Zobrazeno 1 - 10
of 19
pro vyhledávání: '"Sunghyun Jin"'
Publikováno v:
IEEE Access, Vol 12, Pp 105326-105336 (2024)
Side-channel analysis is one of the vulnerabilities in IoT’s cryptographic systems. To present reliable side-channel analysis results, it is crucial to collect considerable amounts of power consumption traces. Handling large datasets in this contex
Externí odkaz:
https://doaj.org/article/9ed5554dd51443e5867050fc45d0bdb9
Publikováno v:
ETRI Journal, Vol 42, Iss 2, Pp 292-304 (2020)
As side‐channel analysis and machine learning algorithms share the same objective of classifying data, numerous studies have been proposed for adapting machine learning to side‐channel analysis. However, a drawback of machine learning algorithms
Externí odkaz:
https://doaj.org/article/526a157537904085b74a407785ee979b
Publikováno v:
Transactions on Cryptographic Hardware and Embedded Systems, Vol 2021, Iss 4 (2021)
In this paper, we propose a novel key recovery attack against secure ECDSA signature generation employing regular table-based scalar multiplication. Our attack exploits novel leakage, denoted by collision information, which can be constructed by iter
Externí odkaz:
https://doaj.org/article/988dcde486384eb8ac8cecb5996d3c2f
Publikováno v:
Sensors, Vol 22, Iss 7, p 2477 (2022)
Side-channel analysis is a critical threat to cryptosystems on the Internet of Things and in relation to embedded devices, and appropriate side-channel countermeasure must be required for physical security. A combined countermeasure approach employin
Externí odkaz:
https://doaj.org/article/8fbcf02c501d4edcbf4289e791811445
Publikováno v:
Applied Sciences, Vol 8, Iss 10, p 2002 (2018)
Unified point addition for computing elliptic curve point addition and doubling is considered to be resistant to simple power analysis. Recently, new side-channel attacks, such as recovery of secret exponent by triangular trace analysis and horizonta
Externí odkaz:
https://doaj.org/article/fe564780f9784ecdbc92caf98022db14
Publikováno v:
Applied Sciences, Vol 8, Iss 11, p 2014 (2018)
As researches on the quantum computer have progressed immensely, interests in post-quantum cryptography have greatly increased. NTRU is one of the well-known algorithms due to its practical key sizes and fast performance along with the resistance aga
Externí odkaz:
https://doaj.org/article/671688ed42494939a8a289c4ae6268bd
Autor:
Sunghyun Jin, Sehwan Kim
Publikováno v:
The Journal of Image and Cultural Contents. 28:127-149
Autor:
Teri Lee, Sunghyun Jin
Publikováno v:
The Korean Society of Culture and Convergence. 44:445-474
Publikováno v:
IEEE Transactions on Computers. :1-11
Publikováno v:
2022 13th International Conference on Information and Communication Technology Convergence (ICTC).