2008 |
15 | EE | Chong Hee Kim,
Jean-Jacques Quisquater:
New Differential Fault Analysis on AES Key Schedule: Two Faults Are Enough.
CARDIS 2008: 48-60 |
14 | EE | Chong Hee Kim,
Philippe Bulens,
Christophe Petit,
Jean-Jacques Quisquater:
Fault Attacks on Public Key Elements: Application to DLP-Based Schemes.
EuroPKI 2008: 182-195 |
13 | EE | Chong Hee Kim,
Jean-Jacques Quisquater:
Method for Detecting Vulnerability to Doubling Attacks.
ICICS 2008: 97-110 |
12 | EE | Chong Hee Kim,
Gildas Avoine,
François Koeune,
François-Xavier Standaert,
Olivier Pereira:
The Swiss-Knife RFID Distance Bounding Protocol.
ICISC 2008: 98-115 |
11 | EE | Jörn-Marc Schmidt,
Chong Hee Kim:
A Probing Attack on AES.
WISA 2008: 256-265 |
2007 |
10 | EE | Chong Hee Kim,
Jean-Jacques Quisquater:
How can we overcome both side channel analysis and fault attacks on RSA-CRT?
FDTC 2007: 21-29 |
9 | EE | Chong Hee Kim,
Jong Hoon Shin,
Jean-Jacques Quisquater,
Pil Joong Lee:
Safe-Error Attack on SPA-FA Resistant Exponentiations Using a HW Modular Multiplier.
ICISC 2007: 273-281 |
8 | EE | Chong Hee Kim,
Jean-Jacques Quisquater:
Fault Attacks for CRT Based RSA: New Attacks, New Results, and New Countermeasures.
WISTP 2007: 215-228 |
7 | EE | Chong Hee Kim,
Jean-Jacques Quisquater:
Faults, Injection Methods, and Fault Attacks.
IEEE Design & Test of Computers 24(6): 544-545 (2007) |
2004 |
6 | EE | Chong Hee Kim,
Yong Ho Hwang,
Pil Joong Lee:
TTS without Revocation Capability Secure Against CCA2.
ACISP 2004: 36-49 |
5 | EE | Yong Ho Hwang,
Chong Hee Kim,
Pil Joong Lee:
An Efficient Revocation Scheme for Stateless Receivers.
EuroPKI 2004: 322-334 |
4 | EE | Chong Hee Kim,
Yong Ho Hwang,
Pil Joong Lee:
Practical Pay-TV Scheme Using Traitor Tracing Scheme for Multiple Channels.
WISA 2004: 264-277 |
2003 |
3 | EE | Yong Ho Hwang,
Chong Hee Kim,
Pil Joong Lee:
An Efficient Revocation Scheme with Minimal Message Length for Stateless Receivers.
ACISP 2003: 377-386 |
2 | EE | Chong Hee Kim,
Yong Ho Hwang,
Pil Joong Lee:
An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack.
ASIACRYPT 2003: 359-373 |
2001 |
1 | EE | Chong Hee Kim,
Pil Joong Lee:
New Key Recovery in WAKE Protocol.
Public Key Cryptography 2001: 325-338 |