Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: JaeCheol Ha
@article{DBLP:journals/sensors/BaeH22, author = {Daehyeon Bae and JaeCheol Ha}, title = {Implementation of Disassembler on Microcontroller Using Side-Channel Power Consumption Leakage}, journal = {Sensors}, volume = {22}, number = {15}, pages = {5900}, year = {2022}, url = {https://doi.org/10.3390/s22155900}, doi = {10.3390/S22155900}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/BaeH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/BaeH21, author = {Daehyeon Bae and JaeCheol Ha}, title = {Performance Metric for Differential Deep Learning Analysis}, journal = {J. Internet Serv. Inf. Secur.}, volume = {11}, number = {2}, pages = {22--33}, year = {2021}, url = {https://doi.org/10.22667/JISIS.2021.05.31.022}, doi = {10.22667/JISIS.2021.05.31.022}, timestamp = {Wed, 16 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/BaeH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icea/BaeHH20, author = {Daehyeon Bae and Jongbae Hwang and JaeCheol Ha}, title = {Breaking a Masked {AES} Implementation Using a Deep Learning-based Attack}, booktitle = {{ACM} {ICEA} '20: 2020 {ACM} International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12 - 15, 2020}, pages = {22:1--22:5}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3440943.3444724}, doi = {10.1145/3440943.3444724}, timestamp = {Wed, 29 Sep 2021 09:35:11 +0200}, biburl = {https://dblp.org/rec/conf/icea/BaeHH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iasc/ChoiCLH16, author = {YongJe Choi and Dooho Choi and Hoonjae Lee and JaeCheol Ha}, title = {An Improved Square-always Exponentiation Resistant to Side-channel Attacks on {RSA} Implementation}, journal = {Intell. Autom. Soft Comput.}, volume = {22}, number = {3}, pages = {353--363}, year = {2016}, url = {https://doi.org/10.1080/10798587.2015.1118909}, doi = {10.1080/10798587.2015.1118909}, timestamp = {Fri, 26 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iasc/ChoiCLH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcm/KimCCH16, author = {HyeongDong Kim and YongJe Choi and Dooho Choi and JaeCheol Ha}, title = {A secure exponentiation algorithm resistant to a combined attack on {RSA} implementation}, journal = {Int. J. Comput. Math.}, volume = {93}, number = {2}, pages = {258--272}, year = {2016}, url = {https://doi.org/10.1080/00207160.2014.935353}, doi = {10.1080/00207160.2014.935353}, timestamp = {Sun, 28 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcm/KimCCH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/HaCCL14, author = {JaeCheol Ha and YongJe Choi and Dooho Choi and Hoonjae Lee}, title = {Power Analysis Attacks on the Right-to-Left Square-Always Exponentiation Algorithm}, journal = {J. Internet Serv. Inf. Secur.}, volume = {4}, number = {4}, pages = {38--51}, year = {2014}, url = {https://doi.org/10.22667/JISIS.2014.11.31.038}, doi = {10.22667/JISIS.2014.11.31.038}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/HaCCL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tecs/KimHHH14, author = {HeeSeok Kim and Dong{-}Guk Han and Seokhie Hong and JaeCheol Ha}, title = {Message blinding method requiring no multiplicative inversion for {RSA}}, journal = {{ACM} Trans. Embed. Comput. Syst.}, volume = {13}, number = {4}, pages = {80:1--80:10}, year = {2014}, url = {https://doi.org/10.1145/2560020}, doi = {10.1145/2560020}, timestamp = {Tue, 08 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tecs/KimHHH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/ParkBCCH14, author = {Jeong{-}Soo Park and KiSeok Bae and YongJe Choi and Dooho Choi and Jae{-}Cheol Ha}, title = {A fault-resistant implementation of {AES} using differential bytes between input and output}, journal = {J. Supercomput.}, volume = {67}, number = {3}, pages = {615--634}, year = {2014}, url = {https://doi.org/10.1007/s11227-013-0950-7}, doi = {10.1007/S11227-013-0950-7}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tjs/ParkBCCH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/KimCCH13, author = {Hyungdong Kim and YongJe Choi and Dooho Choi and JaeCheol Ha}, title = {A New Exponentiation Algorithm Resistant to Combined Side Channel Attack}, journal = {J. Internet Serv. Inf. Secur.