Follow
Dong-Guk Han
Dong-Guk Han
Professor of Information Security, Cryptology, and Mathematics, Kookmin University
Verified email at kookmin.ac.kr
Title
Cited by
Cited by
Year
Single-trace attacks on message encoding in lattice-based KEMs
BY Sim, J Kwon, J Lee, IJ Kim, TH Lee, J Han, H Yoon, J Cho, DG Han
IEEE Access 8, 183175-183191, 2020
712020
TinyECCK: Efficient Elliptic Curve Cryptography Implementation over GF(2m) on 8-Bit Micaz Mote
SC Seo, DG Han, HC Kim, S Hong
IEICE transactions on information and systems 91 (5), 1338-1347, 2008
582008
PIPO: A Lightweight Block Cipher with Efficient Higher-Order Masking Software Implementations
H Kim, Y Jeon, G Kim, J Kim, BY Sim, DG Han, H Seo, S Kim, S Hong, ...
Information Security and Cryptology–ICISC 2020: 23rd International …, 2021
542021
Countermeasures against power analysis attacks for the NTRU public key cryptosystem
MK Lee, JE Song, D Choi, DG Han
IEICE transactions on fundamentals of electronics, communications and …, 2010
542010
Side-channel attacks on post-quantum signature schemes based on multivariate quadratic equations:-rainbow and uov
A Park, KA Shim, N Koo, DG Han
IACR Transactions on Cryptographic Hardware and Embedded Systems, 500-523, 2018
482018
Chosen ciphertext simple power analysis on software 8-bit implementation of ring-LWE encryption
A Park, DG Han
2016 IEEE Asian Hardware-Oriented Security and Trust (AsianHOST), 1-6, 2016
452016
Side channel attacks and countermeasures on pairing based cryptosystems over binary fields
TH Kim, T Takagi, DG Han, HW Kim, J Lim
Cryptology and Network Security: 5th International Conference, CANS 2006 …, 2006
382006
Efficient implementation of pairing-based cryptography on a sensor node
M Shirase, Y Miyazaki, T Takagi, DG Han, D Choi
IEICE transactions on information and systems 92 (5), 909-917, 2009
362009
Improved computation of square roots in specific finite fields
DG Han, D Choi, H Kim
IEEE Transactions on Computers 58 (2), 188-196, 2008
322008
Novel side-channel attacks on quasi-cyclic code-based cryptography
BY Sim, J Kwon, KY Choi, J Cho, A Park, DG Han
IACR Transactions on Cryptographic Hardware and Embedded Systems, 180-212, 2019
252019
Performance enhancement of differential power analysis attacks with signal companding methods
JC Ryoo, DG Han, SK Kim, S Lee
IEEE signal processing letters 15, 625-628, 2008
252008
Non-profiled side-channel attack based on deep learning using picture trace
YS Won, DG Han, D Jap, S Bhasin, JY Park
IEEE Access 9, 22480-22492, 2021
242021
A new method for designing lightweight S-boxes with high differential and linear branch numbers, and its application
H Kim, Y Jeon, G Kim, J Kim, BY Sim, DG Han, H Seo, S Kim, S Hong, ...
IEEE Access 9, 150592-150607, 2021
232021
Side channel attack on Ha-Moon’s countermeasure of randomized signed scalar multiplication
K Okeya, DG Han
Progress in Cryptology-INDOCRYPT 2003: 4th International Conference on …, 2003
232003
An efficient CRT-RSA algorithm secure against power and fault attacks
SK Kim, TH Kim, DG Han, S Hong
Journal of Systems and Software 84 (10), 1660-1669, 2011
212011
New security problem in RFID systems “Tag Killing”
DG Han, T Takagi, HW Kim, KI Chung
Computational Science and Its Applications-ICCSA 2006: International …, 2006
212006
Novel single-trace ML profiling attacks on NIST 3 round candidate Dilithium
IJ Kim, TH Lee, J Han, BY Sim, DG Han
Cryptology ePrint Archive, 2020
192020
A more compact representation of XTR cryptosystem
M Shirase, DG Han, Y Hibino, H Kim, T Takagi
IEICE transactions on fundamentals of electronics, communications and …, 2008
192008
Efficient masking methods appropriate for the block ciphers ARIA and AES
HS Kim, TH Kim, DG Han, S Hong
ETRI Journal 32 (3), 370-379, 2010
182010
Security analysis on dummy based side-channel countermeasures—Case study: AES with dummy and shuffling
JH Lee, DG Han
Applied Soft Computing 93, 106352, 2020
162020
The system can't perform the operation now. Try again later.
Articles 1–20