Chong Hee Kim

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

15EEChong Hee Kim, Jean-Jacques Quisquater: New Differential Fault Analysis on AES Key Schedule: Two Faults Are Enough. CARDIS 2008: 48-60
14EEChong Hee Kim, Philippe Bulens, Christophe Petit, Jean-Jacques Quisquater: Fault Attacks on Public Key Elements: Application to DLP-Based Schemes. EuroPKI 2008: 182-195
13EEChong Hee Kim, Jean-Jacques Quisquater: Method for Detecting Vulnerability to Doubling Attacks. ICICS 2008: 97-110
12EEChong Hee Kim, Gildas Avoine, François Koeune, François-Xavier Standaert, Olivier Pereira: The Swiss-Knife RFID Distance Bounding Protocol. ICISC 2008: 98-115
11EEJörn-Marc Schmidt, Chong Hee Kim: A Probing Attack on AES. WISA 2008: 256-265
10EEChong Hee Kim, Jean-Jacques Quisquater: How can we overcome both side channel analysis and fault attacks on RSA-CRT? FDTC 2007: 21-29
9EEChong Hee Kim, Jong Hoon Shin, Jean-Jacques Quisquater, Pil Joong Lee: Safe-Error Attack on SPA-FA Resistant Exponentiations Using a HW Modular Multiplier. ICISC 2007: 273-281
8EEChong Hee Kim, Jean-Jacques Quisquater: Fault Attacks for CRT Based RSA: New Attacks, New Results, and New Countermeasures. WISTP 2007: 215-228
7EEChong Hee Kim, Jean-Jacques Quisquater: Faults, Injection Methods, and Fault Attacks. IEEE Design & Test of Computers 24(6): 544-545 (2007)
6EEChong Hee Kim, Yong Ho Hwang, Pil Joong Lee: TTS without Revocation Capability Secure Against CCA2. ACISP 2004: 36-49
5EEYong Ho Hwang, Chong Hee Kim, Pil Joong Lee: An Efficient Revocation Scheme for Stateless Receivers. EuroPKI 2004: 322-334
4EEChong Hee Kim, Yong Ho Hwang, Pil Joong Lee: Practical Pay-TV Scheme Using Traitor Tracing Scheme for Multiple Channels. WISA 2004: 264-277
3EEYong Ho Hwang, Chong Hee Kim, Pil Joong Lee: An Efficient Revocation Scheme with Minimal Message Length for Stateless Receivers. ACISP 2003: 377-386
2EEChong Hee Kim, Yong Ho Hwang, Pil Joong Lee: An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack. ASIACRYPT 2003: 359-373
1EEChong Hee Kim, Pil Joong Lee: New Key Recovery in WAKE Protocol. Public Key Cryptography 2001: 325-338

Coauthor Index

1Gildas Avoine [12]
2Philippe Bulens [14]
3Yong Ho Hwang [2] [3] [4] [5] [6]
4François Koeune [12]
5Pil Joong Lee [1] [2] [3] [4] [5] [6] [9]
6Olivier Pereira [12]
7Christophe Petit [14]
8Jean-Jacques Quisquater [7] [8] [9] [10] [13] [14] [15]
9Jörn-Marc Schmidt [11]
10Jong Hoon Shin [9]
11François-Xavier Standaert [12]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)