Segui
Dooho Choi
Dooho Choi
Korea University Sejong
Email verificata su korea.ac.kr
Titolo
Citata da
Citata da
Anno
New signature scheme using conjugacy problem
KH Ko, DH Choi, MS Cho, JW Lee
Cryptology ePrint Archive, 2002
1212002
Countermeasures against power analysis attacks for the NTRU public key cryptosystem
MK Lee, JE Song, D Choi, DG Han
IEICE transactions on fundamentals of electronics, communications and …, 2010
542010
A security framework for a drone delivery service
SH Seo, J Won, E Bertino, Y Kang, D Choi
Proceedings of the 2Nd Workshop on Micro Aerial Vehicle Networks, Systems …, 2016
492016
Electronic tag including privacy level information and privacy protection apparatus and method using RFID tag
BG Lee, DH Choi, HW Kim, KI Chung
US Patent 7,847,694, 2010
472010
Differential Fault Analysis for Round‐Reduced AES by Fault Injection
JH Park, SJ Moon, DH Choi, YS Kang, JC Ha
ETRI Journal 33 (3), 434-442, 2011
432011
Method and system for authenticating rfid tag
YS Kang, YJ Choi, DH Choi, KI Chung, HS Cho
US Patent App. 12/498,221, 2010
402010
Mobile IP and WLAN with AAA authentication protocol using identity-based cryptography
BG Lee, DH Choi, HG Kim, SW Sohn, KH Park
10th International Conference on Telecommunications, 2003. ICT 2003. 1, 597-603, 2003
402003
Two-factor fuzzy commitment for unmanned IoT devices security
D Choi, SH Seo, YS Oh, Y Kang
IEEE Internet of Things Journal 6 (1), 335-348, 2018
372018
Privacy-preserving cross-user source-based data deduplication in cloud storage
S Lee, D Choi
2012 International conference on ICT convergence (ICTC), 329-330, 2012
372012
Efficient implementation of pairing-based cryptography on a sensor node
M Shirase, Y Miyazaki, T Takagi, DG Han, D Choi
IEICE transactions on information and systems 92 (5), 909-917, 2009
362009
Puf based iot device authentication scheme
B Kim, S Yoon, Y Kang, D Choi
2019 international conference on information and communication technology …, 2019
352019
Parameterizations of 1-bridge torus knots
DH Choi, KH Ko
Journal of Knot Theory and Its Ramifications 12 (04), 463-491, 2003
332003
Improved computation of square roots in specific finite fields
DG Han, D Choi, H Kim
IEEE Transactions on Computers 58 (2), 188-196, 2008
322008
Product authentication service of consumer's mobile RFID device
J Kim, D Choi, I Kim, H Kim
2006 IEEE International Symposium on Consumer Electronics, 1-6, 2006
292006
Secure device and method for preventing side channel attack
JH Kim, YS Kang, DH Choi, YJ Choi
US Patent 8,341,758, 2012
242012
Puf-based authentication scheme for iot devices
S Yoon, B Kim, Y Kang, D Choi
2020 international conference on information and communication technology …, 2020
232020
Electronic tag for protecting privacy and method of protecting privacy using the same
DH Choi, JH Kim, HW Kim, KI Chung
US Patent App. 11/893,496, 2008
212008
Implementing side channel analysis evaluation boards of KLA-SCARF system
YJ Choi, DH Choi, JC Ryou
Journal of the Korea Institute of Information Security & Cryptology 24 (1 …, 2014
202014
Wireless transceiver aided run-time secret key extraction for IoT device security
MK Oh, S Lee, Y Kang, D Choi
IEEE Transactions on Consumer Electronics 66 (1), 11-21, 2019
192019
Alternative tower field construction for quantum implementation of the AES S-box
D Chung, S Lee, D Choi, J Lee
IEEE Transactions on Computers 71 (10), 2553-2564, 2021
18*2021
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20