A fast and provably secure higher-order masking of AES S-box HS Kim, S Hong, J Lim Cryptographic Hardware and Embedded Systems–CHES 2011: 13th International ¡¦, 2011 | 121 | 2011 |
Exploiting collisions in addition chain-based exponentiation algorithms using a single trace N Hanley, HS Kim, M Tunstall Topics in Cryptology–-CT-RSA 2015: The Cryptographer's Track at the RSA ¡¦, 2015 | 56 | 2015 |
Practical second‐order correlation power analysis on the message blinding method and its novel countermeasure for RSA HS Kim, TH Kim, JC Yoon, S Hong ETRI journal 32 (1), 102-111, 2010 | 35 | 2010 |
Recent advances in deep learning‐based side‐channel analysis S Jin, S Kim, HS Kim, S Hong ETRI Journal 42 (2), 292-304, 2020 | 17 | 2020 |
Efficient masking methods appropriate for the block ciphers ARIA and AES HS Kim, TH Kim, DG Han, S Hong ETRI Journal 32 (3), 370-379, 2010 | 17 | 2010 |
Message blinding method requiring no multiplicative inversion for RSA H Kim, DG Han, S Hong, JC Ha ACM Transactions on Embedded Computing Systems (TECS) 13 (4), 1-10, 2014 | 15 | 2014 |
Single trace side channel analysis on NTRU implementation S An, S Kim, S Jin, HB Kim, HS Kim Applied Sciences 8 (11), 2014, 2018 | 13 | 2018 |
Improving non-profiled side-channel attacks using autoencoder based preprocessing D Kwon, HS Kim, S Hong Cryptology ePrint Archive, 2020 | 12 | 2020 |
Methods of encryption and decryption using operand ordering and encryption systems using the same JC Yoon, S Hong, T Kim, KIM HeeSeok US Patent 8,422,671, 2013 | 12 | 2013 |
Non-profiled deep learning-based side-channel preprocessing with autoencoders D Kwon, H Kim, S Hong IEEE Access 9, 57692-57703, 2021 | 11 | 2021 |
Single trace side-channel attack on key reconciliation in quantum key distribution system and its efficient countermeasures D Park, GS Kim, D Heo, S Kim, HS Kim, S Hong ICT Express 7 (1), 36-40, 2021 | 10 | 2021 |
Efficient masked implementation for SEED based on combined masking HS Kim, YI Cho, D Choi, DG Han, S Hong ETRI Journal 33 (2), 267-274, 2011 | 9 | 2011 |
Exploiting collisions in addition chain-based exponentiation algorithms using a single trace N Hanley, HS Kim, M Tunstall Cryptology ePrint Archive, 2012 | 8 | 2012 |
u-City ÀÀ¿ë¿¡¼ÀÇ ½Ã°£ ÆÐÅÏÀ» ÀÌ¿ëÇÑ ´Ü±â Àü·Â ºÎÇÏ ¿¹Ãø ¹Ú¼º½Â£¬ ¼ÕÈ£¼±£¬ À̵¿±Ô£¬ ÁöÀº¹Ì£¬ ±èÈñ¼®£¬ ·ù±ÙÈ£ Çѱ¹°ø°£Á¤º¸½Ã½ºÅÛÇÐȸ ³í¹®Áö 11 (2), 177-181, 2009 | 8 | 2009 |
SCA-resistant GCM implementation on 8-Bit AVR microcontrollers SC Seo, HS Kim IEEE Access 7, 103961-103978, 2019 | 7 | 2019 |
A methodology for multipurpose DNS Sinkhole analyzing double bounce emails HS Kim, SS Choi, J Song Neural Information Processing: 20th International Conference, ICONIP 2013 ¡¦, 2013 | 7 | 2013 |
Improving Non-Profiled Side-Channel Analysis Using Auto-Encoder Based Noise Reduction Preprocessing D Kwon, S Jin, HS Kim, S Hong Journal of the Korea Institute of Information Security & Cryptology 29 (3 ¡¦, 2019 | 6 | 2019 |
Optimizing implementations of non-profiled deep learning-based side-channel attacks D Kwon, S Hong, H Kim IEEE Access 10, 5957-5967, 2022 | 5 | 2022 |
Side-channel vulnerabilities of unified point addition on binary huff curve and its countermeasure SM Cho, S Jin, HS Kim Applied Sciences 8 (10), 2002, 2018 | 5 | 2018 |
A study on extraction of optimized API sequence length and combination for efficient malware classification J Choi, HS Kim, KI Kim, HS Park, JS Song Journal of the Korea Institute of Information Security & Cryptology 24 (5 ¡¦, 2014 | 5 | 2014 |