If you made any changes in Pure these will be visible here soon.

Research Output

Filter
Article
2020

A Combined Single Trace Attack on Global Shuffling Long Integer Multiplication and its Novel Countermeasure

Lee, S., Cho, S. M., Kim, H. & Hong, S., 2020 Jan 1, In : IEEE Access. 8, p. 5244-5255 12 p., 8948409.

Research output: Contribution to journalArticle

Open Access
1 Citation (Scopus)

New hybrid method for isogeny-based cryptosystems using edwards curves

Kim, S., Yoon, K., Kwon, J., Park, Y. H. & Hong, S., 2020 Mar, In : IEEE Transactions on Information Theory. 66, 3, p. 1934-1943 10 p., 8822753.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Power-balancing software implementation to mitigate side-channel attacks without using look-up tables

Kim, H. B., Kim, H. S. & Hong, S., 2020 Apr 1, In : Applied Sciences (Switzerland). 10, 7, 2454.

Research output: Contribution to journalArticle

Open Access

Recent advances in deep learning-based side-channel analysis

Jin, S., Kim, S., Kim, H. S. & Hong, S., 2020 Jan 1, (Accepted/In press) In : ETRI Journal.

Research output: Contribution to journalArticle

Open Access
1 Citation (Scopus)

Single trace analysis against HyMES by exploitation of joint distributions of leakages

Park, B. G., Kim, S., Hong, S., Kim, H. S. & Seo, S. C., 2020 Mar 1, In : Applied Sciences (Switzerland). 10, 5, 1831.

Research output: Contribution to journalArticle

Open Access
2019

A Practical Collision-Based Power Analysis on RSA Prime Generation and Its Countermeasure

Lee, S., Cho, S. M., Kim, H. & Hong, S., 2019 Jan 1, In : IEEE Access. 7, p. 47582-47592 11 p., 8681035.

Research output: Contribution to journalArticle

Open Access
1 Citation (Scopus)

Lightweight conversion from arithmetic to Boolean masking for embedded IoT processor

Kim, H. B., Hong, S. & Kim, H. S., 2019 Apr 1, In : Applied Sciences (Switzerland). 9, 7, 1438.

Research output: Contribution to journalArticle

Open Access

New approach to constructing noise source based on race conditions

Kim, S. G., Lee, S. J., Hong, D., Sung, J. & Hong, S., 2019 Jan 1, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E102A, 9, p. 1272-1284 13 p.

Research output: Contribution to journalArticle

2018

Correction to: An efficient implementation of pairing-based cryptography on MSP430 processor

Kwon, J., Seo, S. C. & Hong, S., 2018 Mar 13, (Accepted/In press) In : Journal of Supercomputing. 1 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Efficient Isogeny Computations on Twisted Edwards Curves

Kim, S., Yoon, K., Kwon, J., Hong, S. & Park, Y. H., 2018 Jan 1, In : Security and Communication Networks. 2018, 5747642.

Research output: Contribution to journalArticle

5 Citations (Scopus)

Single trace analysis on constant time CDT sampler and its countermeasure

Kim, S. & Hong, S., 2018 Oct 3, In : Applied Sciences (Switzerland). 8, 10, 1809.

Research output: Contribution to journalArticle

4 Citations (Scopus)
2017

An efficient implementation of pairing-based cryptography on MSP430 processor

Kwon, J., Seo, S. C. & Hong, S., 2017 Jul 17, (Accepted/In press) In : Journal of Supercomputing. p. 1-24 24 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Known-key attack on SM4 block cipher

Kang, H. C., Hong, D., Sung, J. & Hong, S., 2017 Dec 1, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E100A, 12, p. 2985-2990 6 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)
2016

Faster elliptic curve arithmetic for triple-base chain by reordering sequences of field operations

Cho, S. M., Gwak, S. G., Kim, C. H. & Hong, S., 2016 Jan 29, (Accepted/In press) In : Multimedia Tools and Applications. p. 1-13 13 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

New Type of Collision Attack on First-Order Masked AESs

Kim, H. S. & Hong, S., 2016 Apr 1, In : ETRI Journal. 38, 2, p. 387-396 10 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

RCB: leakage-resilient authenticated encryption via re-keying

Agrawal, M., Bansal, T. K., Chang, D., Chauhan, A. K., Hong, S., Kang, J. & Sanadhya, S. K., 2016 Aug 22, (Accepted/In press) In : Journal of Supercomputing. p. 1-26 26 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)
2015

Low complexity bit-parallel multiplier for F2n defined by repeated polynomials

Chang, N. S., Kang, E. S. & Hong, S., 2015 Aug 28, (Accepted/In press) In : Discrete Applied Mathematics.

