Follow
Suhri Kim
Suhri Kim
Sungshin Women's University
Verified email at sungshin.ac.kr
Title
Cited by
Cited by
Year
Optimized method for computing odd-degree isogenies on Edwards curves
S Kim, K Yoon, YH Park, S Hong
International Conference on the Theory and Application of Cryptology and …, 2019
522019
Recent advances in deep learning‐based side‐channel analysis
S Jin, S Kim, HS Kim, S Hong
Etri Journal 42 (2), 292-304, 2020
272020
Single trace analysis on constant time CDT sampler and its countermeasure
S Kim, S Hong
Applied Sciences 8 (10), 1809, 2018
272018
Efficient isogeny computations on twisted Edwards curves
S Kim, K Yoon, J Kwon, S Hong, YH Park
Security and Communication Networks 2018, 2018
252018
Single trace side channel analysis on NTRU implementation
S An, S Kim, S Jin, HB Kim, HS Kim
Applied Sciences 8 (11), 2014, 2018
222018
New hybrid method for isogeny-based cryptosystems using Edwards curves
S Kim, K Yoon, J Kwon, YH Park, S Hong
IEEE transactions on Information Theory 66 (3), 1934-1943, 2019
202019
Single trace side-channel attack on key reconciliation in quantum key distribution system and its efficient countermeasures
D Park, GS Kim, D Heo, S Kim, HS Kim, S Hong
ICT Express 7 (1), 36-40, 2021
122021
EMBLEM:(R) LWE-based key encapsulation with a new multi-bit encoding method
M Seo, S Kim, DH Lee, JH Park
International Journal of Information Security 19, 383-399, 2020
72020
Improved ring LWR-based key encapsulation mechanism using cyclotomic trinomials
SH Park, S Kim, DH Lee, JH Park
IEEE Access 8, 112585-112597, 2020
72020
Single trace side channel analysis on quantum key distribution
S Kim, S Jin, Y Lee, B Park, H Kim, S Hong
2018 International Conference on Information and Communication Technology …, 2018
72018
Complete analysis of implementing isogeny-based cryptography using huff form of elliptic curves
S Kim
IEEE Access 9, 154500-154512, 2021
62021
On the performance analysis for CSIDH-based cryptosystems
D Heo, S Kim, YH Park, S Hong
Applied Sciences 10 (19), 6927, 2020
62020
Optimized CSIDH implementation using a 2-torsion point
D Heo, S Kim, K Yoon, YH Park, S Hong
Cryptography 4 (3), 20, 2020
62020
Single trace attack on key reconciliation process for quantum key distribution
D Park, D Heo, S Kim, S Hong
2020 International Conference on Information and Communication Technology …, 2020
32020
Practical Usage of Radical Isogenies for CSIDH
D Heo, S Kim, S Hong
IEEE Access, 2023
12023
Single Trace Analysis against HyMES by Exploitation of Joint Distributions of Leakages
BG Park, S Kim, S Hong, HS Kim, SC Seo
Applied Sciences 10 (5), 1831, 2020
2020
The system can't perform the operation now. Try again later.
Articles 1–16