}, volume = {3}, number = {3/4}, pages = {17--27}, year = {2013}, url = {https://doi.org/10.22667/JISIS.2013.11.31.017}, doi = {10.22667/JISIS.2013.11.31.017}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/KimCCH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/imis/BaeMH13, author = {KiSeok Bae and Sang{-}Jae Moon and JaeCheol Ha}, editor = {Leonard Barolli and Ilsun You and Fatos Xhafa and Fang{-}Yie Leu and Hsing{-}Chung Chen}, title = {Instruction Fault Attack on the Miller Algorithm in a Pairing-Based Cryptosystem}, booktitle = {Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, {IMIS} 2013, Taichung, Taiwan, July 3-5, 2013}, pages = {167--174}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/IMIS.2013.36}, doi = {10.1109/IMIS.2013.36}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/imis/BaeMH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/ParkBCCH12, author = {Jeong{-}Soo Park and KiSeok Bae and YongJe Choi and Dooho Choi and JaeCheol Ha}, title = {A Fault-Resistant {AES} Implementation Using Differential Characteristic of Input and Output}, journal = {J. Internet Serv. Inf. Secur.}, volume = {2}, number = {3/4}, pages = {93--109}, year = {2012}, url = {https://doi.org/10.22667/JOWUA.2012.11.31.093}, doi = {10.22667/JOWUA.2012.11.31.093}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/ParkBCCH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ParkH12, author = {JeaHoon Park and JaeCheol Ha}, editor = {Dong Hoon Lee and Moti Yung}, title = {Improved Differential Fault Analysis on Block Cipher {ARIA}}, booktitle = {Information Security Applications - 13th International Workshop, {WISA} 2012, Jeju Island, Korea, August 16-18, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7690}, pages = {82--95}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35416-8\_7}, doi = {10.1007/978-3-642-35416-8\_7}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ParkH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/BaeALHM11, author = {KiSeok Bae and MahnKi Ahn and Hoon{-}Jae Lee and JaeCheol Ha and Sang{-}Jae Moon}, editor = {Jan J{\"{u}}rjens and Seok{-}Won Lee and Mattia Monga}, title = {Power analysis attack and countermeasure on the Rabbit Stream Cipher (position paper)}, booktitle = {Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, {SESS} 2011, Waikiki, Honolulu, HI, USA, May 22, 2011}, pages = {50--56}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1988630.1988640}, doi = {10.1145/1988630.1988640}, timestamp = {Tue, 06 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/BaeALHM11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/interaction/ParkBMCKH09, author = {JeaHoon Park and KiSeok Bae and Sang{-}Jae Moon and Dooho Choi and You Sung Kang and JaeCheol Ha}, editor = {Sungwon Sohn and Ling Chen and Soonwook Hwang and Kyungeun Cho and Shigeo Kawata and Kyhyun Um and Franz I. S. Ko and Kae{-}Dal Kwack and Jong Hyung Lee and Gang Kou and Kiyoshi Nakamura and Alvis Cheuk M. Fong and Patrick C. M. Ma}, title = {A new fault cryptanalysis on montgomery ladder exponentiation algorithm}, booktitle = {Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human {(ICIS} 2009), Seoul, Korea, 24-26 November 2009}, series = {{ACM} International Conference Proceeding Series}, volume = {403}, pages = {896--899}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1655925.1656088}, doi = {10.1145/1655925.1656088}, timestamp = {Sun, 28 Feb 2021 18:18:34 +0100}, biburl = {https://dblp.org/rec/conf/interaction/ParkBMCKH09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/HaMZH08, author = {JungHoon Ha and Sang{-}Jae Moon and Jianying Zhou and JaeCheol Ha}, editor = {Sushil Jajodia and Javier L{\'{o}}pez}, title = {A New Formal Proof Model for {RFID} Location Privacy}, booktitle = {Computer Security - {ESORICS} 2008, 13th European Symposium on Research in Computer Security, M{\'{a}}laga, Spain, October 6-8, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5283}, pages = {267--281}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88313-5\_18}, doi = {10.1007/978-3-540-88313-5\_18}, timestamp = {Thu, 29 Aug 2019 08:09:59 +0200}, biburl = {https://dblp.org/rec/conf/esorics/HaMZH08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euc/HaKPMNB07, author = {JaeCheol Ha and Hwankoo Kim and JeaHoon Park and Sang{-}Jae Moon and Juan Manuel Gonz{\'{a}}lez Nieto and Colin Boyd}, editor = {Mieso K. Denko and Chi{-}Sheng Shih and Kuan{-}Ching Li and Shiao{-}Li Tsao and Qing{-}An Zeng and Soo{-}Hyun Park and Young{-}Bae Ko and Shih{-}Hao Hung