| Single-trace attacks on message encoding in lattice-based KEMs BY Sim, J Kwon, J Lee, IJ Kim, TH Lee, J Han, H Yoon, J Cho, DG Han IEEE Access 8, 183175-183191, 2020 | 102 | 2020 |
| PIPO: A lightweight block cipher with efficient higher-order masking software implementations H Kim, Y Jeon, G Kim, J Kim, BY Sim, DG Han, H Seo, S Kim, S Hong, ... International Conference on Information Security and Cryptology, 99-122, 2020 | 74 | 2020 |
| Side-channel attacks on post-quantum signature schemes based on multivariate quadratic equations:-rainbow and uov A Park, KA Shim, N Koo, DG Han IACR Transactions on Cryptographic Hardware and Embedded Systems, 500-523, 2018 | 63 | 2018 |
| Countermeasures against power analysis attacks for the NTRU public key cryptosystem MK Lee, JE Song, D Choi, DG Han IEICE transactions on fundamentals of electronics, communications and …, 2010 | 63 | 2010 |
| TinyECCK: Efficient Elliptic Curve Cryptography Implementation over GF(2m) on 8-Bit Micaz Mote SC Seo, DG Han, HC Kim, S Hong IEICE transactions on information and systems 91 (5), 1338-1347, 2008 | 59 | 2008 |
| Chosen ciphertext simple power analysis on software 8-bit implementation of ring-LWE encryption A Park, DG Han 2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), 1-6, 2016 | 49 | 2016 |
| A new method for designing lightweight S-boxes with high differential and linear branch numbers, and its application H Kim, Y Jeon, G Kim, J Kim, BY Sim, DG Han, H Seo, S Kim, S Hong, ... IEEE Access 9, 150592-150607, 2021 | 48 | 2021 |
| Chosen-ciphertext clustering attack on CRYSTALS-KYBER using the side-channel leakage of Barrett reduction BY Sim, A Park, DG Han IEEE Internet of Things Journal 9 (21), 21382-21397, 2022 | 45 | 2022 |
| Side channel attacks and countermeasures on pairing based cryptosystems over binary fields TH Kim, T Takagi, DG Han, HW Kim, J Lim International Conference on Cryptology and Network Security, 168-181, 2006 | 38 | 2006 |
| Non-profiled side-channel attack based on deep learning using picture trace YS Won, DG Han, D Jap, S Bhasin, JY Park IEEE Access 9, 22480-22492, 2021 | 37 | 2021 |
| Novel single-trace ML profiling attacks on NIST 3 round candidate Dilithium IJ Kim, TH Lee, J Han, BY Sim, DG Han Cryptology ePrint Archive, 2020 | 37 | 2020 |
| Efficient implementation of pairing-based cryptography on a sensor node M Shirase, Y Miyazaki, T Takagi, DG Han, D Choi IEICE transactions on information and systems 92 (5), 909-917, 2009 | 37 | 2009 |
| Security analysis on dummy based side-channel countermeasures—Case study: AES with dummy and shuffling JH Lee, DG Han Applied Soft Computing 93, 106352, 2020 | 34 | 2020 |
| Improved computation of square roots in specific finite fields DG Han, D Choi, H Kim IEEE Transactions on Computers 58 (2), 188-196, 2008 | 33 | 2008 |
| Novel side-channel attacks on quasi-cyclic code-based cryptography BY Sim, J Kwon, KY Choi, J Cho, A Park, DG Han IACR Transactions on Cryptographic Hardware and Embedded Systems, 180-212, 2019 | 31 | 2019 |
| Performance enhancement of differential power analysis attacks with signal companding methods JC Ryoo, DG Han, SK Kim, S Lee IEEE signal processing letters 15, 625-628, 2008 | 27 | 2008 |
| Side channel attack on Ha-Moon’s countermeasure of randomized signed scalar multiplication K Okeya, DG Han International Conference on Cryptology in India, 334-348, 2003 | 24 | 2003 |
| A study on the side-channel analysis trends for application to IoT devices B Sim, D Han J. Internet Serv. Inf. Secur 10 (1), 2-21, 2020 | 23 | 2020 |
| An efficient CRT-RSA algorithm secure against power and fault attacks SK Kim, TH Kim, DG Han, S Hong Journal of Systems and Software 84 (10), 1660-1669, 2011 | 22 | 2011 |
| New security problem in RFID systems “Tag Killing” DG Han, T Takagi, HW Kim, KI Chung International Conference on Computational Science and Its Applications, 375-384, 2006 | 21 | 2006 |