[go: up one dir, main page]

Follow
Dong-Guk Han
Dong-Guk Han
Professor of Information Security, Cryptology, and Mathematics, Kookmin University
Verified email at kookmin.ac.kr
Title
Cited by
Cited by
Year
Single-trace attacks on message encoding in lattice-based KEMs
BY Sim, J Kwon, J Lee, IJ Kim, TH Lee, J Han, H Yoon, J Cho, DG Han
IEEE Access 8, 183175-183191, 2020
1022020
PIPO: A lightweight block cipher with efficient higher-order masking software implementations
H Kim, Y Jeon, G Kim, J Kim, BY Sim, DG Han, H Seo, S Kim, S Hong, ...
International Conference on Information Security and Cryptology, 99-122, 2020
742020
Side-channel attacks on post-quantum signature schemes based on multivariate quadratic equations:-rainbow and uov
A Park, KA Shim, N Koo, DG Han
IACR Transactions on Cryptographic Hardware and Embedded Systems, 500-523, 2018
632018
Countermeasures against power analysis attacks for the NTRU public key cryptosystem
MK Lee, JE Song, D Choi, DG Han
IEICE transactions on fundamentals of electronics, communications and …, 2010
632010
TinyECCK: Efficient Elliptic Curve Cryptography Implementation over GF(2m) on 8-Bit Micaz Mote
SC Seo, DG Han, HC Kim, S Hong
IEICE transactions on information and systems 91 (5), 1338-1347, 2008
592008
Chosen ciphertext simple power analysis on software 8-bit implementation of ring-LWE encryption
A Park, DG Han
2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), 1-6, 2016
492016
A new method for designing lightweight S-boxes with high differential and linear branch numbers, and its application
H Kim, Y Jeon, G Kim, J Kim, BY Sim, DG Han, H Seo, S Kim, S Hong, ...
IEEE Access 9, 150592-150607, 2021
482021
Chosen-ciphertext clustering attack on CRYSTALS-KYBER using the side-channel leakage of Barrett reduction
BY Sim, A Park, DG Han
IEEE Internet of Things Journal 9 (21), 21382-21397, 2022
452022
Side channel attacks and countermeasures on pairing based cryptosystems over binary fields
TH Kim, T Takagi, DG Han, HW Kim, J Lim
International Conference on Cryptology and Network Security, 168-181, 2006
382006
Non-profiled side-channel attack based on deep learning using picture trace
YS Won, DG Han, D Jap, S Bhasin, JY Park
IEEE Access 9, 22480-22492, 2021
372021
Novel single-trace ML profiling attacks on NIST 3 round candidate Dilithium
IJ Kim, TH Lee, J Han, BY Sim, DG Han
Cryptology ePrint Archive, 2020
372020
Efficient implementation of pairing-based cryptography on a sensor node
M Shirase, Y Miyazaki, T Takagi, DG Han, D Choi
IEICE transactions on information and systems 92 (5), 909-917, 2009
372009
Security analysis on dummy based side-channel countermeasures—Case study: AES with dummy and shuffling
JH Lee, DG Han
Applied Soft Computing 93, 106352, 2020
342020
Improved computation of square roots in specific finite fields
DG Han, D Choi, H Kim
IEEE Transactions on Computers 58 (2), 188-196, 2008
332008
Novel side-channel attacks on quasi-cyclic code-based cryptography
BY Sim, J Kwon, KY Choi, J Cho, A Park, DG Han
IACR Transactions on Cryptographic Hardware and Embedded Systems, 180-212, 2019
312019
Performance enhancement of differential power analysis attacks with signal companding methods
JC Ryoo, DG Han, SK Kim, S Lee
IEEE signal processing letters 15, 625-628, 2008
272008
Side channel attack on Ha-Moon’s countermeasure of randomized signed scalar multiplication
K Okeya, DG Han
International Conference on Cryptology in India, 334-348, 2003
242003
A study on the side-channel analysis trends for application to IoT devices
B Sim, D Han
J. Internet Serv. Inf. Secur 10 (1), 2-21, 2020
232020
An efficient CRT-RSA algorithm secure against power and fault attacks
SK Kim, TH Kim, DG Han, S Hong
Journal of Systems and Software 84 (10), 1660-1669, 2011
222011
New security problem in RFID systems “Tag Killing”
DG Han, T Takagi, HW Kim, KI Chung
International Conference on Computational Science and Its Applications, 375-384, 2006
212006
The system can't perform the operation now. Try again later.
Articles 1–20