and Jong Hyuk Park}, title = {{HGLAP} - Hierarchical Group-Index Based Lightweight Authentication Protocol for Distributed {RFID} System}, booktitle = {Emerging Directions in Embedded and Ubiquitous Computing, {EUC} 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4809}, pages = {557--567}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77090-9\_52}, doi = {10.1007/978-3-540-77090-9\_52}, timestamp = {Wed, 22 Jun 2022 09:02:26 +0200}, biburl = {https://dblp.org/rec/conf/euc/HaKPMNB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euc/HaMNB07, author = {JaeCheol Ha and Sang{-}Jae Moon and Juan Manuel Gonz{\'{a}}lez Nieto and Colin Boyd}, editor = {Mieso K. Denko and Chi{-}Sheng Shih and Kuan{-}Ching Li and Shiao{-}Li Tsao and Qing{-}An Zeng and Soo{-}Hyun Park and Young{-}Bae Ko and Shih{-}Hao Hung and Jong Hyuk Park}, title = {Low-Cost and Strong-Security {RFID} Authentication Protocol}, booktitle = {Emerging Directions in Embedded and Ubiquitous Computing, {EUC} 2007 Workshops: TRUST, WSOC, NCUS, UUWSN, USN, ESO, and SECUBIQ, Taipei, Taiwan, December 17-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4809}, pages = {795--807}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77090-9\_72}, doi = {10.1007/978-3-540-77090-9\_72}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/euc/HaMNB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pakdd/HaMNB07, author = {JaeCheol Ha and Sang{-}Jae Moon and Juan Manuel Gonz{\'{a}}lez Nieto and Colin Boyd}, editor = {Takashi Washio and Zhi{-}Hua Zhou and Joshua Zhexue Huang and Xiaohua Hu and Jinyan Li and Chao Xie and Jieyue He and Deqing Zou and Kuan{-}Ching Li and M{\'{a}}rio M. Freire}, title = {Security Analysis and Enhancement of One-Way Hash Based Low-Cost Authentication Protocol {(OHLCAP)}}, booktitle = {Emerging Technologies in Knowledge Discovery and Data Mining, {PAKDD} 2007, International Workshops, Nanjing, China, May 22-25, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4819}, pages = {574--583}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77018-3\_57}, doi = {10.1007/978-3-540-77018-3\_57}, timestamp = {Fri, 09 Apr 2021 17:11:17 +0200}, biburl = {https://dblp.org/rec/conf/pakdd/HaMNB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/HaPMY07, author = {JaeCheol Ha and JeaHoon Park and Sang{-}Jae Moon and Sung{-}Ming Yen}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Provably Secure Countermeasure Resistant to Several Types of Power Attack for {ECC}}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {333--344}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_24}, doi = {10.1007/978-3-540-77535-5\_24}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/HaPMY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/ParkLHCKM06, author = {JeaHoon Park and Hoon{-}Jae Lee and JaeCheol Ha and YongJe Choi and Howon Kim and Sang{-}Jae Moon}, editor = {Yuping Wang and Yiu{-}ming Cheung and Hai{-}Lin Liu}, title = {A Differential Power Analysis Attack of Block Cipher Based on the Hamming Weight of Internal Operation Unit}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2006, Guangzhou, China, November 3-6, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4456}, pages = {417--426}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-74377-4\_44}, doi = {10.1007/978-3-540-74377-4\_44}, timestamp = {Thu, 02 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/ParkLHCKM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icuct/HaHMB06, author = {JaeCheol Ha and JungHoon Ha and Sang{-}Jae Moon and Colin Boyd}, editor = {Frank Stajano and Hyoung Joong Kim and Jong{-}Suk Chae and Seong{-}Dong Kim}, title = {{LRMAP:} Lightweight and Resynchronous Mutual Authentication Protocol for {RFID} System}, booktitle = {Ubiquitous Convergence Technology, First International Conference, {ICUCT} 2006, Jeju Island, Korea, December 5-6, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4412}, pages = {80--89}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-71789-8\_9}, doi = {10.1007/978-3-540-71789-8\_9}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/icuct/HaHMB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/HaKMPY05, author = {JaeCheol Ha and ChangKyun Kim and Sang{-}Jae Moon and IlHwan Park and HyungSo Yoo}, editor = {Laurence Tianruo Yang and Omer F. Rana and Beniamino Di Martino and Jack J. Dongarra}, title = {Differential Power