Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    A Differential Power Analysis Attack of Block Cipher Based on the Hamming Weight of Internal Operation Unit

    Power analysis attack, which was introduced by Kocher et al. in 1999, was known as the most threatening physical attack against low power device such as smart-card. The essential reason that allows an attacker...

    JeaHoon Park, HoonJae Lee, JaeCheol Ha in Computational Intelligence and Security (2007)

  2. No Access

    Chapter and Conference Paper

    Ternary Tree Based Group Key Management in Dynamic Peer Networks

    For group-oriented applications, designing secure and efficient group key management schemes is a major problem. We present a group key management scheme for dynamic peer networks, which supports join, leave, ...

    Wei Wang, Jianfeng Ma, SangJae Moon in Computational Intelligence and Security (2007)

  3. No Access

    Chapter and Conference Paper

    Provably Secure Countermeasure Resistant to Several Types of Power Attack for ECC

    Recently, it has been shown that some cryptographic devices, such as smart card, RFID and USB token, are vulnerable to the power attacks if they have no defence against them. With the introduction of new types...

    JaeCheol Ha, JeaHoon Park, SangJae Moon, SungMing Yen in Information Security Applications (2007)

  4. No Access

    Chapter and Conference Paper

    Investigations of Power Analysis Attacks and Countermeasures for ARIA

    In this paper we investigate implementations of ARIA on an 8-bit smartcard. Our investigation focuses on the resistance against different types of differential power analysis (DPA) attacks. We show that an unp...

    HyungSo Yoo, Christoph Herbst, Stefan Mangard in Information Security Applications (2007)

  5. Chapter and Conference Paper

    Security Analysis of the Authentication Modules of Chinese WLAN Standard and Its Implementation Plan

    With the Canetti-Krawczyk (CK) model, we analyze the authentication module WAIs in the Chinese WLAN national security standard WAPI and its implementation plan respectively. The security weaknesses of WAI in t...

    **nghua Li, Jianfeng Ma, SangJae Moon in Network and Parallel Computing (2007)

  6. No Access

    Chapter and Conference Paper

    Relative Doubling Attack Against Montgomery Ladder

    Highly regular execution and the cleverly included redundant computation make the square-multiply-always exponentiation algorithm well known as a good countermeasure against the conventional simple power analy...

    Sung-Ming Yen, Lee-Chun Ko, SangJae Moon in Information Security and Cryptology - ICIS… (2006)

  7. No Access

    Chapter and Conference Paper

    How to Generate Universally Verifiable Signatures in Ad-Hoc Networks

    This paper addresses the problem of making signatures of one domain (an ad-hoc network) available in another domain (the Internet). Universal verifiability is a highly desirable property when signed documents ...

    KyungKeun Lee, JoongHyo Oh, SangJae Moon in Secure Mobile Ad-hoc Networks and Sensors (2006)

  8. Chapter and Conference Paper

    Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves

    Joux’s tripartite key agreement protocol is one of the most prominent developments in the area of key agreement. Although certificate-based and ID-based authentication schemes have been proposed to provide aut...

    Sanggon Lee, Yvonne Hitchcock, Youngho Park, Sangjae Moon in Selected Areas in Cryptography (2006)

  9. No Access

    Chapter and Conference Paper

    On the Security of the Canetti-Krawczyk Model

    The Canetti-Krawczyk (CK) model is a formal method to design and analyze of key agreement protocols, and these protocols should have some desirable security attributes. In this paper, the relationship between ...

    **nghua Li, Jianfeng Ma, SangJae Moon in Computational Intelligence and Security (2005)

  10. No Access

    Chapter and Conference Paper

    Power Analysis by Exploiting Chosen Message and Internal Collisions – Vulnerability of Checking Mechanism for RSA-Decryption

    In this paper, we will point out a new side-channel vulnerability of cryptosystems implementation based on BRIP or square-multiply-always algorithm by exploiting specially chosen input message of order two. A ...

