Follow
Dooho Choi
Dooho Choi
Korea University Sejong
Verified email at korea.ac.kr
Title
Cited by
Cited by
Year
New signature scheme using conjugacy problem
KH Ko, DH Choi, MS Cho, JW Lee
Cryptology ePrint Archive, 2002
1182002
Countermeasures against power analysis attacks for the NTRU public key cryptosystem
MK Lee, JE Song, D Choi, DG Han
IEICE transactions on fundamentals of electronics, communications and …, 2010
542010
Electronic tag including privacy level information and privacy protection apparatus and method using RFID tag
BG Lee, DH Choi, HW Kim, KI Chung
US Patent 7,847,694, 2010
472010
A security framework for a drone delivery service
SH Seo, J Won, E Bertino, Y Kang, D Choi
Proceedings of the 2Nd Workshop on Micro Aerial Vehicle Networks, Systems …, 2016
462016
Differential Fault Analysis for Round‐Reduced AES by Fault Injection
JH Park, SJ Moon, DH Choi, YS Kang, JC Ha
ETRI Journal 33 (3), 434-442, 2011
432011
Mobile IP and WLAN with AAA authentication protocol using identity-based cryptography
BG Lee, DH Choi, HG Kim, SW Sohn, KH Park
10th International Conference on Telecommunications, 2003. ICT 2003. 1, 597-603, 2003
402003
Method and system for authenticating rfid tag
YS Kang, YJ Choi, DH Choi, KI Chung, HS Cho
US Patent App. 12/498,221, 2010
382010
Efficient implementation of pairing-based cryptography on a sensor node
M Shirase, Y Miyazaki, T Takagi, DG Han, D Choi
IEICE transactions on information and systems 92 (5), 909-917, 2009
362009
Privacy-preserving cross-user source-based data deduplication in cloud storage
S Lee, D Choi
2012 International conference on ICT convergence (ICTC), 329-330, 2012
342012
Two-factor fuzzy commitment for unmanned IoT devices security
D Choi, SH Seo, YS Oh, Y Kang
IEEE Internet of Things Journal 6 (1), 335-348, 2018
332018
Improved computation of square roots in specific finite fields
DG Han, D Choi, H Kim
IEEE Transactions on Computers 58 (2), 188-196, 2008
322008
Parameterizations of 1-bridge torus knots
DH Choi, KH Ko
Journal of Knot Theory and Its Ramifications 12 (04), 463-491, 2003
322003
Puf based iot device authentication scheme
B Kim, S Yoon, Y Kang, D Choi
2019 international conference on information and communication technology …, 2019
312019
Product authentication service of consumer's mobile RFID device
J Kim, D Choi, I Kim, H Kim
2006 IEEE International Symposium on Consumer Electronics, 1-6, 2006
292006
Secure device and method for preventing side channel attack
JH Kim, YS Kang, DH Choi, YJ Choi
US Patent 8,341,758, 2012
242012
Implementing side channel analysis evaluation boards of KLA-SCARF system
YJ Choi, DH Choi, JC Ryou
Journal of the Korea Institute of Information Security & Cryptology 24 (1 …, 2014
202014
Puf-based authentication scheme for iot devices
S Yoon, B Kim, Y Kang, D Choi
2020 international conference on information and communication technology …, 2020
192020
Electronic tag for protecting privacy and method of protecting privacy using the same
DH Choi, JH Kim, HW Kim, KI Chung
US Patent App. 11/893,496, 2008
192008
Secure session key exchange for mobile IP low latency handoffs
HG Kim, DH Choi, DY Kim
Computational Science and Its Applications—ICCSA 2003: International …, 2003
182003
Conditional Re‐encoding Method for Cryptanalysis‐Resistant White‐Box AES
S Lee, D Choi, YJ Choi
ETRI Journal 37 (5), 1012-1022, 2015
172015
The system can't perform the operation now. Try again later.
Articles 1–20