Optimized method for computing odd-degree isogenies on Edwards curves S Kim, K Yoon, YH Park, S Hong International Conference on the Theory and Application of Cryptology and …, 2019 | 52 | 2019 |
Recent advances in deep learning‐based side‐channel analysis S Jin, S Kim, HS Kim, S Hong Etri Journal 42 (2), 292-304, 2020 | 27 | 2020 |
Single trace analysis on constant time CDT sampler and its countermeasure S Kim, S Hong Applied Sciences 8 (10), 1809, 2018 | 27 | 2018 |
Efficient isogeny computations on twisted Edwards curves S Kim, K Yoon, J Kwon, S Hong, YH Park Security and Communication Networks 2018, 2018 | 25 | 2018 |
Single trace side channel analysis on NTRU implementation S An, S Kim, S Jin, HB Kim, HS Kim Applied Sciences 8 (11), 2014, 2018 | 22 | 2018 |
New hybrid method for isogeny-based cryptosystems using Edwards curves S Kim, K Yoon, J Kwon, YH Park, S Hong IEEE transactions on Information Theory 66 (3), 1934-1943, 2019 | 20 | 2019 |
Single trace side-channel attack on key reconciliation in quantum key distribution system and its efficient countermeasures D Park, GS Kim, D Heo, S Kim, HS Kim, S Hong ICT Express 7 (1), 36-40, 2021 | 12 | 2021 |
EMBLEM:(R) LWE-based key encapsulation with a new multi-bit encoding method M Seo, S Kim, DH Lee, JH Park International Journal of Information Security 19, 383-399, 2020 | 7 | 2020 |
Improved ring LWR-based key encapsulation mechanism using cyclotomic trinomials SH Park, S Kim, DH Lee, JH Park IEEE Access 8, 112585-112597, 2020 | 7 | 2020 |
Single trace side channel analysis on quantum key distribution S Kim, S Jin, Y Lee, B Park, H Kim, S Hong 2018 International Conference on Information and Communication Technology …, 2018 | 7 | 2018 |
Complete analysis of implementing isogeny-based cryptography using huff form of elliptic curves S Kim IEEE Access 9, 154500-154512, 2021 | 6 | 2021 |
On the performance analysis for CSIDH-based cryptosystems D Heo, S Kim, YH Park, S Hong Applied Sciences 10 (19), 6927, 2020 | 6 | 2020 |
Optimized CSIDH implementation using a 2-torsion point D Heo, S Kim, K Yoon, YH Park, S Hong Cryptography 4 (3), 20, 2020 | 6 | 2020 |
Single trace attack on key reconciliation process for quantum key distribution D Park, D Heo, S Kim, S Hong 2020 International Conference on Information and Communication Technology …, 2020 | 3 | 2020 |
Practical Usage of Radical Isogenies for CSIDH D Heo, S Kim, S Hong IEEE Access, 2023 | 1 | 2023 |
Single Trace Analysis against HyMES by Exploitation of Joint Distributions of Leakages BG Park, S Kim, S Hong, HS Kim, SC Seo Applied Sciences 10 (5), 1831, 2020 | | 2020 |