JaeCheol Ha

Affiliations:
  • Hoseo University, Department of Information Security, Asan, South Korea


According to our database1, JaeCheol Ha authored at least 36 papers between 1998 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Implementation of Disassembler on Microcontroller Using Side-Channel Power Consumption Leakage.
Sensors, 2022

2021
Performance Metric for Differential Deep Learning Analysis.
J. Internet Serv. Inf. Secur., 2021

2020
Breaking a Masked AES Implementation Using a Deep Learning-based Attack.
Proceedings of the ACM ICEA '20: 2020 ACM International Conference on Intelligent Computing and its Emerging Applications, GangWon Republic of Korea, December 12, 2020

2016
A secure exponentiation algorithm resistant to a combined attack on RSA implementation.
Int. J. Comput. Math., 2016

An Improved Square-always Exponentiation Resistant to Side-channel Attacks on RSA Implementation.
Intell. Autom. Soft Comput., 2016

2014
A fault-resistant implementation of AES using differential bytes between input and output.
J. Supercomput., 2014

Message blinding method requiring no multiplicative inversion for RSA.
ACM Trans. Embed. Comput. Syst., 2014

Power Analysis Attacks on the Right-to-Left Square-Always Exponentiation Algorithm.
J. Internet Serv. Inf. Secur., 2014

2013
A New Exponentiation Algorithm Resistant to Combined Side Channel Attack.
J. Internet Serv. Inf. Secur., 2013

Instruction Fault Attack on the Miller Algorithm in a Pairing-Based Cryptosystem.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

2012
A Fault-Resistant AES Implementation Using Differential Characteristic of Input and Output.
J. Internet Serv. Inf. Secur., 2012

Improved Differential Fault Analysis on Block Cipher ARIA.
Proceedings of the Information Security Applications - 13th International Workshop, 2012

2011
Power analysis attack and countermeasure on the Rabbit Stream Cipher (position paper).
Proceedings of the 7th International Workshop on Software Engineering for Secure Systems, 2011

2009
A new fault cryptanalysis on montgomery ladder exponentiation algorithm.
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009

2008
A New Formal Proof Model for RFID Location Privacy.
Proceedings of the Computer Security, 2008

2007
Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC.
Proceedings of the Information Security Applications, 8th International Workshop, 2007

Security Analysis and Enhancement of One-Way Hash Based Low-Cost Authentication Protocol (OHLCAP).
Proceedings of the Emerging Technologies in Knowledge Discovery and Data Mining, 2007

Low-Cost and Strong-Security RFID Authentication Protocol.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

HGLAP - Hierarchical Group-Index Based Lightweight Authentication Protocol for Distributed RFID System.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2007

2006
LRMAP: Lightweight and Resynchronous Mutual Authentication Protocol for RFID System.
Proceedings of the Ubiquitous Convergence Technology, First International Conference, 2006

A Differential Power Analysis Attack of Block Cipher Based on the Hamming Weight of Internal Operation Unit.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

2005
An Improved and Efficient Countermeasure against Power Analysis Attacks.
IACR Cryptol. ePrint Arch., 2005

Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSA-Decryption.
Proceedings of the Progress in Cryptology, 2005

Relative Doubling Attack Against Montgomery Ladder.
Proceedings of the Information Security and Cryptology, 2005

New Key Management Systems for Multilevel Security.
Proceedings of the Computational Science and Its Applications, 2005

A CRT-Based RSA Countermeasure Against Physical Cryptanalysis.
Proceedings of the High Performance Computing and Communications, 2005

Differential Power Analysis on Block Cipher ARIA.
Proceedings of the High Performance Computing and Communications, 2005

2004
Side Channel Cryptanalysis on SEED.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

Improvement on Ha-Moon Randomized Exponentiation Algorithm.
Proceedings of the Information Security and Cryptology, 2004

A Secure and Practical CRT-Based RSA to Resist Side Channel Attacks.
Proceedings of the Computational Science and Its Applications, 2004

2003
A Random M-ary Method Based Countermeasure against Side Channel Attacks.
Proceedings of the Computational Science and Its Applications, 2003

Permanent Fault Attack on the Parameters of RSA with CRT.
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003

2002
Hardware Fault Attackon RSA with CRT Revisited.
Proceedings of the Information Security and Cryptology, 2002

Randomized Signed-Scalar Multiplication of ECC to Resist Power Attacks.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002

A WTLS Handshake Protocol with User Anonymity and Forward Secrecy.
Proceedings of the Mobile Communications, 7th CDMA International Conference, CIC 2002, Seoul, Korea, October 29, 2002

1998
A Common-Multiplicand Method to the Montgomery Algorithm for Speeding up Exponentiation.
Inf. Process. Lett., 1998


  Loading...