Seokhie Hong
Orcid: 0000-0001-7506-4023
According to our database1,
Seokhie Hong
authored at least 143 papers
between 2000 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Toffoli gate count optimized space-efficient quantum circuit for binary field multiplication.
Quantum Inf. Process., October, 2024
Improved Quantum Rebound Attacks on Double Block Length Hashing with Round-Reduced AES-256 and ARIA-256.
IACR Trans. Symmetric Cryptol., 2024
Accurate False-Positive Probability of Multiset-Based Demirci-Selçuk Meet-in-the-Middle Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024
Revisiting the Multiple-of Property for SKINNY: The Exact Computation of the Number of Right Pairs.
IEEE Access, 2024
Cloning Hardware Wallet Without Valid Credentials Through Side-Channel Analysis of Hash Function.
IEEE Access, 2024
2023
IET Inf. Secur., January, 2023
New space-efficient quantum algorithm for binary elliptic curves using the optimized division algorithm.
Quantum Inf. Process., 2023
Shining Light on the Shadow: Full-round Practical Distinguisher for Lightweight Block Cipher Shadow.
IACR Cryptol. ePrint Arch., 2023
Stealing Keys From Hardware Wallets: A Single Trace Side-Channel Attack on Elliptic Curve Scalar Multiplication Without Profiling.
IEEE Access, 2023
Autoscaled-Wavelet Convolutional Layer for Deep Learning-Based Side-Channel Analysis.
IEEE Access, 2023
2022
IACR Trans. Symmetric Cryptol., 2022
IEEE Trans. Computers, 2022
Single-Trace Attack Using One-Shot Learning With Siamese Network in Non-Profiled Setting.
IEEE Access, 2022
IEEE Access, 2022
2021
Efficient implementation of modular multiplication over 192-bit NIST prime for 8-bit AVR-based sensor node.
J. Supercomput., 2021
Novel Key Recovery Attack on Secure ECDSA Implementation by Exploiting Collisions between Unknown Entries.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
Single trace side-channel attack on key reconciliation in quantum key distribution system and its efficient countermeasures.
ICT Express, 2021
IEEE Access, 2021
A New Method for Designing Lightweight S-Boxes With High Differential and Linear Branch Numbers, and its Application.
IEEE Access, 2021
Side Channel Vulnerability in Parity Computation of Generic Key Reconciliation Process on QKD.
Proceedings of the International Conference on Information and Communication Technology Convergence, 2021
Proceedings of the Information Security and Cryptology - ICISC 2021, 2021
Proceedings of the Information Security and Cryptology - ICISC 2021, 2021
2020
IEEE Trans. Inf. Theory, 2020
IACR Cryptol. ePrint Arch., 2020
A Combined Single Trace Attack on Global Shuffling Long Integer Multiplication and its Novel Countermeasure.
IEEE Access, 2020
Proceedings of the International Conference on Information and Communication Technology Convergence, 2020
PIPO: A Lightweight Block Cipher with Efficient Higher-Order Masking Software Implementations.
Proceedings of the Information Security and Cryptology - ICISC 2020, 2020
2019
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
IACR Cryptol. ePrint Arch., 2019
A Practical Collision-Based Power Analysis on RSA Prime Generation and Its Countermeasure.
IEEE Access, 2019
2018
Correction to: An efficient implementation of pairing-based cryptography on MSP430 processor.
J. Supercomput., 2018
J. Supercomput., 2018
Secur. Commun. Networks, 2018
Discret. Appl. Math., 2018
Proceedings of the International Conference on Information and Communication Technology Convergence, 2018
2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 2017 IEEE Computer Society Annual Symposium on VLSI, 2017
2016
Faster elliptic curve arithmetic for triple-base chain by reordering sequences of field operations.
Multim. Tools Appl., 2016
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 22nd IEEE International Symposium on On-Line Testing and Robust System Design, 2016
2015
Weakness of lightweight block ciphers mCrypton and LED against biclique cryptanalysis.
Peer-to-Peer Netw. Appl., 2015
Accelerating elliptic curve scalar multiplication over GF(2<sup>m</sup>) on graphic hardwares.
J. Parallel Distributed Comput., 2015
The Switching Generator: New Clock-Controlled Generator with Resistance against the Algebraic and Side Channel Attacks.
Entropy, 2015
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015
2014
ACM Trans. Embed. Comput. Syst., 2014
Inf. Process. Lett., 2014
Int. J. Distributed Sens. Networks, 2014
Int. J. Distributed Sens. Networks, 2014
2013
ACM Trans. Embed. Comput. Syst., 2013
J. Appl. Math., 2013
Extended elliptic curve Montgomery ladder algorithm over binary fields with resistance to simple power analysis.
