BibTeX records: JaeCheol Ha

download as .bib file

@article{DBLP:journals/sensors/BaeH22,
  author       = {Daehyeon Bae and
                  JaeCheol Ha},
  title        = {Implementation of Disassembler on Microcontroller Using Side-Channel
                  Power Consumption Leakage},
  journal      = {Sensors},
  volume       = {22},
  number       = {15},
  pages        = {5900},
  year         = {2022},
  url          = {https://doi.org/10.3390/s22155900},
  doi          = {10.3390/S22155900},
  timestamp    = {Mon, 26 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/BaeH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/BaeH21,
  author       = {Daehyeon Bae and
                  JaeCheol Ha},
  title        = {Performance Metric for Differential Deep Learning Analysis},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {11},
  number       = {2},
  pages        = {22--33},
  year         = {2021},
  url          = {https://doi.org/10.22667/JISIS.2021.05.31.022},
  doi          = {10.22667/JISIS.2021.05.31.022},
  timestamp    = {Wed, 16 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/BaeH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icea/BaeHH20,
  author       = {Daehyeon Bae and
                  Jongbae Hwang and
                  JaeCheol Ha},
  title        = {Breaking a Masked {AES} Implementation Using a Deep Learning-based
                  Attack},
  booktitle    = {{ACM} {ICEA} '20: 2020 {ACM} International Conference on Intelligent
                  Computing and its Emerging Applications, GangWon Republic of Korea,
                  December 12 - 15, 2020},
  pages        = {22:1--22:5},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3440943.3444724},
  doi          = {10.1145/3440943.3444724},
  timestamp    = {Wed, 29 Sep 2021 09:35:11 +0200},
  biburl       = {https://dblp.org/rec/conf/icea/BaeHH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iasc/ChoiCLH16,
  author       = {YongJe Choi and
                  Dooho Choi and
                  Hoonjae Lee and
                  JaeCheol Ha},
  title        = {An Improved Square-always Exponentiation Resistant to Side-channel
                  Attacks on {RSA} Implementation},
  journal      = {Intell. Autom. Soft Comput.},
  volume       = {22},
  number       = {3},
  pages        = {353--363},
  year         = {2016},
  url          = {https://doi.org/10.1080/10798587.2015.1118909},
  doi          = {10.1080/10798587.2015.1118909},
  timestamp    = {Fri, 26 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iasc/ChoiCLH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcm/KimCCH16,
  author       = {HyeongDong Kim and
                  YongJe Choi and
                  Dooho Choi and
                  JaeCheol Ha},
  title        = {A secure exponentiation algorithm resistant to a combined attack on
                  {RSA} implementation},
  journal      = {Int. J. Comput. Math.},
  volume       = {93},
  number       = {2},
  pages        = {258--272},
  year         = {2016},
  url          = {https://doi.org/10.1080/00207160.2014.935353},
  doi          = {10.1080/00207160.2014.935353},
  timestamp    = {Sun, 28 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcm/KimCCH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/HaCCL14,
  author       = {JaeCheol Ha and
                  YongJe Choi and
                  Dooho Choi and
                  Hoonjae Lee},
  title        = {Power Analysis Attacks on the Right-to-Left Square-Always Exponentiation
                  Algorithm},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {4},
  number       = {4},
  pages        = {38--51},
  year         = {2014},
  url          = {https://doi.org/10.22667/JISIS.2014.11.31.038},
  doi          = {10.22667/JISIS.2014.11.31.038},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/HaCCL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tecs/KimHHH14,
  author       = {HeeSeok Kim and
                  Dong{-}Guk Han and
                  Seokhie Hong and
                  JaeCheol Ha},
  title        = {Message blinding method requiring no multiplicative inversion for
                  {RSA}},
  journal      = {{ACM} Trans. Embed. Comput. Syst.},
  volume       = {13},
  number       = {4},
  pages        = {80:1--80:10},
  year         = {2014},
  url          = {https://doi.org/10.1145/2560020},
  doi          = {10.1145/2560020},
  timestamp    = {Tue, 08 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tecs/KimHHH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tjs/ParkBCCH14,
  author       = {Jeong{-}Soo Park and
                  KiSeok Bae and
                  YongJe Choi and
                  Dooho Choi and
                  Jae{-}Cheol Ha},
  title        = {A fault-resistant implementation of {AES} using differential bytes
