Chong Hee Kim
According to our database1, Chong Hee Kim authored at least 27 papers between 2001 and 2019.
Legend:Book In proceedings Article PhD thesis Other
Security of Distance-Bounding: A Survey.
ACM Comput. Surv., 2019
Mutual Distance Bounding Protocols.
IEEE Trans. Mob. Comput., 2013
Fault Attacks Against RSA-CRT Implementation.
Proceedings of the Fault Analysis in Cryptography, 2012
Improved Differential Fault Analysis on AES Key Schedule.
IEEE Trans. Information Forensics and Security, 2012
Differential fault analysis of ARIA in multi-byte fault models.
J. Syst. Softw., 2012
Differential fault analysis of AES: Toward reducing number of faults.
Inf. Sci., 2012
RFID Distance Bounding Protocols with Mixed Challenges.
IEEE Trans. Wireless Communications, 2011
Security Analysis of YKHL Distance Bounding Protocol with Adjustable False Acceptance Rate.
IEEE Communications Letters, 2011
Efficient Methods for Exploiting Faults Induced at AES Middle Rounds.
IACR Cryptology ePrint Archive, 2011
New fault attacks using Jacobi symbol and application to regular right-to-left algorithms.
Inf. Process. Lett., 2010
Differential Fault Analysis against AES-192 and AES-256 with Minimal Faults.
Proceedings of the 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, 2010
RFID distance bounding protocol with mixed challenges to prevent relay attacks.
IACR Cryptology ePrint Archive, 2009
A Probing Attack on AES.
Proceedings of the Information Security Applications, 9th International Workshop, 2008
The Swiss-Knife RFID Distance Bounding Protocol.
Proceedings of the Information Security and Cryptology, 2008
Method for Detecting Vulnerability to Doubling Attacks.
Proceedings of the Information and Communications Security, 10th International Conference, 2008
Fault Attacks on Public Key Elements: Application to DLP-Based Schemes.
Proceedings of the Public Key Infrastructure, 2008
New Differential Fault Analysis on AES Key Schedule: Two Faults Are Enough.
Proceedings of the Smart Card Research and Advanced Applications, 2008
Faults, Injection Methods, and Fault Attacks.
IEEE Design & Test of Computers, 2007
Fault Attacks for CRT Based RSA: New Attacks, New Results, and New Countermeasures.
Proceedings of the Information Security Theory and Practices. Smart Cards, 2007
Safe-Error Attack on SPA-FA Resistant Exponentiations Using a HW Modular Multiplier.
Proceedings of the Information Security and Cryptology, 2007
How can we overcome both side channel analysis and fault attacks on RSA-CRT?
Proceedings of the Fourth International Workshop on Fault Diagnosis and Tolerance in Cryptography, 2007
Practical Pay-TV Scheme Using Traitor Tracing Scheme for Multiple Channels.
Proceedings of the Information Security Applications, 5th International Workshop, 2004
An Efficient Revocation Scheme for Stateless Receivers.
Proceedings of the Public Key Infrastructure, 2004
TTS without Revocation Capability Secure Against CCA2.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack.
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003
An Efficient Revocation Scheme with Minimal Message Length for Stateless Receivers.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003
New Key Recovery in WAKE Protocol.
Proceedings of the Public Key Cryptography, 2001