< International Journal >
Dongjun Park, Joonsup Kim, HeeSeok Kim†, Seokhie Hong, Cloning Hardware Wallet without Valid Credentials Through Side-Channel Analysis of Hash Function, IEEE Access, 2024
Sangyun Jung, Sunghyun Jin, HeeSeok Kim†, A Novel Side-Channel Archive Framework Using Deep Learning-based Leakage Compression, IEEE Access, 2024
Yongryeol Choi, Mingi Kim, Youngbeom Kim, Jingyo Song, Jaehwan Jin, HeeSeok Kim†, Seog Chung Seo, KpqBench: Performance and Implementation Security Analysis of KpqC Competition Round 1 Candidates, IEEE Access, 2024
Daehyeon Bae, Dongjun Park, Gyusang Kim, Minsig Choi, Nayeon Lee, HeeSeok Kim†, Seokhie Hong, Autoscaled-wavelet convolutional layer for deep learning-based side-channel analysis, IEEE Access, 2023
Dongjun Park, Minsig Choi, Gyusang Kim, Daehyeon Bae, Heeseok Kim, Seokhie Hong, Stealing keys from hardware wallets: A single trace side-channel attack on elliptic curve scalar multiplication without profiling, IEEE Access, 2023
Seog Chung Seo, HeeSeok Kim†, Portable and Efficient Implementation of CRYSTALS-Kyber Based on WebAssembly, Computer Systems Science and Engineering, 2023
Sunghyun Jin, Sung Min Cho, HeeSeok Kim† , Seokhie Hong, Enhanced Side-Channel Analysis on ECDSA Employing Fixed-Base Comb Method, IEEE Transation on Computers, 2022
Nayeon Lee, Seokhie Hong, HeeSeok Kim†, Single-Trace Attack Using One-Shot Learning With Siamese Network in Non-Profiled Setting, IEEE Access, 2022
Sunghyun Jin, Philip Johansson, HeeSeok Kim, Seokhie Hong, Enhancing Time-Frequency Analysis with Zero-Mean Preprocessing, Sensors, 2022
Donggeun Kwon, Seokhie Hong, HeeSeok Kim†, Optimizing Implementations of Non-Profiled Deep Learning-based Side-Channel Attacks, IEEE Access, 2022
Sunghyun Jin, Sangyub Lee, Sung Min Cho, HeeSeok Kim†, Seokhie Hong, Novel Key Recovery Attack on Secure ECDSA Implementation by Exploiting Collisions between Unknown Entries, IACR Transactions on Cryptographic Hardware and Embedded Systems (TCHES), 2021
Donggeun Kwon, HeeSeok Kim†, Seokhie Hong, Non-Profiled Deep Learning-Based Side-Channel Preprocessing With Autoencoders, IEEE Access, 2021
Dongjun Park, GyuSang Kim, Donghoe Heo, Suhri Kim, HeeSeok Kim†, Seokhie Hong, Single Trace Side-Channel Attack on Key Reconciliation in Quantum Key Distribution System and its Efficient Countermeasures, ICT Express, 2021
HanBit Kim, HeeSeok Kim, Seokhie Hong, Power-Balancing Software Implementation to Mitigate Side-Channel Attacks without Using Look-Up Tables, Applied Sciences, 2020
Sunghyun Jin, Suhri Kim, HeeSeok Kim, Seokhie Hong, Recent advances in deep learning-based side-channel analysis, ETRI Journal, 2020
ByeongGyu Park, Suhri Kim, Seokhie Hong, HeeSeok Kim, Seog Chung Seo, Single Trace Analysis against HyMES by Exploitation of Joint Distributions of Leakages, Applied Sciences, 2020
Sangyub Lee, Sung Min Cho, HeeSeok Kim, Seokhie Hong, A Combined Single Trace Attack on Global Shuffling Long Integer Multiplication and its Novel Countermeasure, IEEE Access, 2020
Seog Chung Seo, HeeSeok Kim†, SCA-Resistant GCM Implementation on 8-Bit AVR Microcontrollers, IEEE Access, 2019
HanBit Kim, Seokhie Hong, HeeSeok Kim†, Lightweight Conversion from Arithmetic to Boolean Masking for Embedded IoT Processor, Applied Sciences, 2019
Sangyub Lee, Sung Min Cho, HeeSeok Kim, Seokhie Hong, A Practical Collision-Based Power Analysis on RSA Prime Generation and Its Countermeasure, IEEE Access, 2019
Sung Min Cho, Sunghyun Jin, HeeSeok Kim†, Side-Channel Vulnerabilities of Unified Point Addition pm Binary Huff Curve and Its Countermeasure, Applied Sciences, 2018
Soojung An, Suhri Kim, Sunghyun Jin, HanBit Kim, HeeSeok Kim†, Single Trace Side Channel Analysis on NTRU Implementation, Applied Sciences, 2018
HeeSeok Kim*†, Thwarting Side-Channel Analysis against RSA Cryptosystems with Additive Blinding, Information Sciences 2017
HeeSeok Kim*, Seokhie Hong, New Type of Collision Attack on First-Order Masked AES, ETRI Journal, 2016
HeeSeok Kim*, Dong-Guk Han, Seokhie Hong, JaeCheol Ha, Message Blinding Method Requiring no Multiplicative Inversion for RSA, ACM Transactions on Embedded Computing Systems, 2014
HeeSeok Kim*, Dong-Guk Han, Seokhie Hong, First-Order Side Channel Attacks on Zhang’s Countermeasures, Information Sciences 2011
HeeSeok Kim*, Young In Cho, Dooho Choi, Dong‐Guk Han, Seokhie Hong, An Efficient Masked Implementation for SEED Based on Combined Masking, ETRI Journal, 2011
HeeSeok Kim*, Tae Hyun Kim, Dong‐Guk Han, Seokhie Hong, Efficient Masking Methods Appropriate for the Block Ciphers ARIA and AES, ETRI Journal, 2010
HeeSeok Kim*, Tae Hyun Kim, Joong Chul Yoon, Seokhie Hong, Practical Second-Order Correlation Power Analysis on the Message Blinding Method and Its Novel Countermeasure for RSA, ETRI Journal, 2010