                  between input and output},
  journal      = {J. Supercomput.},
  volume       = {67},
  number       = {3},
  pages        = {615--634},
  year         = {2014},
  url          = {https://doi.org/10.1007/s11227-013-0950-7},
  doi          = {10.1007/S11227-013-0950-7},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tjs/ParkBCCH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/KimCCH13,
  author       = {Hyungdong Kim and
                  YongJe Choi and
                  Dooho Choi and
                  JaeCheol Ha},
  title        = {A New Exponentiation Algorithm Resistant to Combined Side Channel
                  Attack},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {3},
  number       = {3/4},
  pages        = {17--27},
  year         = {2013},
  url          = {https://doi.org/10.22667/JISIS.2013.11.31.017},
  doi          = {10.22667/JISIS.2013.11.31.017},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/KimCCH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/imis/BaeMH13,
  author       = {KiSeok Bae and
                  Sang{-}Jae Moon and
                  JaeCheol Ha},
  editor       = {Leonard Barolli and
                  Ilsun You and
                  Fatos Xhafa and
                  Fang{-}Yie Leu and
                  Hsing{-}Chung Chen},
  title        = {Instruction Fault Attack on the Miller Algorithm in a Pairing-Based
                  Cryptosystem},
  booktitle    = {Seventh International Conference on Innovative Mobile and Internet
                  Services in Ubiquitous Computing, {IMIS} 2013, Taichung, Taiwan, July
                  3-5, 2013},
  pages        = {167--174},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/IMIS.2013.36},
  doi          = {10.1109/IMIS.2013.36},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/imis/BaeMH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/ParkBCCH12,
  author       = {Jeong{-}Soo Park and
                  KiSeok Bae and
                  YongJe Choi and
                  Dooho Choi and
                  JaeCheol Ha},
  title        = {A Fault-Resistant {AES} Implementation Using Differential Characteristic
                  of Input and Output},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {2},
  number       = {3/4},
  pages        = {93--109},
  year         = {2012},
  url          = {https://doi.org/10.22667/JOWUA.2012.11.31.093},
  doi          = {10.22667/JOWUA.2012.11.31.093},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/ParkBCCH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ParkH12,
  author       = {JeaHoon Park and
                  JaeCheol Ha},
  editor       = {Dong Hoon Lee and
                  Moti Yung},
  title        = {Improved Differential Fault Analysis on Block Cipher {ARIA}},
  booktitle    = {Information Security Applications - 13th International Workshop, {WISA}
                  2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7690},
  pages        = {82--95},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35416-8\_7},
  doi          = {10.1007/978-3-642-35416-8\_7},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ParkH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/BaeALHM11,
  author       = {KiSeok Bae and
                  MahnKi Ahn and
                  Hoon{-}Jae Lee and
                  JaeCheol Ha and
                  Sang{-}Jae Moon},
  editor       = {Jan J{\"{u}}rjens and
                  Seok{-}Won Lee and
                  Mattia Monga},
  title        = {Power analysis attack and countermeasure on the Rabbit Stream Cipher
                  (position paper)},
  booktitle    = {Proceedings of the 7th International Workshop on Software Engineering
                  for Secure Systems, {SESS} 2011, Waikiki, Honolulu, HI, USA, May 22,
                  2011},
  pages        = {50--56},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1988630.1988640},
  doi          = {10.1145/1988630.1988640},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/BaeALHM11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/interaction/ParkBMCKH09,
  author       = {JeaHoon Park and
                  KiSeok Bae and
                  Sang{-}Jae Moon and
                  Dooho Choi and
                  You Sung Kang and
                  JaeCheol Ha},
  editor       = {Sungwon Sohn and
                  Ling Chen and
                  Soonwook Hwang and
                  Kyungeun Cho and
                  Shigeo Kawata and
                  Kyhyun Um and
                  Franz I. S. Ko and
                  Kae{-}Dal Kwack and
                  Jong Hyung Lee and
                  Gang Kou and
                  Kiyoshi Nakamura and
                  Alvis Cheuk M. Fong and
                  Patrick C. M. Ma},