Research output: Contribution to journalArticle

Mutual information analysis for three-phase dynamic current mode logic against side-channel attack

Kim, H., Han, D. G. & Hong, S., 2015 Jun 1, In : ETRI Journal. 37, 3, p. 584-594 11 p.

Research output: Contribution to journalArticle

The switching generator: New clock-controlled generator with resistance against the algebraic and side channel attacks

Choi, J., Moon, D., Hong, S. & Sung, J., 2015, In : Entropy. 17, 6, p. 3692-3709 18 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Weakness of lightweight block ciphers mCrypton and LED against biclique cryptanalysis

Jeong, K., Kang, H. C., Lee, C., Sung, J., Hong, S. & Lim, J. I., 2015 Jul 20, In : Peer-to-Peer Networking and Applications. 8, 4, p. 716-732 17 p.

Research output: Contribution to journalArticle

9 Citations (Scopus)
2014

Accelerating elliptic curve scalar multiplication over GF (2 m) on graphic hardwares

Seo, S. C., Kim, T. & Hong, S., 2014 Jan 1, In : Journal of Parallel and Distributed Computing. 75, p. 152-167 16 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

Formulas for cube roots in F 3 m using shifted polynomial basis

Cho, Y. I., Chang, N. S. & Hong, S., 2014 Jun, In : Information Processing Letters. 114, 6, p. 331-337 7 p.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Message blinding method requiring no multiplicative inversion for RSA

Kim, H., Han, D. G., Hong, S. & Ha, J., 2014, In : Transactions on Embedded Computing Systems. 13, 4, 80.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Practical RSA-PAKE for low-power device in imbalanced wireless networks

Youn, T. Y., Lee, S., Hong, S. H. & Park, Y. H., 2014, In : International Journal of Distributed Sensor Networks. 2014, 125309.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Related-key cryptanalysis on the full PRINTcipher suitable for IC-printing

Lee, Y., Jeong, K., Lee, C., Sung, J. & Hong, S., 2014, In : International Journal of Distributed Sensor Networks. 2014, 389476.

Research output: Contribution to journalArticle

4 Citations (Scopus)
2013

A new approach of differential fault analysis on block ciphers with S-box

Jeong, K., Sung, J., Hong, S. & Lee, C., 2013 Mar, In : Information (Japan). 16, 3 A, p. 1915-1928 14 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Collision attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and anubis

Kang, J., Jeong, K., Sung, J., Hong, S. & Lee, K., 2013, In : Journal of Applied Mathematics. 2013, 713673.

Research output: Contribution to journalArticle

7 Citations (Scopus)

Extended elliptic curve Montgomery ladder algorithm over binary fields with resistance to simple power analysis

Cho, S. M., Seo, S. C., Kim, T. H., Park, Y. H. & Hong, S., 2013 Oct 1, In : Information Sciences. 245, p. 304-312 9 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

Fault attacks on cipher block chaining-message authentication code and its variants based on aes-128 suitable for wireless sensor networks

Jeong, K., Sung, J., Hong, S. & Chang, K. Y., 2013 Sep, In : Sensor Letters. 11, 9, p. 1755-1764 10 p.

Research output: Contribution to journalArticle

Fiat-shamir identification scheme immune to the hardware fault attacks

Kim, S. K., Kim, T. H. & Hong, S., 2013 Mar, In : Transactions on Embedded Computing Systems. 12, SUPPL1, 65.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Improved differential fault analysis on PRESENT-80/128

Jeong, K., Lee, Y., Sung, J. & Hong, S., 2013, In : International Journal of Computer Mathematics. 90, 12, p. 2553-2563 11 p.

Research output: Contribution to journalArticle

7 Citations (Scopus)

Related-key amplified boomerang attacks on KT-64 and MD-64 suitable for wireless sensor networks

Kang, J., Jeong, K., Hong, S. & Lee, C., 2013 Sep, In : Sensor Letters. 11, 9, p. 1765-1770 6 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Security analysis of HMAC/NMAC by using fault injection

Jeong, K., Lee, Y., Sung, J. & Hong, S., 2013, In : Journal of Applied Mathematics. 2013, 101907.

