![]() |
| 2008 | ||
|---|---|---|
| 3 | EE | Dae Hyun Yum, Jong Hoon Shin, Pil Joong Lee: Security Analysis of Yeh-Tsai Security Mechanism. IEICE Transactions 91-D(5): 1477-1480 (2008) |
| 2007 | ||
| 2 | EE | Chong Hee Kim, Jong Hoon Shin, Jean-Jacques Quisquater, Pil Joong Lee: Safe-Error Attack on SPA-FA Resistant Exponentiations Using a HW Modular Multiplier. ICISC 2007: 273-281 |
| 2005 | ||
| 1 | EE | Jong Hoon Shin, Dong Jin Park, Pil Joong Lee: DPA Attack on the Improved Ha-Moon Algorithm. WISA 2005: 283-291 |
| 1 | Chong Hee Kim | [2] |
| 2 | Pil Joong Lee | [1] [2] [3] |
| 3 | Dong Jin Park | [1] |
| 4 | Jean-Jacques Quisquater | [2] |
| 5 | Dae Hyun Yum | [3] |