The SCEAS System
Navigation Menu

Search the dblp DataBase


Dong-Guk Han: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Dong-Guk Han, Nam Su Chang, Seok Won Jung, Young-Ho Park, Chang Han Kim, Heuisu Ryu
    Cryptanalysis of the Full Version Randomized Addition-Subtraction Chains. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:67-78 [Conf]
  2. Dong-Guk Han, Jongin Lim, Kouichi Sakurai
    On Security of XTR Public Key Cryptosystems Against Side Channel Attacks. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:454-465 [Conf]
  3. Dong-Guk Han, Hye-Young Park, Young-Ho Park, Sangjin Lee, Dong Hoon Lee, Hyungjin Yang
    A Practical Approach Defeating Blackmailing. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:464-481 [Conf]
  4. Dong-Guk Han, Katsuyuki Okeya, Tae-Hyun Kim, Yoon Sung Hwang, Young-Ho Park, Souhwan Jung
    Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:398-413 [Conf]
  5. Tae-Hyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Ho Won Kim, Jongin Lim
    Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields. [Citation Graph (0, 0)][DBLP]
    CANS, 2006, pp:168-181 [Conf]
  6. Tae-Hyun Kim, Dong-Guk Han, Katsuyuki Okeya, Jongin Lim
    Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2006, pp:119-134 [Conf]
  7. Dong-Guk Han, Tsuyoshi Takagi, Tae-Hyun Kim, Howon Kim, Kyoil Chung
    Collision Attack on XTR and a Countermeasure with a Fixed Pattern. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:864-873 [Conf]
  8. Dong-Guk Han, Tsuyoshi Takagi, Howon Kim, Kyoil Chung
    New Security Problem in RFID Systems "Tag Killing". [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:375-384 [Conf]
  9. Dong-Guk Han, Tetsuya Izu, Jongin Lim, Kouichi Sakurai
    Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:305-317 [Conf]
  10. Katsuyuki Okeya, Dong-Guk Han
    Side Channel Attack on Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2003, pp:334-348 [Conf]
  11. Dong-Guk Han, Tsuyoshi Takagi, Jongin Lim
    Further Security Analysis of XTR. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:33-44 [Conf]
  12. Dong-Guk Han, Sung-Kyoung Kim, Howon Kim, Kyoil Chung, Jongin Lim
    Secure Signed Radix- r Recoding Methods for Constrained-Embedded Devices. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:238-253 [Conf]
  13. Dong-Guk Han, Ki Soon Yoon, Young-Ho Park, Chang Han Kim, Jongin Lim
    Optimal Extension Fields for XTR. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2002, pp:369-384 [Conf]
  14. Masaaki Shirase, Dong-Guk Han, Yasushi Hibino, Ho Won Kim, Tsuyoshi Takagi
    Compressed XTR. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:420-431 [Conf]
  15. Sung-Kyoung Kim, Dong-Guk Han, Howon Kim, Kyoil Chung, Jongin Lim
    SPA Countermeasure Based on Unsigned Left-to-Right Recodings. [Citation Graph (0, 0)][DBLP]
    ATC, 2007, pp:286-295 [Conf]
  16. HeeSeok Kim, Tae-Hyun Kim, Jeong Choon Ryoo, Dong-Guk Han, Howon Kim, Jongin Lim
    Enhanced Doubling Attacks on Signed-All-Bits Set Recoding. [Citation Graph (0, 0)][DBLP]
    WISTP, 2007, pp:39-52 [Conf]

  17. A nobel key-search method for side channel attacks based on pattern recognition. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002