What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Dong-Guk Han
Google Scholar
19
publications in security and cryptology related venues
Year
Venue
Title
2023
conf/icisc
Single Trace Analysis of Comparison Operation Based Constant-Time CDT Sampling and Its Countermeasure.
Keon-Hee Choi
Ju-Hwan Kim
Jaeseung Han
Jae-Won Huh
Dong-Guk Han
2022
conf/icisc
Differential Fault Attack on AES Using Maximum Four Bytes Faulty Ciphertexts.
Jae-Won Huh
Dong-Guk Han
2021
conf/icisc
Differential Fault Attack on Lightweight Block Cipher PIPO.
Seonghyuck Lim
Jaeseung Han
Taeho Lee
Dong-Guk Han
2021
conf/icisc
Learning-based Side-Channel Analysis on PIPO.
Ji-Eun Woo
Jaeseung Han
Yeon-Jae Kim
Hye-Won Mun
Seonghyuck Lim
Tae-Ho Lee
Seong-Hyun An
Soo-Jin Kim
Dong-Guk Han
2020
conf/icisc
PIPO: A Lightweight Block Cipher with Efficient Higher-Order Masking Software Implementations.
Hangi Kim
Yongjin Jeon
Giyoon Kim
Jongsung Kim
Bo-Yeon Sim
Dong-Guk Han
Hwajeong Seo
Seonggyeom Kim
Seokhie Hong
Jaechul Sung
Deukjo Hong
2020
conf/wisa
DLDDO: Deep Learning to Detect Dummy Operations.
JongHyeok Lee
Dong-Guk Han
2019
journals/tches
Novel Side-Channel Attacks on Quasi-Cyclic Code-Based Cryptography.
Bo-Yeon Sim
Jihoon Kwon
Kyu Young Choi
Jihoon Cho
Aesun Park
Dong-Guk Han
2018
journals/tches
Side-Channel Attacks on Post-Quantum Signature Schemes based on Multivariate Quadratic Equations - Rainbow and UOV -.
Aesun Park
Kyung-Ah Shim
Namhun Koo
Dong-Guk Han
2017
conf/icisc
Novel Leakage Against Realistic Masking and Shuffling Countermeasures - Case Study on PRINCE and SEED.
Yoo-Seung Won
Aesun Park
Dong-Guk Han
2016
conf/host
Chosen ciphertext Simple Power Analysis on software 8-bit implementation of ring-LWE encryption.
Aesun Park
Dong-Guk Han
2015
conf/wisa
An Improved Second-Order Power Analysis Attack Based on a New Refined Expecter - - Case Study on Protected AES -.
Hyunjin Ahn
Neil Hanley
Máire O'Neill
Dong-Guk Han
2007
conf/acns
Compressed XTR.
Masaaki Shirase
Dong-Guk Han
Yasushi Hibino
Ho Won Kim
Tsuyoshi Takagi
2006
conf/cans
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields.
Tae Hyun Kim
Tsuyoshi Takagi
Dong-Guk Han
Ho Won Kim
Jongin Lim
2004
conf/acisp
On Security of XTR Public Key Cryptosystems Against Side Channel Attacks.
Dong-Guk Han
Jongin Lim
Kouichi Sakurai
2004
conf/acns
Cryptanalysis of the Countermeasures Using Randomized Binary Signed Digits.
Dong-Guk Han
Katsuyuki Okeya
Tae Hyun Kim
Yoon Sung Hwang
Young-Ho Park
Souhwan Jung
2004
conf/icics
Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure.
Dong-Guk Han
Tetsuya Izu
Jongin Lim
Kouichi Sakurai
2003
conf/acisp
Cryptanalysis of the Full Version Randomized Addition-Subtraction Chains.
Dong-Guk Han
Nam Su Chang
Seok Won Jung
Young-Ho Park
Chang Han Kim
Heuisu Ryu
2002
conf/acisp
A Practical Approach Defeating Blackmailing.
Dong-Guk Han
Hye-Young Park
Young-Ho Park
Sangjin Lee
Dong Hoon Lee
Hyungjin Yang
2002
conf/sacrypt
Optimal Extension Fields for XTR.
Dong-Guk Han
Ki Soon Yoon
Young-Ho Park
Chang Han Kim
Jongin Lim
Coauthors
Aesun Park
(4)
Bo-Yeon Sim
(2)
Chang Han Kim
(2)
Deukjo Hong
(1)
Dong Hoon Lee
(1)
Dong-Guk Han
(19)
Giyoon Kim
(1)
Hangi Kim
(1)
Heuisu Ryu
(1)
Ho Won Kim
(2)
Hwajeong Seo
(1)
Hye-Won Mun
(1)
Hye-Young Park
(1)
Hyungjin Yang
(1)
Hyunjin Ahn
(1)
Jae-Won Huh
(2)
Jaechul Sung
(1)
Jaeseung Han
(3)
Ji-Eun Woo
(1)
Jihoon Cho
(1)
Jihoon Kwon
(1)
JongHyeok Lee
(1)
Jongin Lim
(4)
Jongsung Kim
(1)
Ju-Hwan Kim
(1)
Katsuyuki Okeya
(1)
Keon-Hee Choi
(1)
Ki Soon Yoon
(1)
Kouichi Sakurai
(2)
Kyu Young Choi
(1)
Kyung-Ah Shim
(1)
Máire O'Neill
(1)
Masaaki Shirase
(1)
Nam Su Chang
(1)
Namhun Koo
(1)
Neil Hanley
(1)
Sangjin Lee
(1)
Seok Won Jung
(1)
Seokhie Hong
(1)
Seong-Hyun An
(1)
Seonggyeom Kim
(1)
Seonghyuck Lim
(2)
Soo-Jin Kim
(1)
Souhwan Jung
(1)
Tae Hyun Kim
(2)
Tae-Ho Lee
(1)
Taeho Lee
(1)
Tetsuya Izu
(1)
Tsuyoshi Takagi
(2)
Yasushi Hibino
(1)
Yeon-Jae Kim
(1)
Yongjin Jeon
(1)
Yoo-Seung Won
(1)
Yoon Sung Hwang
(1)
Young-Ho Park
(4)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to