New signature scheme using conjugacy problem KH Ko, DH Choi, MS Cho, JW Lee Cryptology ePrint Archive, 2002 | 121 | 2002 |
Countermeasures against power analysis attacks for the NTRU public key cryptosystem MK Lee, JE Song, D Choi, DG Han IEICE transactions on fundamentals of electronics, communications and …, 2010 | 54 | 2010 |
A security framework for a drone delivery service SH Seo, J Won, E Bertino, Y Kang, D Choi Proceedings of the 2Nd Workshop on Micro Aerial Vehicle Networks, Systems …, 2016 | 49 | 2016 |
Electronic tag including privacy level information and privacy protection apparatus and method using RFID tag BG Lee, DH Choi, HW Kim, KI Chung US Patent 7,847,694, 2010 | 47 | 2010 |
Differential Fault Analysis for Round‐Reduced AES by Fault Injection JH Park, SJ Moon, DH Choi, YS Kang, JC Ha ETRI Journal 33 (3), 434-442, 2011 | 43 | 2011 |
Method and system for authenticating rfid tag YS Kang, YJ Choi, DH Choi, KI Chung, HS Cho US Patent App. 12/498,221, 2010 | 40 | 2010 |
Mobile IP and WLAN with AAA authentication protocol using identity-based cryptography BG Lee, DH Choi, HG Kim, SW Sohn, KH Park 10th International Conference on Telecommunications, 2003. ICT 2003. 1, 597-603, 2003 | 40 | 2003 |
Two-factor fuzzy commitment for unmanned IoT devices security D Choi, SH Seo, YS Oh, Y Kang IEEE Internet of Things Journal 6 (1), 335-348, 2018 | 37 | 2018 |
Privacy-preserving cross-user source-based data deduplication in cloud storage S Lee, D Choi 2012 International conference on ICT convergence (ICTC), 329-330, 2012 | 37 | 2012 |
Efficient implementation of pairing-based cryptography on a sensor node M Shirase, Y Miyazaki, T Takagi, DG Han, D Choi IEICE transactions on information and systems 92 (5), 909-917, 2009 | 36 | 2009 |
Puf based iot device authentication scheme B Kim, S Yoon, Y Kang, D Choi 2019 international conference on information and communication technology …, 2019 | 35 | 2019 |
Parameterizations of 1-bridge torus knots DH Choi, KH Ko Journal of Knot Theory and Its Ramifications 12 (04), 463-491, 2003 | 33 | 2003 |
Improved computation of square roots in specific finite fields DG Han, D Choi, H Kim IEEE Transactions on Computers 58 (2), 188-196, 2008 | 32 | 2008 |
Product authentication service of consumer's mobile RFID device J Kim, D Choi, I Kim, H Kim 2006 IEEE International Symposium on Consumer Electronics, 1-6, 2006 | 29 | 2006 |
Secure device and method for preventing side channel attack JH Kim, YS Kang, DH Choi, YJ Choi US Patent 8,341,758, 2012 | 24 | 2012 |
Puf-based authentication scheme for iot devices S Yoon, B Kim, Y Kang, D Choi 2020 international conference on information and communication technology …, 2020 | 23 | 2020 |
Electronic tag for protecting privacy and method of protecting privacy using the same DH Choi, JH Kim, HW Kim, KI Chung US Patent App. 11/893,496, 2008 | 21 | 2008 |
Implementing side channel analysis evaluation boards of KLA-SCARF system YJ Choi, DH Choi, JC Ryou Journal of the Korea Institute of Information Security & Cryptology 24 (1 …, 2014 | 20 | 2014 |
Wireless transceiver aided run-time secret key extraction for IoT device security MK Oh, S Lee, Y Kang, D Choi IEEE Transactions on Consumer Electronics 66 (1), 11-21, 2019 | 19 | 2019 |
Alternative tower field construction for quantum implementation of the AES S-box D Chung, S Lee, D Choi, J Lee IEEE Transactions on Computers 71 (10), 2553-2564, 2021 | 18* | 2021 |