  title        = {A new fault cryptanalysis on montgomery ladder exponentiation algorithm},
  booktitle    = {Proceedings of the 2nd International Conference on Interaction Sciences:
                  Information Technology, Culture and Human {(ICIS} 2009), Seoul, Korea,
                  24-26 November 2009},
  series       = {{ACM} International Conference Proceeding Series},
  volume       = {403},
  pages        = {896--899},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1655925.1656088},
  doi          = {10.1145/1655925.1656088},
  timestamp    = {Sun, 28 Feb 2021 18:18:34 +0100},
  biburl       = {https://dblp.org/rec/conf/interaction/ParkBMCKH09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/HaMZH08,
  author       = {JungHoon Ha and
                  Sang{-}Jae Moon and
                  Jianying Zhou and
                  JaeCheol Ha},
  editor       = {Sushil Jajodia and
                  Javier L{\'{o}}pez},
  title        = {A New Formal Proof Model for {RFID} Location Privacy},
  booktitle    = {Computer Security - {ESORICS} 2008, 13th European Symposium on Research
                  in Computer Security, M{\'{a}}laga, Spain, October 6-8, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5283},
  pages        = {267--281},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88313-5\_18},
  doi          = {10.1007/978-3-540-88313-5\_18},
  timestamp    = {Thu, 29 Aug 2019 08:09:59 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/HaMZH08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euc/HaKPMNB07,
  author       = {JaeCheol Ha and
                  Hwankoo Kim and
                  JeaHoon Park and
                  Sang{-}Jae Moon and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Colin Boyd},
  editor       = {Mieso K. Denko and
                  Chi{-}Sheng Shih and
                  Kuan{-}Ching Li and
                  Shiao{-}Li Tsao and
                  Qing{-}An Zeng and
                  Soo{-}Hyun Park and
                  Young{-}Bae Ko and
                  Shih{-}Hao Hung and
                  Jong Hyuk Park},
  title        = {{HGLAP} - Hierarchical Group-Index Based Lightweight Authentication
                  Protocol for Distributed {RFID} System},
  booktitle    = {Emerging Directions in Embedded and Ubiquitous Computing, {EUC} 2007
                  Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei,
                  Taiwan, December 17-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4809},
  pages        = {557--567},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77090-9\_52},
  doi          = {10.1007/978-3-540-77090-9\_52},
  timestamp    = {Wed, 22 Jun 2022 09:02:26 +0200},
  biburl       = {https://dblp.org/rec/conf/euc/HaKPMNB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euc/HaMNB07,
  author       = {JaeCheol Ha and
                  Sang{-}Jae Moon and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Colin Boyd},
  editor       = {Mieso K. Denko and
                  Chi{-}Sheng Shih and
                  Kuan{-}Ching Li and
                  Shiao{-}Li Tsao and
                  Qing{-}An Zeng and
                  Soo{-}Hyun Park and
                  Young{-}Bae Ko and
                  Shih{-}Hao Hung and
                  Jong Hyuk Park},
  title        = {Low-Cost and Strong-Security {RFID} Authentication Protocol},
  booktitle    = {Emerging Directions in Embedded and Ubiquitous Computing, {EUC} 2007
                  Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei,
                  Taiwan, December 17-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4809},
  pages        = {795--807},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77090-9\_72},
  doi          = {10.1007/978-3-540-77090-9\_72},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/euc/HaMNB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pakdd/HaMNB07,
  author       = {JaeCheol Ha and
                  Sang{-}Jae Moon and
                  Juan Manuel Gonz{\'{a}}lez Nieto and
                  Colin Boyd},
  editor       = {Takashi Washio and
                  Zhi{-}Hua Zhou and
                  Joshua Zhexue Huang and
                  Xiaohua Hu and
                  Jinyan Li and
                  Chao Xie and
                  Jieyue He and
                  Deqing Zou and
                  Kuan{-}Ching Li and
                  M{\'{a}}rio M. Freire},
  title        = {Security Analysis and Enhancement of One-Way Hash Based Low-Cost Authentication
                  Protocol {(OHLCAP)}},
  booktitle    = {Emerging Technologies in Knowledge Discovery and Data Mining, {PAKDD}
                  2007, International Workshops, Nanjing, China, May 22-25, 2007, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4819},
