If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where Seokhie Hong is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 3 Similar Profiles
Attack Mathematics
Cryptography Engineering & Materials Science
Block Cipher Mathematics
Differential Cryptanalysis Mathematics
Hash functions Engineering & Materials Science
Block Ciphers Mathematics
Provable Security Mathematics
Hash Function Mathematics

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2000 2019

  • 1373 Citations
  • 16 h-Index
  • 71 Article
  • 45 Conference contribution
  • 2 Editorial

A Practical Collision-Based Power Analysis on RSA Prime Generation and Its Countermeasure

Lee, S., Cho, S. M., Kim, H. & Hong, S., 2019 Jan 1, In : IEEE Access. 7, p. 47582-47592 11 p., 8681035.

Research output: Contribution to journalArticle

Open Access
Microcontrollers
Recovery
Side channel attack

Lightweight conversion from arithmetic to Boolean masking for embedded IoT processor

Kim, H. B., Hong, S. & Kim, H. S., 2019 Apr 1, In : Applied Sciences (Switzerland). 9, 7, 1438.

Research output: Contribution to journalArticle

Open Access
masking
central processing units
Data storage equipment
attack
Internet of things
1 Citation (Scopus)

Special issue on "side channel attacks"

Hong, S., 2019 May 1, In : Applied Sciences (Switzerland). 9, 9, 1881.

Research output: Contribution to journalEditorial

Open Access
attack
Side channel attack
1 Citation (Scopus)

Correction to: An efficient implementation of pairing-based cryptography on MSP430 processor

Kwon, J., Seo, S. C. & Hong, S., 2018 Mar 13, (Accepted/In press) In : Journal of Supercomputing. 1 p.

Research output: Contribution to journalArticle

Pairing-based Cryptography
Efficient Implementation
Cryptography
Microcontrollers
multiplication
scalars
central processing units
ARM processors