Chong Hee Kim

According to our database1, Chong Hee Kim authored at least 27 papers between 2001 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Security of Distance-Bounding: A Survey.
ACM Comput. Surv., 2019

2013
Mutual Distance Bounding Protocols.
IEEE Trans. Mob. Comput., 2013

2012
Fault Attacks Against RSA-CRT Implementation.
Proceedings of the Fault Analysis in Cryptography, 2012

Improved Differential Fault Analysis on AES Key Schedule.
IEEE Trans. Information Forensics and Security, 2012

Differential fault analysis of ARIA in multi-byte fault models.
J. Syst. Softw., 2012

Differential fault analysis of AES: Toward reducing number of faults.
Inf. Sci., 2012

2011
RFID Distance Bounding Protocols with Mixed Challenges.
IEEE Trans. Wireless Communications, 2011

Security Analysis of YKHL Distance Bounding Protocol with Adjustable False Acceptance Rate.
IEEE Communications Letters, 2011

Efficient Methods for Exploiting Faults Induced at AES Middle Rounds.
IACR Cryptology ePrint Archive, 2011

2010
New fault attacks using Jacobi symbol and application to regular right-to-left algorithms.
Inf. Process. Lett., 2010

Differential Fault Analysis against AES-192 and AES-256 with Minimal Faults.
Proceedings of the 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2010

2009
RFID distance bounding protocol with mixed challenges to prevent relay attacks.
IACR Cryptology ePrint Archive, 2009

2008
A Probing Attack on AES.
Proceedings of the Information Security Applications, 9th International Workshop, 2008

The Swiss-Knife RFID Distance Bounding Protocol.
Proceedings of the Information Security and Cryptology, 2008

Method for Detecting Vulnerability to Doubling Attacks.
Proceedings of the Information and Communications Security, 10th International Conference, 2008

Fault Attacks on Public Key Elements: Application to DLP-Based Schemes.
Proceedings of the Public Key Infrastructure, 2008

New Differential Fault Analysis on AES Key Schedule: Two Faults Are Enough.
Proceedings of the Smart Card Research and Advanced Applications, 2008

2007
Faults, Injection Methods, and Fault Attacks.
IEEE Design & Test of Computers, 2007

Fault Attacks for CRT Based RSA: New Attacks, New Results, and New Countermeasures.
Proceedings of the Information Security Theory and Practices. Smart Cards, 2007

Safe-Error Attack on SPA-FA Resistant Exponentiations Using a HW Modular Multiplier.
Proceedings of the Information Security and Cryptology, 2007

How can we overcome both side channel analysis and fault attacks on RSA-CRT?
Proceedings of the Fourth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2007

2004
Practical Pay-TV Scheme Using Traitor Tracing Scheme for Multiple Channels.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

An Efficient Revocation Scheme for Stateless Receivers.
Proceedings of the Public Key Infrastructure, 2004

TTS without Revocation Capability Secure Against CCA2.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack.
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003

An Efficient Revocation Scheme with Minimal Message Length for Stateless Receivers.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003

2001
New Key Recovery in WAKE Protocol.
Proceedings of the Public Key Cryptography, 2001


  Loading...