Dooho Choi
Orcid: 0000-0001-5625-4067Affiliations:
- Electronics and Telecommunication Research Institute (ETRI), Daejeon, South Korea
According to our database1,
Dooho Choi
authored at least 53 papers
between 2002 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Toffoli-depth reduction method preserving in-place quantum circuits and its application to SHA3-256.
Quantum Inf. Process., April, 2024
Simplified Quantum Circuit Implementation for ASCON Security Analysis against Grover's Algorithm.
Proceedings of the Silicon Valley Cybersecurity Conference, 2024
2023
Correction: MPMCT gate decomposition method reducing T-depth quickly in proportion to the number of work qubits.
Quantum Inf. Process., November, 2023
MPMCT gate decomposition method reducing T-depth quickly in proportion to the number of work qubits.
Quantum Inf. Process., October, 2023
IEEE Internet Things J., January, 2023
IET Inf. Secur., January, 2023
2022
IEEE Trans. Computers, 2022
2020
IEEE Trans. Consumer Electron., 2020
Design of Resistor-Capacitor Physically Unclonable Function for Resource-Constrained IoT Devices.
Sensors, 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the International Conference on Information and Communication Technology Convergence, 2020
Proceedings of the International Conference on Information and Communication Technology Convergence, 2020
2019
IEEE Internet Things J., 2019
Proceedings of the Information Security Applications - 20th International Conference, 2019
Proceedings of the Information Security Applications - 20th International Conference, 2019
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019
Proceedings of the 2019 International Conference on Information and Communication Technology Convergence, 2019
2018
Proceedings of the 2018 IEEE SENSORS, New Delhi, India, October 28-31, 2018, 2018
Proceedings of the International Conference on Information and Communication Technology Convergence, 2018
Proceedings of the International Conference on Information and Communication Technology Convergence, 2018
Non-Repudiable Dynamic PDP with Stronger Security based on Stateful Rank Based Skip List.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2018
2017
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2017
2016
Protecting secret keys in networked devices with table encoding against power analysis attacks.
J. High Speed Networks, 2016
A secure exponentiation algorithm resistant to a combined attack on RSA implementation.
Int. J. Comput. Math., 2016
An Improved Square-always Exponentiation Resistant to Side-channel Attacks on RSA Implementation.
Intell. Autom. Soft Comput., 2016
Proceedings of the 2nd Workshop on Micro Aerial Vehicle Networks, 2016
2015
Secur. Commun. Networks, 2015
Proceedings of the Information Security Applications - 16th International Workshop, 2015
Proceedings of the Information Security Applications - 16th International Workshop, 2015
Proceedings of the International Conference on Information and Communication Technology Convergence, 2015
Inter-vessel traffic service data exchange format protocol security enhancement of user authentication scheme in mobile VTS middleware platform.
Proceedings of the 17th Asia-Pacific Network Operations and Management Symposium, 2015
Proceedings of the 17th Asia-Pacific Network Operations and Management Symposium, 2015
2014
A fault-resistant implementation of AES using differential bytes between input and output.
J. Supercomput., 2014
J. Internet Serv. Inf. Secur., 2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
Proceedings of the Information Security Applications - 15th International Workshop, 2014
2013
J. Internet Serv. Inf. Secur., 2013
2012
A Fault-Resistant AES Implementation Using Differential Characteristic of Input and Output.
J. Internet Serv. Inf. Secur., 2012
Proceedings of the International Conference on Information and Communication Technology Convergence, 2012
2011
Proceedings of the International Carnahan Conference on Security Technology, 2011
2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
2009
IEEE Trans. Computers, 2009
Efficient key detection method in the correlation electromagnetic analysis using peak selection algorithm.
J. Commun. Networks, 2009
IEICE Trans. Inf. Syst., 2009
Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, 2009
2008
J. Commun. Networks, 2008
Proceedings of the IEEE/IFIP Network Operations and Management Symposium: Pervasive Management for Ubioquitous Networks and Services, 2008
2004
Proceedings of the Computational Science and Its Applications, 2004
2003
Proceedings of the Computational Science and Its Applications, 2003
2002