Dong-Guk Han
38  Ergebnisse:
Personensuche X
?
1

Single Trace Analysis of Comparison Operation Based Constan..:

, In: Lecture Notes in Computer Science; Information Security and Cryptology – ICISC 2023,
Choi, Keon-Hee ; Kim, Ju-Hwan ; Han, Jaeseung.. - p. 185-201 , 2024
 
?
2

Differential Fault Attack on AES Using Maximum Four Bytes F..:

, In: Lecture Notes in Computer Science; Information Security and Cryptology – ICISC 2022,
Huh, Jae-Won ; Han, Dong-Guk - p. 235-245 , 2023
 
?
3

Learning-based Side-Channel Analysis on PIPO:

, In: Information Security and Cryptology – ICISC 2021; Lecture Notes in Computer Science,
Woo, Ji-Eun ; Han, Jaeseung ; Kim, Yeon-Jae... - p. 308-321 , 2022
 
?
4

Differential Fault Attack on Lightweight Block Cipher PIPO:

, In: Information Security and Cryptology – ICISC 2021; Lecture Notes in Computer Science,
Lim, Seonghyuck ; Han, Jaeseung ; Lee, Tae-Ho. - p. 296-307 , 2022
 
?
5

PIPO: A Lightweight Block Cipher with Efficient Higher-Orde..:

, In: Information Security and Cryptology – ICISC 2020; Lecture Notes in Computer Science,
Kim, Hangi ; Jeon, Yongjin ; Kim, Giyoon... - p. 99-122 , 2021
 
?
6

Fault Injection Method for Hardware-implemented AES without..:

, In: Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications,
Lim, HanSeop ; Lee, Tae-Ho ; Lim, SeongHyeck... - p. 1-6 , 2020
 
?
7

Practical Cold boot attack on IoT device - Case study on Ra..:

, In: 2020 IEEE International Symposium on the Physical and Failure Analysis of Integrated Circuits (IPFA),
 
?
8

Machine Learning-Based Profiling Attack Method in RSA Prime..:

, In: Proceedings of the 2020 ACM International Conference on Intelligent Computing and its Emerging Applications,
 
?
9

DLDDO: Deep Learning to Detect Dummy Operations:

, In: Information Security Applications; Lecture Notes in Computer Science,
Lee, JongHyeok ; Han, Dong-Guk - p. 73-85 , 2020
 
?
10

T_SM: Elliptic Curve Scalar Multiplication Algorithm Secure..:

, In: Information Security Practice and Experience; Lecture Notes in Computer Science,
Sim, Bo-Yeon ; Choi, Kyu Young ; Moon, Dukjae... - p. 407-423 , 2018
 
?
11

Enhanced doubling attacks on signed-all-bits set recoding:

, In: Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems,
Kim, HeeSeok ; Kim, Tae Hyun ; Ryoo, Jeong Choon... - p. 39-52 , 2007
 
?
12

Enhanced Doubling Attacks on Signed-All-Bits Set Recoding:

, In: Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems; Lecture Notes in Computer Science,
Kim, HeeSeok ; Kim, Tae Hyun ; Ryoo, Jeong Choon... - p. 39-52 , 2007
 
?
13

Using Biological Processes as Prior Knowledge Identifies Ne..:

, In: 2023 IEEE International Conference on Bioinformatics and Biomedicine (BIBM),
Zhang, Chenyu ; Wang, Honglin ; Hong, Seung-Hyun.. - p. 3756-3763 , 2023
 
?
14

A framework for associating structural variants with cell-s..:

, In: 2022 IEEE International Conference on Bioinformatics and Biomedicine (BIBM),
 
?
15

rCom : a route-based framework inferring cell type commu..:

, In: Proceedings of the 13th ACM International Conference on Bioinformatics, Computational Biology and Health Informatics,
Wang, Honglin ; Joshi, Pujan ; Zhang, Chenyu... - p. 1-4 , 2022
 
1-15