Inf. Sci., 2013
Security Analysis of Scalable Block Cipher PP-1 Applicable to Distributed Sensor Networks.
Int. J. Distributed Sens. Networks, 2013
IACR Cryptol. ePrint Arch., 2013
2012
New Bit Parallel Multiplier With Low Space Complexity for All Irreducible Trinomials Over GF(2<sup>n</sup>).
IEEE Trans. Very Large Scale Integr. Syst., 2012
IEEE Trans. Inf. Theory, 2012
Side-channel attacks on HIGHT with reduced masked rounds suitable for the protection of multimedia computing system.
Multim. Tools Appl., 2012
Meet-in-the-Middle Preimage Attacks on Hash Modes of Generalized Feistel and Misty Schemes with SP Round Function.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the 15th International Conference on Network-Based Information Systems, 2012
2011
J. Syst. Softw., 2011
Proceedings of the 5th FTRA International Conference on Multimedia and Ubiquitous Engineering, 2011
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2011
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011
2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
IACR Cryptol. ePrint Arch., 2010
2009
Security Analysis of the Full-Round CHESS-64 Cipher Suitable for Pervasive Computing Environments.
J. Univers. Comput. Sci., 2009
TinyECCK16: An Efficient Field Multiplication Algorithm on 16-bit Environment and Its Application to Tmote Sky Sensor Motes.
IEICE Trans. Inf. Syst., 2009
Proceedings of the Advances in Information Security and Assurance, 2009
2008
TinyECCK: Efficient Elliptic Curve Cryptography Implementation over G<i>F</i>(2<sup><i>m</i></sup>) on 8-Bit Micaz Mote.
IEICE Trans. Inf. Syst., 2008
Weak-Key Classes of 7-Round MISTY 1 and 2 for Related-Key Amplified Boomerang Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
Seven New Block Cipher Structures with Provable Security against Differential Cryptanalysis.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
TinyECCK: Efficient Elliptic Curve Cryptography Implementation over GF(2<sup>m</sup>) on 8-bit MICAz Mote.
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Indifferentiable Security Analysis of choppfMD, chopMD, a chopMDP, chopWPH, chopNI, chopEMD, chopCS, and chopESh Hash Domain Extensions.
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Various Security Analysis of a pfCM-MD Hash Domain Extension and Applications based on the Extension.
IACR Cryptol. ePrint Arch., 2008
Extraction of Residual Information in the Microsoft PowerPoint file from the Viewpoint of Digital Forensics considering PerCom Environment.
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008
Second Preimage Attack on 3-Pass HAVAL and Partial Key-Recovery Attacks on HMAC/NMAC-3-Pass HAVAL.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008
2007
Inf. Process. Lett., 2007
Compression Function Design Principles Supporting Variable Output Lengths from a Single Small Function.
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007
2006
Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers.
J. Cryptol., 2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Progressin Cryptology, 2006
Proceedings of the Progressin Cryptology, 2006
On the Security of HMAC and NMAC Based on HAVAL, MD4, MD5, SHA-0 and SHA-1 (Extended Abstract).
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006
Provable Security for an RC6-like Structure and a MISTY-FO-like Structure Against Differential Cryptanalysis.
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006
Proceedings of the Cryptographic Hardware and Embedded Systems, 2006
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006
2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
Proceedings of the WEWoRC 2005, 2005
Proceedings of the Progress in Cryptology, 2005
Proceedings of the Progress in Cryptology, 2005
Proceedings of the Cryptography and Coding, 2005
Proceedings of the Information Security and Cryptology, 2005
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005
2004
Proceedings of the Progress in Cryptology, 2004
Impossibility of Construction of OWHF and UOWHF from PGV Model Based on Block Cipher Secure Against ACPCA.
Proceedings of the Progress in Cryptology, 2004
Proceedings of the Information Security and Cryptology, 2004
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
2003
Proceedings of the Computer Network Security, 2003
Proceedings of the Progress in Cryptology, 2003
Proceedings of the Progress in Cryptology, 2003
Proceedings of the Information Security and Cryptology, 2003
Proceedings of the Information Security and Cryptology, 2003
2002
Proceedings of the Advances in Cryptology, 2002
2001
Proceedings of the Information Security and Cryptology, 2001
Proceedings of the Advances in Cryptology, 2001
2000
Proceedings of the Information Security and Cryptology, 2000
Provable Security against Differential and Linear Cryptanalysis for the SPN Structure.
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000
Provable Security for the Skipjack-like Structure against Differential Cryptanalysis and Linear Cryptanalysis.
Proceedings of the Advances in Cryptology, 2000
Proceedings of the Information Security and Privacy, 5th Australasian Conference, 2000