Bo-Yeon Sim

Orcid: 0000-0002-6446-1020

According to our database1, Bo-Yeon Sim authored at least 15 papers between 2017 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Chosen-Ciphertext Clustering Attack on CRYSTALS-KYBER Using the Side-Channel Leakage of Barrett Reduction.
IEEE Internet Things J., 2022

Improved Correlation Power Analysis on Bitslice Block Ciphers.
IEEE Access, 2022

2021
Profiling Attack against RSA Key Generation Based on a Euclidean Algorithm.
Inf., 2021

A New Method for Designing Lightweight S-Boxes With High Differential and Linear Branch Numbers, and its Application.
IEEE Access, 2021

Single-Trace Attack on NIST Round 3 Candidate Dilithium Using Machine Learning-Based Profiling.
IEEE Access, 2021

2020
A Study on the SCA Trends for Application to IoT Devices.
J. Internet Serv. Inf. Secur., 2020

Novel Single-Trace ML Profiling Attacks on NIST 3 Round candidate Dilithium.
IACR Cryptol. ePrint Arch., 2020

Single-Trace Attacks on Message Encoding in Lattice-Based KEMs.
IEEE Access, 2020

PIPO: A Lightweight Block Cipher with Efficient Higher-Order Masking Software Implementations.
Proceedings of the Information Security and Cryptology - ICISC 2020, 2020

Machine Learning-Based Profiling Attack Method in RSA Prime Multiplication.
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020

Fault Injection Method for Hardware-implemented AES without Artificial Triggering.
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020

2019
Novel Side-Channel Attacks on Quasi-Cyclic Code-Based Cryptography.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

Single-Trace Vulnerability of Countermeasures against Instruction-related Timing Attack.
IACR Cryptol. ePrint Arch., 2019

2018
T_SM: Elliptic Curve Scalar Multiplication Algorithm Secure Against Single-Trace Attacks.
Proceedings of the Information Security Practice and Experience, 2018

2017
Key Bit-Dependent Attack on Protected PKC Using a Single Trace.
Proceedings of the Information Security Practice and Experience, 2017


  Loading...