 | | 2025 |
| Apparatus and method for ciphertext comparison capable of preventing side channel attack K Jihoon, J Lee, J Cho, HAN Jaeseung, T Lee, DG Han US Patent App. 18/702,071, 2024 | | 2024 |