Showing 1 - 20 results of 22 for search 'Seokhie Hong', query time: 0.04s
Refine Results
-
1
Design and Security Analysis of Cryptosystems by Suhri Kim, Seokhie Hong
Published 2023-01-01
Article -
2
Improved Quantum Rebound Attacks on Double Block Length Hashing with Round-Reduced AES-256 and ARIA-256 by Dongjae Lee, Seokhie Hong
Published 2024-09-01
Article -
3
Practical Usage of Radical Isogenies for CSIDH by Donghoe Heo, Suhri Kim, Seokhie Hong
Published 2023-01-01
Article -
4
-
5
Security Analysis of HMAC/NMAC by Using Fault Injection by Kitae Jeong, Yuseop Lee, Jaechul Sung, Seokhie Hong
Published 2013-01-01
Article -
6
A preimage attack on reduced GIMLI‐HASH with unbalanced squeezing phase by Yongseong Lee, Jinkeon Kang, Donghoon Chang, Seokhie Hong
Published 2023-01-01
Article -
7
Power-Balancing Software Implementation to Mitigate Side-Channel Attacks without Using Look-Up Tables by HanBit Kim, HeeSeok Kim, Seokhie Hong
Published 2020-04-01
Article -
8
On the Performance Analysis for CSIDH-Based Cryptosystems by Donghoe Heo, Suhri Kim, Young-Ho Park, Seokhie Hong
Published 2020-10-01
Article -
9
Enhancing Time-Frequency Analysis with Zero-Mean Preprocessing by Sunghyun Jin, Philip Johansson, HeeSeok Kim, Seokhie Hong
Published 2022-03-01
Article -
10
Cloning Hardware Wallet Without Valid Credentials Through Side-Channel Analysis of Hash Function by Dongjun Park, Joonsup Kim, HeeSeok Kim, Seokhie Hong
Published 2024-01-01
Article -
11
Fast Implementation of NIST P-256 Elliptic Curve Cryptography on 8-Bit AVR Processor by Dong-won Park, Nam Su Chang, Sangyub Lee, Seokhie Hong
Published 2020-12-01
Article -
12
Comprehensive Analysis and Implementation of Isogeny-Based Hash Functions by Donghoe Heo, Jeonghwan Lee, Taehoon Kang, Suhri Kim, Seokhie Hong
Published 2024-01-01
Article -
13
Collision Attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis by Jinkeon Kang, Kitae Jeong, Jaechul Sung, Seokhie Hong, Kyungho Lee
Published 2013-01-01
Article -
14
Related-Key Cryptanalysis on the Full PRINTcipher Suitable for IC-Printing by Yuseop Lee, Kitae Jeong, Changhoon Lee, Jaechul Sung, Seokhie Hong
Published 2014-01-01
Article -
15
Improved Ciphertext-Only Attack on GMR-1 by Dongjae Lee, Deukjo Hong, Jaechul Sung, Seonggyeom Kim, Seokhie Hong
Published 2022-01-01
Article -
16
A Practical Ciphertext-Only Attack on GMR-2 System by Dongjae Lee, Jaewoo Kim, Deukjo Hong, Jaechul Sung, Seokhie Hong
Published 2023-01-01
Article -
17
Optimized CSIDH Implementation Using a 2-Torsion Point by Donghoe Heo, Suhri Kim, Kisoon Yoon, Young-Ho Park, Seokhie Hong
Published 2020-07-01
Article -
18
-
19
Security Analysis of Scalable Block Cipher PP-1 Applicable to Distributed Sensor Networks by Yuseop Lee, Kitae Jeong, Jaechul Sung, Changhoon Lee, Seokhie Hong, Ku-Young Chang
Published 2013-09-01
Article -
20
Autoscaled-Wavelet Convolutional Layer for Deep Learning-Based Side-Channel Analysis by Daehyeon Bae, Dongjun Park, Gyusang Kim, Minsig Choi, Nayeon Lee, Heeseok Kim, Seokhie Hong
Published 2023-01-01
Article