Name
Papers
Collaborators
SEOKHIE HONG
112
157
Citations 
PageRank 
Referers 
881
76.29
1340
Referees 
References 
836
856
Search Limit
1001000
Title
Citations
PageRank
Year
Accelerating the Best Trail Search on AES-Like Ciphers00.342022
Enhancing Time-Frequency Analysis with Zero-Mean Preprocessing00.342022
Toffoli gate count Optimized Space-Efficient Quantum Circuit for Binary Field Multiplication.00.342022
Integral Cryptanalysis of Lightweight Block Cipher PIPO.00.342022
Single-Trace Attack Using One-Shot Learning With Siamese Network in Non-Profiled Setting00.342022
A Preimage Attack on Reduced Gimli-Hash00.342021
A New Method for Designing Lightweight S-Boxes With High Differential and Linear Branch Numbers, and its Application00.342021
Efficient implementation of modular multiplication over 192-bit NIST prime for 8-bit AVR-based sensor node00.342021
Novel Key Recovery Attack on Secure ECDSA Implementation by Exploiting Collisions between Unknown Entries.10.352021
A Combined Single Trace Attack on Global Shuffling Long Integer Multiplication and its Novel Countermeasure00.342020
PIPO - A Lightweight Block Cipher with Efficient Higher-Order Masking Software Implementations.00.342020
New Approach To Constructing Noise Source Based On Race Conditions00.342019
An efficient implementation of pairing-based cryptography on MSP430 processor.00.342018
New Hybrid Method for Isogeny-Based Cryptosystems Using Edwards Curves00.342018
Low complexity bit-parallel multiplier for F2n defined by repeated polynomials.00.342018
RCB: leakage-resilient authenticated encryption via re-keying.10.372018
Efficient Isogeny Computations on Twisted Edwards Curves.10.362018
Correction to: An efficient implementation of pairing-based cryptography on MSP430 processor.00.342018
Efficient Differential Trail Searching Algorithm for ARX Block Ciphers.00.342017
STBC: Side Channel Attack Tolerant Balanced Circuit with Reduced Propagation Delay10.342017
Known-Key Attack On Sm4 Block Cipher00.342017
Faster elliptic curve arithmetic for triple-base chain by reordering sequences of field operations.00.342016
New Impossible Differential Characteristic of SPECK64 using MILP.00.342016
New Efficient Padding Methods Secure Against Padding Oracle Attacks.00.342015
The Switching Generator: New Clock-Controlled Generator with Resistance against the Algebraic and Side Channel Attacks10.372015
Accelerating elliptic curve scalar multiplication over GF(2m) on graphic hardwares.40.442015
Practical Rsa-Pake For Low-Power Device In Imbalanced Wireless Networks00.342014
Message blinding method requiring no multiplicative inversion for RSA00.342014
Related-Key Cryptanalysis On The Full Printcipher Suitable For Ic-Printing30.442014
Formulas for cube roots in F3m using shifted polynomial basis00.342014
Security Analysis Of Scalable Block Cipher Pp-1 Applicable To Distributed Sensor Networks00.342013
Extended elliptic curve Montgomery ladder algorithm over binary fields with resistance to simple power analysis20.412013
Fiat-shamir identification scheme immune to the hardware fault attacks10.352013
Improved Differential Fault Analysis on ARIA using Small Number of Faults.00.342013
Collision Attacks on AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis.50.472013
Improved Differential Fault Analysis on Block Cipher SEED-12800.342012
New bit parallel multiplier with low space complexity for all irreducible trinomials over GF(2n)60.452012
Known-Key Attacks On Generalized Feistel Schemes With Sp Round Function20.402012
Differential fault analysis on block cipher SEED140.792012
Meet-In-The-Middle Preimage Attacks On Hash Modes Of Generalized Feistel And Misty Schemes With Sp Round Function20.372012
Side-channel attacks on HIGHT with reduced masked rounds suitable for the protection of multimedia computing system00.342012
Biclique Cryptanalysis of Lightweight Block Ciphers PRESENT, Piccolo and LED.70.532012
Related-Key Boomerang and Rectangle Attacks: Theory and Experimental Analysis30.482012
A fast and provably secure higher-order masking of AES S-box401.372011
An Efficient Implementation of KCDSA on Graphic Processing Units10.372011
Fault Injection Attack on A5/310.362011
An efficient CRT-RSA algorithm secure against power and fault attacks30.412011
First-order side channel attacks on Zhang's countermeasures.10.352011
Information, Security and Cryptology - ICISC 2009, 12th International Conference, Seoul, Korea, December 2-4, 2009, Revised Selected Papers231.362010
Acceleration Of Differential Power Analysis Through The Parallel Use Of Gpu And Cpu30.452010
  • 1
  • 2