Seungkwang Lee

Orcid: 0000-0001-9534-9624

According to our database1, Seungkwang Lee authored at least 23 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Entropy Sharing in Ransomware: Bypassing Entropy-Based Detection of Cryptographic Operations.
Sensors, March, 2024

2023
POSTER: Stopping Run-Time Countermeasures in Cryptographic Primitives.
Proceedings of the Applied Cryptography and Network Security Workshops, 2023

2022
Practical Order-Revealing Encryption with Short Ciphertext.
IEICE Trans. Inf. Syst., November, 2022

A Multi-Tree Approach to Mutable Order-Preserving Encoding.
IEICE Trans. Inf. Syst., November, 2022

Alternative Tower Field Construction for Quantum Implementation of the AES S-Box.
IEEE Trans. Computers, 2022

Balanced Encoding of Near-Zero Correlation for an AES Implementation.
CoRR, 2022

Rcryptect: Real-time detection of cryptographic function in the user-space filesystem.
Comput. Secur., 2022

2021
Table Redundancy Method for Protecting Against Fault Attacks.
IEEE Access, 2021

2020
Towards Optimizing Quantum Implementation of AES S-box.
IACR Cryptol. ePrint Arch., 2020

Improvement on a Masked White-Box Cryptographic Implementation.
IEEE Access, 2020

On the Linear Transformation in White-Box Cryptography.
IEEE Access, 2020

2019
Table Redundancy Method for Protecting against Differential Fault Analysis in the White-box Cryptography.
IACR Cryptol. ePrint Arch., 2019

Crypto-Protector: Multi-threaded RSA to Prevent EM Attacks.
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019

2018
A Masked White-Box Cryptographic Implementation for Protecting Against Differential Computation Analysis.
IEEE Trans. Inf. Forensics Secur., 2018

A White-Box Cryptographic Implementation for Protecting against Power Analysis.
IEICE Trans. Inf. Syst., 2018

A Key Leakage Preventive White-box Cryptographic Implementation.
IACR Cryptol. ePrint Arch., 2018

False Secret Keys to Disturb Power Analysis.
Proceedings of the Tenth International Conference on Ubiquitous and Future Networks, 2018

2017
A Masked White-box Cryptographic Implementation for Protecting against Differential Computation Analysis.
IACR Cryptol. ePrint Arch., 2017

2016
Protecting secret keys in networked devices with table encoding against power analysis attacks.
J. High Speed Networks, 2016

One-Bit to Four-Bit Dual Conversion for Security Enhancement against Power Analysis.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

2014
Function Masking: A New Countermeasure Against Side Channel Attack.
Proceedings of the Information Security Applications - 15th International Workshop, 2014

2012
DRMFS: A file system layer for transparent access semantics of DRM-protected contents.
J. Syst. Softw., 2012

Privacy-preserving cross-user source-based data deduplication in cloud storage.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2012


  Loading...