    Sung-Ming Yen, Wei-Chih Lien, SangJae Moon in Progress in Cryptology – Mycrypt 2005 (2005)

  11. No Access

    Chapter and Conference Paper

    Side Channel Cryptanalysis on SEED

    The Korea standard block cipher, SEED, is a 128-bit symmetric block cipher with a more complex F function than DES. This paper shows that SEED is vulnerable to two types of side channel attacks, a fault analys...

    HyungSo Yoo, ChangKyun Kim, JaeCheol Ha, SangJae Moon in Information Security Applications (2005)

  12. No Access

    Chapter and Conference Paper

    Differential Power Analysis on Block Cipher ARIA

    ARIA is a 128-bit symmetric block cipher having 128-bit, 192-bit, or 256-bit key lengths. The cipher is a substitution-permutation encryption network (SPN) that uses an involutional binary matrix. This paper s...

    JaeCheol Ha, ChangKyun Kim, SangJae Moon in High Performance Computing and Communicati… (2005)

  13. No Access

    Chapter and Conference Paper

    Efficient Group Key Management for Dynamic Peer Networks

    In dynamic peer networks, how to promote the performance of group key management without sacrificing the desired security is a critical and difficult problem. In this paper, a secure, efficient and distributed...

    Wei Wang, Jianfeng Ma, SangJae Moon in Mobile Ad-hoc and Sensor Networks (2005)

  14. No Access

    Chapter and Conference Paper

    A CRT-Based RSA Countermeasure Against Physical Cryptanalysis

    This paper considers a secure and practical CRT-based RSA signature implementation against both side channel attacks (including power analysis attack, timing attack, and most specially the recent MRED attack) ...

    ChangKyun Kim, JaeCheol Ha, SangJae Moon in High Performance Computing and Communicati… (2005)

  15. No Access

    Chapter and Conference Paper

    The Security Proof of a 4-Way Handshake Protocol in IEEE 802.11i

    The IEEE 802.11i is the security standard to solve the security problems of WLAN, in which, the protocol 4-way handshake plays a very important role in the authentication and key agreement process. In this pap...

    Fan Zhang, Jianfeng Ma, SangJae Moon in Computational Intelligence and Security (2005)

  16. No Access

    Chapter and Conference Paper

    Dragon: A Fast Word Based Stream Cipher

    This paper presents Dragon, a new stream cipher constructed using a single word based non-linear feedback shift register and a non-linear filter function with memory. Dragon uses a variable length key and init...

    Kevin Chen, Matt Henricksen, William Millan in Information Security and Cryptology – ICIS… (2005)

  17. No Access

    Chapter and Conference Paper

    Improvement on Ha-Moon Randomized Exponentiation Algorithm

    Randomized recoding on the exponent of an exponentiation computation into a signed-digit representation has been a well known countermeasure against some side-channel attacks. However, this category of counter...

    Sung-Ming Yen, Chien-Ning Chen, SangJae Moon in Information Security and Cryptology – ICIS… (2005)

  18. No Access

    Chapter and Conference Paper

    Security Analysis of Two Signcryption Schemes

    Signcryption is a new cryptographic primitive that performs signing and encryption simultaneously, at a cost significantly lower than that required by the traditional signature-then-encryption approach. In thi...

    Guilin Wang, Robert H. Deng, Dong** Kwak, SangJae Moon in Information Security (2004)

  19. No Access

    Chapter and Conference Paper

    A Proposal for DoS-Defensive Internet Key Exchange

    A variety of DoS attacks are incapacitating the Net infrastructures. IKEs can be easily targeted by these attacks because they force to process heavy computations, and an IKE is the beginning handshake procedu...

    MyungSik Choi, Dong** Kwak, SangJae Moon in Computational Science and Its Applications… (2003)

  20. No Access

    Chapter and Conference Paper

    Permanent Fault Attack on the Parameters of RSA with CRT

    Chinese remainder theorem has been widely employed to speedup the RSA computation. In this paper, one kind of permanent fault attack on RSA with CRT will be pointed out which exploits a permanent fault on the ...

    Sung-Ming Yen, SangJae Moon, JaeCheol Ha in Information Security and Privacy (2003)

previous disabled Page of 2