HeeSeok Kim

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2024
KpqBench: Performance and Implementation Security Analysis of KpqC Competition Round 1 Candidates.
IEEE Access, 2024

2023
KpqBench: Performance and Implementation Security Analysis of KpqC Competition Round 1 Candidates.
IACR Cryptol. ePrint Arch., 2023

Portable and Efficient Implementation of CRYSTALS-Kyber Based on WebAssembly.
Comput. Syst. Sci. Eng., 2023

Stealing Keys From Hardware Wallets: A Single Trace Side-Channel Attack on Elliptic Curve Scalar Multiplication Without Profiling.
IEEE Access, 2023

Autoscaled-Wavelet Convolutional Layer for Deep Learning-Based Side-Channel Analysis.
IEEE Access, 2023

2022
Enhanced Side-Channel Analysis on ECDSA Employing Fixed-Base Comb Method.
IEEE Trans. Computers, 2022

Enhancing Time-Frequency Analysis with Zero-Mean Preprocessing.
Sensors, 2022

Single-Trace Attack Using One-Shot Learning With Siamese Network in Non-Profiled Setting.
IEEE Access, 2022

Optimizing Implementations of Non-Profiled Deep Learning-Based Side-Channel Attacks.
IEEE Access, 2022

2021
Novel Key Recovery Attack on Secure ECDSA Implementation by Exploiting Collisions between Unknown Entries.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

Single trace side-channel attack on key reconciliation in quantum key distribution system and its efficient countermeasures.
ICT Express, 2021

Non-Profiled Deep Learning-Based Side-Channel Preprocessing With Autoencoders.
IEEE Access, 2021

Side Channel Vulnerability in Parity Computation of Generic Key Reconciliation Process on QKD.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2021

2020
Improving Non-Profiled Side-Channel Attacks using Autoencoder based Preprocessing.
IACR Cryptol. ePrint Arch., 2020

A Combined Single Trace Attack on Global Shuffling Long Integer Multiplication and its Novel Countermeasure.
IEEE Access, 2020

2019
SCA-Resistant GCM Implementation on 8-Bit AVR Microcontrollers.
IEEE Access, 2019

A Practical Collision-Based Power Analysis on RSA Prime Generation and Its Countermeasure.
IEEE Access, 2019

2017
Thwarting side-channel analysis against RSA cryptosystems with additive blinding.
Inf. Sci., 2017

2015
A Malware Classification Method Based on Generic Malware Information.
Proceedings of the Neural Information Processing - 22nd International Conference, 2015

Exploiting Collisions in Addition Chain-Based Exponentiation Algorithms Using a Single Trace.
Proceedings of the Topics in Cryptology, 2015

2014
Message blinding method requiring no multiplicative inversion for RSA.
ACM Trans. Embed. Comput. Syst., 2014

2013
A Methodology for Multipurpose DNS Sinkhole Analyzing Double Bounce Emails.
Proceedings of the Neural Information Processing - 20th International Conference, 2013

2012
Exploiting Collisions in Addition Chain-based Exponentiation Algorithms.
IACR Cryptol. ePrint Arch., 2012

2011
First-order side channel attacks on Zhang's countermeasures.
Inf. Sci., 2011

A Fast and Provably Secure Higher-Order Masking of AES S-Box.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011

2009
Management environment of mass Windows Servers for server-based computing.
Proceedings of the 2009 International Conference on Information Networking, 2009

2008
Edge-centric modulo scheduling for coarse-grained reconfigurable architectures.
Proceedings of the 17th International Conference on Parallel Architectures and Compilation Techniques, 2008

2007
Enhanced Doubling Attacks on Signed-All-Bits Set Recoding.
Proceedings of the Information Security Theory and Practices. Smart Cards, 2007


  Loading...