HeeSeok Kim
HeeSeok Kim
Dept. of AI Cyber Security, Korea Univ.
Verified email at
Cited by
Cited by
A fast and provably secure higher-order masking of AES S-box
HS Kim, S Hong, J Lim
International Workshop on Cryptographic Hardware and Embedded Systems, 95-107, 2011
Exploiting collisions in addition chain-based exponentiation algorithms using a single trace
N Hanley, HS Kim, M Tunstall
Topics in Cryptology–-CT-RSA 2015: The Cryptographer's Track at the RSA …, 2015
Practical second‐order correlation power analysis on the message blinding method and its novel countermeasure for RSA
HS Kim, TH Kim, JC Yoon, S Hong
ETRI journal 32 (1), 102-111, 2010
Non-profiled deep learning-based side-channel preprocessing with autoencoders
D Kwon, H Kim, S Hong
IEEE Access 9, 57692-57703, 2021
Recent advances in deep learning‐based side‐channel analysis
S Jin, S Kim, HS Kim, S Hong
ETRI Journal 42 (2), 292-304, 2020
Single trace side channel analysis on NTRU implementation
S An, S Kim, S Jin, HB Kim, HS Kim
Applied Sciences 8 (11), 2014, 2018
Efficient masking methods appropriate for the block ciphers ARIA and AES
HS Kim, TH Kim, DG Han, S Hong
ETRI Journal 32 (3), 370-379, 2010
Improving non-profiled side-channel attacks using autoencoder based preprocessing
D Kwon, HS Kim, S Hong
Cryptology ePrint Archive, 2020
Optimizing implementations of non-profiled deep learning-based side-channel attacks
D Kwon, S Hong, H Kim
IEEE Access 10, 5957-5967, 2022
Message blinding method requiring no multiplicative inversion for RSA
H Kim, DG Han, S Hong, JC Ha
ACM Transactions on Embedded Computing Systems (TECS) 13 (4), 1-10, 2014
Methods of encryption and decryption using operand ordering and encryption systems using the same
JC Yoon, S Hong, T Kim, KIM HeeSeok
US Patent 8,422,671, 2013
Single trace side-channel attack on key reconciliation in quantum key distribution system and its efficient countermeasures
D Park, GS Kim, D Heo, S Kim, HS Kim, S Hong
ICT Express 7 (1), 36-40, 2021
SCA-resistant GCM implementation on 8-Bit AVR microcontrollers
SC Seo, H Kim
IEEE Access 7, 103961-103978, 2019
Efficient masked implementation for SEED based on combined masking
HS Kim, YI Cho, D Choi, DG Han, S Hong
ETRI Journal 33 (2), 267-274, 2011
Improving Non-Profiled Side-Channel Analysis Using Auto-Encoder Based Noise Reduction Preprocessing
D Kwon, S Jin, HS Kim, S Hong
Journal of the Korea Institute of Information Security & Cryptology 29 (3 …, 2019
Exploiting collisions in addition chain-based exponentiation algorithms using a single trace
N Hanley, HS Kim, M Tunstall
Cryptology ePrint Archive, 2012
u-City 응용에서의 시간 패턴을 이용한 단기 전력 부하 예측
박성승, 손호선, 이동규, 지은미, 김희석, 류근호
한국공간정보시스템학회 논문지 11 (2), 177-181, 2009
Lightweight conversion from arithmetic to Boolean masking for embedded IoT processor
HB Kim, S Hong, HS Kim
Applied Sciences 9 (7), 1438, 2019
A methodology for multipurpose DNS Sinkhole analyzing double bounce emails
HS Kim, SS Choi, J Song
Neural Information Processing: 20th International Conference, ICONIP 2013 …, 2013
Side-channel vulnerabilities of unified point addition on binary huff curve and its countermeasure
SM Cho, S Jin, HS Kim
Applied Sciences 8 (10), 2002, 2018
The system can't perform the operation now. Try again later.
Articles 1–20