Analysis on Block Cipher {ARIA}}, booktitle = {High Performance Computing and Communications, First International Conference, {HPCC} 2005, Sorrento, Italy, September 21-23, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3726}, pages = {541--548}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11557654\_63}, doi = {10.1007/11557654\_63}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/hpcc/HaKMPY05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/KimHMYK05, author = {ChangKyun Kim and JaeCheol Ha and Sang{-}Jae Moon and Sung{-}Ming Yen and Sung{-}Hyun Kim}, editor = {Laurence Tianruo Yang and Omer F. Rana and Beniamino Di Martino and Jack J. Dongarra}, title = {A CRT-Based {RSA} Countermeasure Against Physical Cryptanalysis}, booktitle = {High Performance Computing and Communications, First International Conference, {HPCC} 2005, Sorrento, Italy, September 21-23, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3726}, pages = {549--554}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11557654\_64}, doi = {10.1007/11557654\_64}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hpcc/KimHMYK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/KimPHLP05, author = {Hwankoo Kim and Bongjoo Park and JaeCheol Ha and Byoungcheon Lee and DongGook Park}, editor = {Osvaldo Gervasi and Marina L. Gavrilova and Vipin Kumar and Antonio Lagan{\`{a}} and Heow Pueh Lee and Youngsong Mun and David Taniar and Chih Jeng Kenneth Tan}, title = {New Key Management Systems for Multilevel Security}, booktitle = {Computational Science and Its Applications - {ICCSA} 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3481}, pages = {245--253}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11424826\_26}, doi = {10.1007/11424826\_26}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/KimPHLP05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/YenKMH05, author = {Sung{-}Ming Yen and Lee{-}Chun Ko and Sang{-}Jae Moon and JaeCheol Ha}, editor = {Dongho Won and Seungjoo Kim}, title = {Relative Doubling Attack Against Montgomery Ladder}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, pages = {117--128}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11734727\_11}, doi = {10.1007/11734727\_11}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/YenKMH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/YenLMH05, author = {Sung{-}Ming Yen and Wei{-}Chih Lien and Sang{-}Jae Moon and JaeCheol Ha}, editor = {Ed Dawson and Serge Vaudenay}, title = {Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSA-Decryption}, booktitle = {Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3715}, pages = {183--195}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11554868\_13}, doi = {10.1007/11554868\_13}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/YenLMH05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimHMYLK05, author = {ChangKyun Kim and JaeCheol Ha and Sang{-}Jae Moon and Sung{-}Ming Yen and Wei{-}Chih Lien and Sung{-}Hyun Kim}, title = {An Improved and Efficient Countermeasure against Power Analysis Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {22}, year = {2005}, url = {http://eprint.iacr.org/2005/022}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KimHMYLK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/KimHKKYM04, author = {ChangKyun Kim and JaeCheol Ha and Sung{-}Hyun Kim and Seokyu Kim and Sung{-}Ming Yen and Sang{-}Jae Moon}, editor = {Antonio Lagan{\`{a}} and Marina L. Gavrilova and Vipin Kumar and Youngsong Mun and Chih Jeng Kenneth Tan and Osvaldo Gervasi}, title = {A Secure and Practical CRT-Based {RSA} to Resist Side Channel Attacks}, booktitle = {Computational Science and Its Applications - {ICCSA} 2004, International Conference, Assisi, Italy, May 14-17, 2004, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {3043}, pages = {150--158}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24707-4\_19}, doi = {10.1007/978-3-540-24707-4\_19}, timestamp = {Thu, 28 Apr 2022 16:17:38 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/KimHKKYM04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/YenCMH04, author = {Sung{-}Ming Yen and Chien{-}Ning Chen and Sang{-}Jae Moon and JaeCheol Ha}, editor = {Choonsik Park and Seongtaek Chee}, title = {Improvement on Ha-Moon Randomized Exponentiation Algorithm}, booktitle = {Information Security and Cryptology - {ICISC} 