The Swiss-knife RFID distance bounding protocol C Kim, G Avoine, F Koeune, FX Standaert, O Pereira Information Security and Cryptology–ICISC 2008, 98-115, 2009 | 236 | 2009 |
Fault attacks for CRT based RSA: New attacks, new results, and new countermeasures CH Kim, JJ Quisquater Information Security Theory and Practices. Smart Cards, Mobile and …, 2007 | 178 | 2007 |
RFID distance bounding protocol with mixed challenges to prevent relay attacks CH Kim, G Avoine Cryptology and Network Security: 8th International Conference, CANS 2009 …, 2009 | 143 | 2009 |
New differential fault analysis on AES key schedule: Two faults are enough CH Kim, JJ Quisquater Smart Card Research and Advanced Applications: 8th IFIP WG 8.8/11.2 …, 2008 | 132 | 2008 |
Faults, injection methods, and fault attacks CH Kim, JJ Quisquater IEEE Design & Test of Computers 24 (6), 544-545, 2007 | 130 | 2007 |
Improved differential fault analysis on AES key schedule CH Kim IEEE transactions on information forensics and security 7 (1), 41-50, 2011 | 101 | 2011 |
Differential fault analysis against AES-192 and AES-256 with minimal faults CH Kim 2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, 3-9, 2010 | 81 | 2010 |
How can we overcome both side channel analysis and fault attacks on RSA-CRT? CH Kim, JJ Quisquater Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2007), 21-29, 2007 | 74 | 2007 |
Security of distance-bounding: A survey G Avoine, MA Bingöl, I Boureanu, S Čapkun, G Hancke, S Kardaş, ... ACM Computing Surveys (CSUR) 51 (5), 1-33, 2018 | 64 | 2018 |
RFID distance bounding protocols with mixed challenges CH Kim, G Avoine IEEE Transactions on Wireless Communications 10 (5), 1618-1626, 2011 | 61 | 2011 |
An efficient public key trace and revoke scheme secure against adaptive chosen ciphertext attack CH Kim, YH Hwang, PJ Lee Advances in Cryptology-ASIACRYPT 2003: 9th International Conference on the …, 2003 | 44 | 2003 |
Differential fault analysis of AES: Toward reducing number of faults CH Kim Information Sciences 199, 43-57, 2012 | 34 | 2012 |
Mutual distance bounding protocols G Avoine, CH Kim IEEE Transactions on Mobile Computing 12 (5), 830-839, 2012 | 26 | 2012 |
A probing attack on AES JM Schmidt, CH Kim Information Security Applications: 9th International Workshop, WISA 2008 …, 2009 | 21 | 2009 |
Safe-error attack on SPA-FA resistant exponentiations using a HW modular multiplier CH Kim, JH Shin, JJ Quisquater, PJ Lee Information Security and Cryptology-ICISC 2007: 10th International …, 2007 | 20 | 2007 |
Practical pay-TV scheme using traitor tracing scheme for multiple channels C Kim, Y Hwang, P Lee Information Security Applications, 264-277, 2005 | 16 | 2005 |
Determining the validity of a connection between a reader and a transponder CH Kim US Patent 8,698,605, 2014 | 13 | 2014 |
Fault attacks on public key elements: Application to DLP-based schemes CH Kim, P Bulens, C Petit, JJ Quisquater Public Key Infrastructure: 5th European PKI Workshop: Theory and Practice …, 2008 | 11 | 2008 |
An efficient revocation scheme with minimal message length for stateless receivers YH Hwang, CH Kim, PJ Lee Information Security and Privacy: 8th Australasian Conference, ACISP 2003 …, 2003 | 11 | 2003 |
Security analysis of YKHL distance bounding protocol with adjustable false acceptance rate CH Kim IEEE communications letters 15 (10), 1078-1080, 2011 | 9 | 2011 |