Skip to main content

previous disabled Page of 3
and
  1. No Access

    Chapter and Conference Paper

    AKA Protocols for Mobile Communications

    This paper proposes a modified signcryption scheme that provides signer anonymity. In addition, an efficient 2-pass authentication and key agreement protocol that uses the proposed signcryption scheme is prese...

    KookHeui Lee, SangJae Moon in Information Security and Privacy (2000)

  2. No Access

    Chapter and Conference Paper

    New Public-Key Cryptosystem Using Divisor Class Groups

    We show how to use ideal arithmetic in the divisor class group of an affine normal subring of K[X, Y] generated by monomials, where K is a field, to design new public-key cryptosystems, whose security is based on...

    Hwankoo Kim, SangJae Moon in Information Security and Privacy (2001)

  3. No Access

    Chapter and Conference Paper

    RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis

    This article considers the problem of how to prevent the fast RSA signature and decryption computation with residue number system (or called the CRT-based approach) speedup from a hardware fault cryptanalysis ...

    Yen Sung-Ming, Seungjoo Kim, Seongan Lim in Information Security and Cryptology — ICIS… (2002)

  4. No Access

    Chapter and Conference Paper

    A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack

    Recently, many research works have been reported about how physical cryptanalysis can be carried out on cryptographic devices by exploiting any possible leaked information through side channels. In this paper,...

    Yen Sung-Ming, Seungjoo Kim, Seongan Lim in Information Security and Cryptology — ICIS… (2002)

  5. No Access

    Chapter and Conference Paper

    A Proposal for DoS-Defensive Internet Key Exchange

    A variety of DoS attacks are incapacitating the Net infrastructures. IKEs can be easily targeted by these attacks because they force to process heavy computations, and an IKE is the beginning handshake procedu...

    MyungSik Choi, Dong** Kwak, SangJae Moon in Computational Science and Its Applications… (2003)

  6. No Access

    Chapter and Conference Paper

    Permanent Fault Attack on the Parameters of RSA with CRT

    Chinese remainder theorem has been widely employed to speedup the RSA computation. In this paper, one kind of permanent fault attack on RSA with CRT will be pointed out which exploits a permanent fault on the ...

    Sung-Ming Yen, SangJae Moon, JaeCheol Ha in Information Security and Privacy (2003)

  7. No Access

    Chapter and Conference Paper

    A Random M-ary Method Based Countermeasure against Side Channel Attacks

    The randomization of scalar multiplication in ECC is one of the fundamental concepts in defense methods against side channel attacks. This paper proposes a countermeasure against simple and differential power ...

    MahnKi Ahn, JaeCheol Ha, HoonJae Lee in Computational Science and Its Applications… (2003)

  8. Chapter and Conference Paper

    Efficient Distributed Signcryption Scheme as Group Signcryption

    The existing distributed signcryption is designed for distributing a signcrypted message to a designated group. However, it does not provide confidentiality of sender ID and its extension to a group signcrypti...

    Dong** Kwak, SangJae Moon in Applied Cryptography and Network Security (2003)

  9. No Access

    Chapter and Conference Paper

    Public-Key Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders

    In this paper we propose a key-exchange system and a public-key encryption scheme based on the class semigroups of imaginary quadratic non-maximal orders, the former is analogous to the Diffie-Hellman’s key-ex...

    Hwankoo Kim, SangJae Moon in Information Security and Privacy (2003)

  10. No Access

    Chapter and Conference Paper

    Hardware Fault Attack on RSA with CRT Revisited

    In this paper, some powerful fault attacks will be pointed out which can be used to factorize the RSA modulus if CRT is employed to speedup the RSA computation. These attacks are generic and can be applicable ...

    Sung-Ming Yen, Sangjae Moon, Jae-Cheol Ha in Information Security and Cryptology — ICIS… (2003)

  11. No Access

    Chapter and Conference Paper

    A Study on Smart Card Security Evaluation Criteria for Side Channel Attacks

    In the course of making electronic services and facilities more widely accessible and usable, more and more IT systems are incorporating smart cards as a component. We analyzes the side channel attacks for the...