  pages        = {574--583},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77018-3\_57},
  doi          = {10.1007/978-3-540-77018-3\_57},
  timestamp    = {Fri, 09 Apr 2021 17:11:17 +0200},
  biburl       = {https://dblp.org/rec/conf/pakdd/HaMNB07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/HaPMY07,
  author       = {JaeCheol Ha and
                  JeaHoon Park and
                  Sang{-}Jae Moon and
                  Sung{-}Ming Yen},
  editor       = {Sehun Kim and
                  Moti Yung and
                  Hyung{-}Woo Lee},
  title        = {Provably Secure Countermeasure Resistant to Several Types of Power
                  Attack for {ECC}},
  booktitle    = {Information Security Applications, 8th International Workshop, {WISA}
                  2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4867},
  pages        = {333--344},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77535-5\_24},
  doi          = {10.1007/978-3-540-77535-5\_24},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/HaPMY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/ParkLHCKM06,
  author       = {JeaHoon Park and
                  Hoon{-}Jae Lee and
                  JaeCheol Ha and
                  YongJe Choi and
                  Howon Kim and
                  Sang{-}Jae Moon},
  editor       = {Yuping Wang and
                  Yiu{-}ming Cheung and
                  Hai{-}Lin Liu},
  title        = {A Differential Power Analysis Attack of Block Cipher Based on the
                  Hamming Weight of Internal Operation Unit},
  booktitle    = {Computational Intelligence and Security, International Conference,
                  {CIS} 2006, Guangzhou, China, November 3-6, 2006, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4456},
  pages        = {417--426},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-74377-4\_44},
  doi          = {10.1007/978-3-540-74377-4\_44},
  timestamp    = {Thu, 02 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/ParkLHCKM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icuct/HaHMB06,
  author       = {JaeCheol Ha and
                  JungHoon Ha and
                  Sang{-}Jae Moon and
                  Colin Boyd},
  editor       = {Frank Stajano and
                  Hyoung Joong Kim and
                  Jong{-}Suk Chae and
                  Seong{-}Dong Kim},
  title        = {{LRMAP:} Lightweight and Resynchronous Mutual Authentication Protocol
                  for {RFID} System},
  booktitle    = {Ubiquitous Convergence Technology, First International Conference,
                  {ICUCT} 2006, Jeju Island, Korea, December 5-6, 2006, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4412},
  pages        = {80--89},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-71789-8\_9},
  doi          = {10.1007/978-3-540-71789-8\_9},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/icuct/HaHMB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/HaKMPY05,
  author       = {JaeCheol Ha and
                  ChangKyun Kim and
                  Sang{-}Jae Moon and
                  IlHwan Park and
                  HyungSo Yoo},
  editor       = {Laurence Tianruo Yang and
                  Omer F. Rana and
                  Beniamino Di Martino and
                  Jack J. Dongarra},
  title        = {Differential Power Analysis on Block Cipher {ARIA}},
  booktitle    = {High Performance Computing and Communications, First International
                  Conference, {HPCC} 2005, Sorrento, Italy, September 21-23, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3726},
  pages        = {541--548},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11557654\_63},
  doi          = {10.1007/11557654\_63},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/hpcc/HaKMPY05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/KimHMYK05,
  author       = {ChangKyun Kim and
                  JaeCheol Ha and
                  Sang{-}Jae Moon and
                  Sung{-}Ming Yen and
                  Sung{-}Hyun Kim},
  editor       = {Laurence Tianruo Yang and
                  Omer F. Rana and
                  Beniamino Di Martino and
                  Jack J. Dongarra},
  title        = {A CRT-Based {RSA} Countermeasure Against Physical Cryptanalysis},
  booktitle    = {High Performance Computing and Communications, First International
                  Conference, {HPCC} 2005, Sorrento, Italy, September 21-23, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3726},
  pages        = {549--554},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11557654\_64},
  doi          = {10.1007/11557654\_64},
  timestamp    = {Tue, 23 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hpcc/KimHMYK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/KimPHLP05,
