Follow
Sunghyun Jin
Title
Cited by
Cited by
Year
Recent advances in deep learning‐based side‐channel analysis
S Jin, S Kim, HS Kim, S Hong
ETRI Journal 42 (2), 292-304, 2020
172020
Single Trace Side Channel Analysis on NTRU Implementation
S An, S Kim, S Jin, HB Kim, HS Kim
Applied Sciences 8 (11), 2014, 2018
132018
Single Trace Side Channel Analysis on Quantum Key Distribution
S Kim, S Jin, Y Lee, B Park, H Kim, S Hong
2018 International Conference on Information and Communication Technology …, 2018
82018
Improving Non-Profiled Side-Channel Analysis Using Auto-Encoder Based Noise Reduction Preprocessing
D Kwon, S Jin, HS Kim, S Hong
Journal of the Korea Institute of Information Security & Cryptology 29 (3 …, 2019
7*2019
Side-Channel Vulnerabilities of Unified Point Addition on Binary Huff Curve and Its Countermeasure
SM Cho, S Jin, HS Kim
Applied Sciences 8 (10), 2002, 2018
52018
Power Trace Selection Method in Template Profiling Phase for Improvements of Template Attack
S Jin, T Kim, HS Kim, S Hong
Journal of the Korea Institute of Information Security and Cryptology 27 (1 …, 2017
22017
Enhancing Time-Frequency Analysis with Zero-Mean Preprocessing
S Jin, P Johansson, HS Kim, S Hong
Sensors 22 (7), 2477, 2022
12022
Novel Key Recovery Attack on Secure ECDSA Implementation by Exploiting Collisions between Unknown Entries
S Jin, S Lee, SM Cho, HS Kim, S Hong
IACR Transactions on Cryptographic Hardware and Embedded Systems, 1-26, 2021
12021
New Higher-Order Differential Computation Analysis on Masked White-Box AES
Y Lee, S Jin, H Kim, HS Kim, S Hong
Journal of the Korea Institute of Information Security & Cryptology 30 (1), 1-15, 2020
12020
Enhanced Side-Channel Analysis on ECDSA Employing Fixed-Base Comb Method
S Jin, SM Cho, HS Kim, S Hong
IEEE Transactions on Computers 71 (9), 2341-2350, 2022
2022
딥러닝을 이용한 부채널 분석 기술 연구 동향
S Jin, HS Kim
Review of KIISC 30 (1), 43-53, 2020
2020
Single Trace Analysis against HyMES by Exploitation of Joint Distributions of Leakages
BG Park, S Kim, H Kim, S Jin, HS Kim, S Hong
Journal of the Korea Institute of Information Security & Cryptology 28 (5 …, 2018
2018
Single Trace Side Channel Analysis on NTRUEncrypt Implementation
S An, S Kim, S Jin, HB Kim, HS Kim, S Hong
Journal of the Korea Institute of Information Security & Cryptology 28 (5 …, 2018
2018
Improved Side Channel Analysis Using Power Consumption Table
G Ko, S Jin, H Kim, HS Kim, S Hong
Journal of the Korea Institute of Information Security & Cryptology 27 (4 …, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–14