|
Search the dblp DataBase
Dong-Guk Han:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Dong-Guk Han, Nam Su Chang, Seok Won Jung, Young-Ho Park, Chang Han Kim, Heuisu Ryu
Cryptanalysis of the Full Version Randomized Addition-Subtraction Chains. [Citation Graph (0, 0)][DBLP] ACISP, 2003, pp:67-78 [Conf]
- Dong-Guk Han, Jongin Lim, Kouichi Sakurai
On Security of XTR Public Key Cryptosystems Against Side Channel Attacks. [Citation Graph (0, 0)][DBLP] ACISP, 2004, pp:454-465 [Conf]
- Dong-Guk Han, Hye-Young Park, Young-Ho Park, Sangjin Lee, Dong Hoon Lee, Hyungjin Yang
A Practical Approach Defeating Blackmailing. [Citation Graph (0, 0)][DBLP] ACISP, 2002, pp:464-481 [Conf]
- Dong-Guk Han, Katsuyuki Okeya, Tae-Hyun Kim, Yoon Sung Hwang, Young-Ho Park, Souhwan Jung
Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits. [Citation Graph (0, 0)][DBLP] ACNS, 2004, pp:398-413 [Conf]
- Tae-Hyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Ho Won Kim, Jongin Lim
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields. [Citation Graph (0, 0)][DBLP] CANS, 2006, pp:168-181 [Conf]
- Tae-Hyun Kim, Dong-Guk Han, Katsuyuki Okeya, Jongin Lim
Generic Cryptanalysis of Combined Countermeasures with Randomized BSD Representations. [Citation Graph (0, 0)][DBLP] CARDIS, 2006, pp:119-134 [Conf]
- Dong-Guk Han, Tsuyoshi Takagi, Tae-Hyun Kim, Howon Kim, Kyoil Chung
Collision Attack on XTR and a Countermeasure with a Fixed Pattern. [Citation Graph (0, 0)][DBLP] EUC Workshops, 2005, pp:864-873 [Conf]
- Dong-Guk Han, Tsuyoshi Takagi, Howon Kim, Kyoil Chung
New Security Problem in RFID Systems "Tag Killing". [Citation Graph (0, 0)][DBLP] ICCSA (3), 2006, pp:375-384 [Conf]
- Dong-Guk Han, Tetsuya Izu, Jongin Lim, Kouichi Sakurai
Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure. [Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:305-317 [Conf]
- Katsuyuki Okeya, Dong-Guk Han
Side Channel Attack on Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication. [Citation Graph (0, 0)][DBLP] INDOCRYPT, 2003, pp:334-348 [Conf]
- Dong-Guk Han, Tsuyoshi Takagi, Jongin Lim
Further Security Analysis of XTR. [Citation Graph (0, 0)][DBLP] ISPEC, 2006, pp:33-44 [Conf]
- Dong-Guk Han, Sung-Kyoung Kim, Howon Kim, Kyoil Chung, Jongin Lim
Secure Signed Radix- r Recoding Methods for Constrained-Embedded Devices. [Citation Graph (0, 0)][DBLP] ISPEC, 2007, pp:238-253 [Conf]
- Dong-Guk Han, Ki Soon Yoon, Young-Ho Park, Chang Han Kim, Jongin Lim
Optimal Extension Fields for XTR. [Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2002, pp:369-384 [Conf]
- Masaaki Shirase, Dong-Guk Han, Yasushi Hibino, Ho Won Kim, Tsuyoshi Takagi
Compressed XTR. [Citation Graph (0, 0)][DBLP] ACNS, 2007, pp:420-431 [Conf]
- Sung-Kyoung Kim, Dong-Guk Han, Howon Kim, Kyoil Chung, Jongin Lim
SPA Countermeasure Based on Unsigned Left-to-Right Recodings. [Citation Graph (0, 0)][DBLP] ATC, 2007, pp:286-295 [Conf]
- HeeSeok Kim, Tae-Hyun Kim, Jeong Choon Ryoo, Dong-Guk Han, Howon Kim, Jongin Lim
Enhanced Doubling Attacks on Signed-All-Bits Set Recoding. [Citation Graph (0, 0)][DBLP] WISTP, 2007, pp:39-52 [Conf]
A nobel key-search method for side channel attacks based on pattern recognition. [Citation Graph (, )][DBLP]
Search in 0.036secs, Finished in 0.038secs
|