    HoonJae Lee, ManKi Ahn, SeonGan Lim in Computational Science and Its Applications… (2004)

  12. No Access

    Chapter and Conference Paper

    A Secure and Practical CRT-Based RSA to Resist Side Channel Attacks

    A secure and practical CRT-based RSA signature scheme is proposed against side channel attacks, including power analysis attack, timing attack, and fault analysis attack. The performance advantage obtained ove...

    ChangKyun Kim, JaeCheol Ha, Sung-Hyun Kim in Computational Science and Its Applications… (2004)

  13. No Access

    Chapter and Conference Paper

    Security Analysis of Two Signcryption Schemes

    Signcryption is a new cryptographic primitive that performs signing and encryption simultaneously, at a cost significantly lower than that required by the traditional signature-then-encryption approach. In thi...

    Guilin Wang, Robert H. Deng, Dong** Kwak, SangJae Moon in Information Security (2004)

  14. No Access

    Chapter and Conference Paper

    On the Security of the Canetti-Krawczyk Model

    The Canetti-Krawczyk (CK) model is a formal method to design and analyze of key agreement protocols, and these protocols should have some desirable security attributes. In this paper, the relationship between ...

    **nghua Li, Jianfeng Ma, SangJae Moon in Computational Intelligence and Security (2005)

  15. No Access

    Chapter and Conference Paper

    A Robust Double Auction Protocol Based on a Hybrid Trust Model

    Recently, Wang and Leung proposed a set of double auction protocols with full privacy protection based on distributed ElGamal encryption. Unfortunately, their protocols are expensive in computation and are not...

    JungHoon Ha, Jianying Zhou, SangJae Moon in Information Systems Security (2005)

  16. No Access

    Chapter and Conference Paper

    Power Analysis by Exploiting Chosen Message and Internal Collisions – Vulnerability of Checking Mechanism for RSA-Decryption

    In this paper, we will point out a new side-channel vulnerability of cryptosystems implementation based on BRIP or square-multiply-always algorithm by exploiting specially chosen input message of order two. A ...

    Sung-Ming Yen, Wei-Chih Lien, SangJae Moon in Progress in Cryptology – Mycrypt 2005 (2005)

  17. No Access

    Chapter and Conference Paper

    Side Channel Cryptanalysis on SEED

    The Korea standard block cipher, SEED, is a 128-bit symmetric block cipher with a more complex F function than DES. This paper shows that SEED is vulnerable to two types of side channel attacks, a fault analys...

    HyungSo Yoo, ChangKyun Kim, JaeCheol Ha, SangJae Moon in Information Security Applications (2005)

  18. No Access

    Chapter and Conference Paper

    Differential Power Analysis on Block Cipher ARIA

    ARIA is a 128-bit symmetric block cipher having 128-bit, 192-bit, or 256-bit key lengths. The cipher is a substitution-permutation encryption network (SPN) that uses an involutional binary matrix. This paper s...

    JaeCheol Ha, ChangKyun Kim, SangJae Moon in High Performance Computing and Communicati… (2005)

  19. No Access

    Chapter and Conference Paper

    Efficient Group Key Management for Dynamic Peer Networks

    In dynamic peer networks, how to promote the performance of group key management without sacrificing the desired security is a critical and difficult problem. In this paper, a secure, efficient and distributed...

    Wei Wang, Jianfeng Ma, SangJae Moon in Mobile Ad-hoc and Sensor Networks (2005)

  20. No Access

    Chapter and Conference Paper

    A CRT-Based RSA Countermeasure Against Physical Cryptanalysis

    This paper considers a secure and practical CRT-based RSA signature implementation against both side channel attacks (including power analysis attack, timing attack, and most specially the recent MRED attack) ...

    ChangKyun Kim, JaeCheol Ha, SangJae Moon in High Performance Computing and Communicati… (2005)

previous disabled Page of 3