  author       = {Hwankoo Kim and
                  Bongjoo Park and
                  JaeCheol Ha and
                  Byoungcheon Lee and
                  DongGook Park},
  editor       = {Osvaldo Gervasi and
                  Marina L. Gavrilova and
                  Vipin Kumar and
                  Antonio Lagan{\`{a}} and
                  Heow Pueh Lee and
                  Youngsong Mun and
                  David Taniar and
                  Chih Jeng Kenneth Tan},
  title        = {New Key Management Systems for Multilevel Security},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2005, International
                  Conference, Singapore, May 9-12, 2005, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3481},
  pages        = {245--253},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11424826\_26},
  doi          = {10.1007/11424826\_26},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/KimPHLP05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/YenKMH05,
  author       = {Sung{-}Ming Yen and
                  Lee{-}Chun Ko and
                  Sang{-}Jae Moon and
                  JaeCheol Ha},
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {Relative Doubling Attack Against Montgomery Ladder},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  pages        = {117--128},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11734727\_11},
  doi          = {10.1007/11734727\_11},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/YenKMH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/YenLMH05,
  author       = {Sung{-}Ming Yen and
                  Wei{-}Chih Lien and
                  Sang{-}Jae Moon and
                  JaeCheol Ha},
  editor       = {Ed Dawson and
                  Serge Vaudenay},
  title        = {Power Analysis by Exploiting Chosen Message and Internal Collisions
                  - Vulnerability of Checking Mechanism for RSA-Decryption},
  booktitle    = {Progress in Cryptology - Mycrypt 2005, First International Conference
                  on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3715},
  pages        = {183--195},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11554868\_13},
  doi          = {10.1007/11554868\_13},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/YenLMH05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimHMYLK05,
  author       = {ChangKyun Kim and
                  JaeCheol Ha and
                  Sang{-}Jae Moon and
                  Sung{-}Ming Yen and
                  Wei{-}Chih Lien and
                  Sung{-}Hyun Kim},
  title        = {An Improved and Efficient Countermeasure against Power Analysis Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {22},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/022},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KimHMYLK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/KimHKKYM04,
  author       = {ChangKyun Kim and
                  JaeCheol Ha and
                  Sung{-}Hyun Kim and
                  Seokyu Kim and
                  Sung{-}Ming Yen and
                  Sang{-}Jae Moon},
  editor       = {Antonio Lagan{\`{a}} and
                  Marina L. Gavrilova and
                  Vipin Kumar and
                  Youngsong Mun and
                  Chih Jeng Kenneth Tan and
                  Osvaldo Gervasi},
  title        = {A Secure and Practical CRT-Based {RSA} to Resist Side Channel Attacks},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2004, International
                  Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3043},
  pages        = {150--158},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24707-4\_19},
  doi          = {10.1007/978-3-540-24707-4\_19},
  timestamp    = {Thu, 28 Apr 2022 16:17:38 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/KimHKKYM04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/YenCMH04,
  author       = {Sung{-}Ming Yen and
                  Chien{-}Ning Chen and
                  Sang{-}Jae Moon and
                  JaeCheol Ha},
  editor       = {Choonsik Park and
                  Seongtaek Chee},
  title        = {Improvement on Ha-Moon Randomized Exponentiation Algorithm},
  booktitle    = {Information Security and Cryptology - {ICISC} 2004, 7th International
                  Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3506},
  pages        = {154--167},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11496618\_12},
  doi          = {10.1007/11496618\_12},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/YenCMH04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/YooKHMP04,
  author       = {HyungSo Yoo and
                  ChangKyun Kim and
                  JaeCheol Ha and
                  Sang{-}Jae Moon and
                  IlHwan Park},