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3506}, pages = {154--167}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11496618\_12}, doi = {10.1007/11496618\_12}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/YenCMH04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/YooKHMP04, author = {HyungSo Yoo and ChangKyun Kim and JaeCheol Ha and Sang{-}Jae Moon and IlHwan Park}, editor = {Chae Hoon Lim and Moti Yung}, title = {Side Channel Cryptanalysis on {SEED}}, booktitle = {Information Security Applications, 5th International Workshop, {WISA} 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3325}, pages = {411--424}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31815-6\_33}, doi = {10.1007/978-3-540-31815-6\_33}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/YooKHMP04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YenMH03, author = {Sung{-}Ming Yen and Sang{-}Jae Moon and JaeCheol Ha}, editor = {Reihaneh Safavi{-}Naini and Jennifer Seberry}, title = {Permanent Fault Attack on the Parameters of {RSA} with {CRT}}, booktitle = {Information Security and Privacy, 8th Australasian Conference, {ACISP} 2003, Wollongong, Australia, July 9-11, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2727}, pages = {285--296}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-45067-X\_25}, doi = {10.1007/3-540-45067-X\_25}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YenMH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/AhnHLM03, author = {MahnKi Ahn and JaeCheol Ha and Hoon{-}Jae Lee and Sang{-}Jae Moon}, editor = {Vipin Kumar and Marina L. Gavrilova and Chih Jeng Kenneth Tan and Pierre L'Ecuyer}, title = {A Random M-ary Method Based Countermeasure against Side Channel Attacks}, booktitle = {Computational Science and Its Applications - {ICCSA} 2003, International Conference, Montreal, Canada, May 18-21, 2003, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {2668}, pages = {338--347}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-44843-8\_36}, doi = {10.1007/3-540-44843-8\_36}, timestamp = {Thu, 28 Apr 2022 16:17:38 +0200}, biburl = {https://dblp.org/rec/conf/iccsa/AhnHLM03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cdma/KwakHLKM02, author = {Dong Jin Kwak and JaeCheol Ha and Hoon{-}Jae Lee and Hwankoo Kim and Sang{-}Jae Moon}, editor = {Jai{-}Yong Lee and Chul{-}Hee Kang}, title = {A {WTLS} Handshake Protocol with User Anonymity and Forward Secrecy}, booktitle = {Mobile Communications, 7th {CDMA} International Conference, {CIC} 2002, Seoul, Korea, October 29 - November 1, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2524}, pages = {219--230}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36555-9\_23}, doi = {10.1007/3-540-36555-9\_23}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cdma/KwakHLKM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/HaM02, author = {JaeCheol Ha and Sang{-}Jae Moon}, editor = {Burton S. Kaliski Jr. and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {Randomized Signed-Scalar Multiplication of {ECC} to Resist Power Attacks}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2002, 4th International Workshop, Redwood Shores, CA, USA, August 13-15, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2523}, pages = {551--563}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36400-5\_40}, doi = {10.1007/3-540-36400-5\_40}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/HaM02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/YenMH02, author = {Sung{-}Ming Yen and Sang{-}Jae Moon and JaeCheol Ha}, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {Hardware Fault Attackon {RSA} with {CRT} Revisited}, booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, pages = {374--388}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36552-4\_26}, doi = {10.1007/3-540-36552-4\_26}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/YenMH02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/HaM98, author = {JaeCheol Ha and Sang{-}Jae Moon}, title = {A Common-Multiplicand Method to the Montgomery Algorithm for Speeding up Exponentiation}, journal = {Inf. Process. Lett.}, volume = {66}, number = {2}, pages = {105--107}, year = {1998}, url = {https://doi.org/10.1016/S0020-0190(98)00031-3}, doi = {10.1016/S0020-0190(98)00031-3}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ipl/HaM98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.