Research output: Contribution to journalArticle

3 Citations (Scopus)

Security analysis of scalable block cipher PP-1 applicable to distributed sensor networks

Lee, Y., Jeong, K., Sung, J., Lee, C., Hong, S. & Chang, K. Y., 2013, In : International Journal of Distributed Sensor Networks. 2013, 169638.

Research output: Contribution to journalArticle

1 Citation (Scopus)

Security evaluation of double-block-length hash modes with preimage attacks on PGV schemes

Moon, D., Hong, D., Koo, B. & Hong, S., 2013, In : Journal of Internet Technology. 14, 3, p. 497-508 12 p.

Research output: Contribution to journalArticle

1 Citation (Scopus)
2012

Differential fault analysis on block cipher SEED

Jeong, K., Lee, Y., Sung, J. & Hong, S., 2012 Jan, In : Mathematical and Computer Modelling. 55, 1-2, p. 26-34 9 p.

Research output: Contribution to journalArticle

12 Citations (Scopus)

Known-key attacks on generalized Feistel schemes with SP round function

Kang, H., Hong, D., Moon, D., Kwon, D., Sung, J. & Hong, S., 2012 Sep, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E95-A, 9, p. 1550-1560 11 p.

Research output: Contribution to journalArticle

8 Citations (Scopus)
4 Citations (Scopus)

New bit parallel multiplier with low space complexity for all irreducible trinomials over GF(2 n)

Cho, Y. I., Chang, N. S., Kim, C. H., Park, Y. H. & Hong, S., 2012, In : IEEE Transactions on Very Large Scale Integration (VLSI) Systems. 20, 10, p. 1903-1908 6 p., 5999752.

Research output: Contribution to journalArticle

11 Citations (Scopus)

Related-key boomerang and rectangle attacks: Theory and experimental analysis

Kim, J., Hong, S., Preneel, B., Biham, E., Dunkelman, O. & Keller, N., 2012, In : IEEE Transactions on Information Theory. 58, 7, p. 4948-4966 19 p., 6172578.

Research output: Contribution to journalArticle

15 Citations (Scopus)

Side-channel attacks on HIGHT with reduced masked rounds suitable for the protection of multimedia computing system

Lee, Y., Kim, J. & Hong, S., 2012 Jan, In : Multimedia Tools and Applications. 56, 2, p. 267-280 14 p.

Research output: Contribution to journalArticle

2011

An efficient CRT-RSA algorithm secure against power and fault attacks

Kim, S. K., Kim, T. H., Han, D. G. & Hong, S., 2011 Oct, In : Journal of Systems and Software. 84, 10, p. 1660-1669 10 p.

Research output: Contribution to journalArticle

9 Citations (Scopus)

An efficient DPA countermeasure for the EtaT pairing algorithm over GF(2n) based on random value addition

Seo, S. C., Han, D. G. & Hong, S., 2011 Oct, In : ETRI Journal. 33, 5, p. 780-790 11 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Efficient masked implementation for SEED based on combined masking

Kim, H. S., Cho, Y. I., Choi, D., Han, D. G. & Hong, S., 2011 Apr, In : ETRI Journal. 33, 2, p. 267-274 8 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

First-order side channel attacks on Zhang's countermeasures

Kim, H., Han, D. G. & Hong, S., 2011 Sep 15, In : Information Sciences. 181, 18, p. 4051-4060 10 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)
2010

Acceleration of differential power analysis through the parallel use of GPU and CPU

Lee, S. J., Seo, S. C., Han, D. G., Hong, S. & Lee, S., 2010 Sep, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E93-A, 9, p. 1688-1692 5 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

Efficient masking methods appropriate for the block ciphers ARIA and AES

Kim, H., Kim, T. H., Han, D. G. & Hong, S., 2010 Jun, In : ETRI Journal. 32, 3, p. 370-379 10 p.

Research output: Contribution to journalArticle

9 Citations (Scopus)

Impossible differential cryptanalysis using matrix method

Kim, J., Hong, S. & Lim, J., 2010 Mar 6, In : Discrete Mathematics. 310, 5, p. 988-1002 15 p.

Research output: Contribution to journalArticle

31 Citations (Scopus)

Practical second-order correlation power analysis on the message blinding method and its novel countermeasure for RSA

Kim, H. S., Kim, T. H., Yoon, J. C. & Hong, S., 2010 Feb, In : ETRI Journal. 32, 1, p. 102-111 10 p.

Research output: Contribution to journalArticle

16 Citations (Scopus)