  editor       = {Chae Hoon Lim and
                  Moti Yung},
  title        = {Side Channel Cryptanalysis on {SEED}},
  booktitle    = {Information Security Applications, 5th International Workshop, {WISA}
                  2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3325},
  pages        = {411--424},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31815-6\_33},
  doi          = {10.1007/978-3-540-31815-6\_33},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/YooKHMP04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YenMH03,
  author       = {Sung{-}Ming Yen and
                  Sang{-}Jae Moon and
                  JaeCheol Ha},
  editor       = {Reihaneh Safavi{-}Naini and
                  Jennifer Seberry},
  title        = {Permanent Fault Attack on the Parameters of {RSA} with {CRT}},
  booktitle    = {Information Security and Privacy, 8th Australasian Conference, {ACISP}
                  2003, Wollongong, Australia, July 9-11, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2727},
  pages        = {285--296},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-45067-X\_25},
  doi          = {10.1007/3-540-45067-X\_25},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YenMH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/AhnHLM03,
  author       = {MahnKi Ahn and
                  JaeCheol Ha and
                  Hoon{-}Jae Lee and
                  Sang{-}Jae Moon},
  editor       = {Vipin Kumar and
                  Marina L. Gavrilova and
                  Chih Jeng Kenneth Tan and
                  Pierre L'Ecuyer},
  title        = {A Random M-ary Method Based Countermeasure against Side Channel Attacks},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2003, International
                  Conference, Montreal, Canada, May 18-21, 2003, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {2668},
  pages        = {338--347},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-44843-8\_36},
  doi          = {10.1007/3-540-44843-8\_36},
  timestamp    = {Thu, 28 Apr 2022 16:17:38 +0200},
  biburl       = {https://dblp.org/rec/conf/iccsa/AhnHLM03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdma/KwakHLKM02,
  author       = {Dong Jin Kwak and
                  JaeCheol Ha and
                  Hoon{-}Jae Lee and
                  Hwankoo Kim and
                  Sang{-}Jae Moon},
  editor       = {Jai{-}Yong Lee and
                  Chul{-}Hee Kang},
  title        = {A {WTLS} Handshake Protocol with User Anonymity and Forward Secrecy},
  booktitle    = {Mobile Communications, 7th {CDMA} International Conference, {CIC}
                  2002, Seoul, Korea, October 29 - November 1, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2524},
  pages        = {219--230},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36555-9\_23},
  doi          = {10.1007/3-540-36555-9\_23},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cdma/KwakHLKM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/HaM02,
  author       = {JaeCheol Ha and
                  Sang{-}Jae Moon},
  editor       = {Burton S. Kaliski Jr. and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {Randomized Signed-Scalar Multiplication of {ECC} to Resist Power Attacks},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International
                  Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2523},
  pages        = {551--563},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36400-5\_40},
  doi          = {10.1007/3-540-36400-5\_40},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/HaM02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/YenMH02,
  author       = {Sung{-}Ming Yen and
                  Sang{-}Jae Moon and
                  JaeCheol Ha},
  editor       = {Pil Joong Lee and
                  Chae Hoon Lim},
  title        = {Hardware Fault Attackon {RSA} with {CRT} Revisited},
  booktitle    = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2587},
  pages        = {374--388},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36552-4\_26},
  doi          = {10.1007/3-540-36552-4\_26},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/YenMH02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/HaM98,
  author       = {JaeCheol Ha and
                  Sang{-}Jae Moon},
  title        = {A Common-Multiplicand Method to the Montgomery Algorithm for Speeding
                  up Exponentiation},
  journal      = {Inf. Process. Lett.},
  volume       = {66},
  number       = {2},
  pages        = {105--107},
  year         = {1998},
  url          = {https://doi.org/10.1016/S0020-0190(98)00031-3},
  doi          = {10.1016/S0020-0190(98)00031-3},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ipl/HaM98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics