< International Journals & Conferences>
Dongho Jeon, HeeSeok Kim†, Global Disparities in Password Security: An Empirical Analysis of 1.3 Billion Credentials Using the Password Security Index, Computers & Security, 2026 (IF=5.4, JCR 상위 16.1%)
Daehyeon Bae, Sujin Park, Insup Lee, Young-Giu Jung, Kyeongsik Lee, HeeSeok Kim†, Seokhie Hong†, Exploiting Per-Core Leakage: Electromagnetic Side-Channel Monitoring of Multicore Architectures, DAC 2026 (Computer Architecture 분야 top-tier conference, BK IF=3)
Dongho Jeon, Wooyoung Go, Seokhie Hong, HeeSeok Kim†, PentaPassBreaker: Intelligent Password Prediction via Neural Networks by Analyzing Password Update Patterns, IEEE Transactions on Dependable and Secure Computing, 2026 (IF=7.5, JCR 상위 5.0%)
Won Geun Shin, JeongHwan Lee, Sangyun Jung, HeeSeok Kim†, ARMOR: First Order Masking of Activation and ArgMax Gadgets for Side Channel Resistant Neural Networks, IACR Transactions on Cryptographic Hardware and Embedded Systems (CHES), 2026 (Cryptographic Engineering 분야 top-tier conference)
Gyusang Kim, JeongHwan Lee, Myeonghoon Lee, Seokhie Hong, HeeSeok Kim†, Secret Key Recovery of FALCON using Simple Power Analysis in Conditional Calculator, IACR Transactions on Cryptographic Hardware and Embedded Systems (CHES), 2026 (Cryptographic Engineering 분야 top-tier conference)
Daehyeon Bae, Sujin Park, Minsig Choi, Young-Giu Jeong, Changmin Jeong, HeeSeok Kim†, Seokhie Hong†, ProbeShooter: A New Practical Approach for Probe Aiming, AsiaCCS 2025 (Security 분야 top-tier conference, BK IF=1)
Joonsup Kim, Dongjun Park, Gyusang Kim, Sujin Park, Daehyeon Bae, Heeseok Kim and Seokhie Hong, REAF: Replacing Exponential Activation Function to Prevent Side-Channel Analysis, ICISC 2024
Jeonghwan Lee, Donghoe Heo, Hyeonhak Kim, Gyusang Kim, Suhri Kim, HeeSeok Kim, Seokhie Hong, Fault Attack on SQIsign, PQCrypto 2024 (IACR Post-Quantum Cryptography 분야 대표 conference)
Dongjun Park, Joonsup Kim, HeeSeok Kim†, Seokhie Hong, Cloning Hardware Wallet without Valid Credentials Through Side-Channel Analysis of Hash Function, IEEE Access, 2024 (IF=3.6, JCR 상위 35.2%)
Sangyun Jung, Sunghyun Jin, HeeSeok Kim†, A Novel Side-Channel Archive Framework Using Deep Learning-based Leakage Compression, IEEE Access, 2024 (IF=3.6, JCR 상위 35.2%)
Yongryeol Choi, Mingi Kim, Youngbeom Kim, Jingyo Song, Jaehwan Jin, HeeSeok Kim†, Seog Chung Seo, KpqBench: Performance and Implementation Security Analysis of KpqC Competition Round 1 Candidates, IEEE Access, 2024 (IF=3.6, JCR 상위 35.2%)
Daehyeon Bae, Dongjun Park, Gyusang Kim, Minsig Choi, Nayeon Lee, HeeSeok Kim†, Seokhie Hong, Autoscaled-wavelet convolutional layer for deep learning-based side-channel analysis, IEEE Access, 2023 (IF=3.6, JCR 상위 35.2%)
Dongjun Park, Minsig Choi, Gyusang Kim, Daehyeon Bae, Heeseok Kim, Seokhie Hong, Stealing keys from hardware wallets: A single trace side-channel attack on elliptic curve scalar multiplication without profiling, IEEE Access, 2023 (IF=3.6, JCR 상위 35.2%)
Seog Chung Seo, HeeSeok Kim†, Portable and Efficient Implementation of CRYSTALS-Kyber Based on WebAssembly, Computer Systems Science and Engineering, 2023
Sunghyun Jin, Sung Min Cho, HeeSeok Kim† , Seokhie Hong, Enhanced Side-Channel Analysis on ECDSA Employing Fixed-Base Comb Method, IEEE Transactions on Computers, 2022 (IF=3.8, JCR 상위 25.8%)
Nayeon Lee, Seokhie Hong, HeeSeok Kim†, Single-Trace Attack Using One-Shot Learning With Siamese Network in Non-Profiled Setting, IEEE Access, 2022 (IF=3.6, JCR 상위 35.2%)
Sunghyun Jin, Philip Johansson, HeeSeok Kim, Seokhie Hong, Enhancing Time-Frequency Analysis with Zero-Mean Preprocessing, Sensors, 2022 (IF=3.5, JCR 상위 33.8%)
Donggeun Kwon, Seokhie Hong, HeeSeok Kim†, Optimizing Implementations of Non-Profiled Deep Learning-based Side-Channel Attacks, IEEE Access, 2022 (IF=3.6, JCR 상위 35.2%)
Sunghyun Jin, Sangyub Lee, Sung Min Cho, HeeSeok Kim†, Seokhie Hong, Novel Key Recovery Attack on Secure ECDSA Implementation by Exploiting Collisions between Unknown Entries, IACR Transactions on Cryptographic Hardware and Embedded Systems (CHES), 2021 (Cryptographic Engineering 분야 top-tier conference)
Donggeun Kwon, HeeSeok Kim†, Seokhie Hong, Non-Profiled Deep Learning-Based Side-Channel Preprocessing With Autoencoders, IEEE Access, 2021 (IF=3.6, JCR 상위 35.2%)
Dongjun Park, GyuSang Kim, Donghoe Heo, Suhri Kim, HeeSeok Kim†, Seokhie Hong, Single Trace Side-Channel Attack on Key Reconciliation in Quantum Key Distribution System and its Efficient Countermeasures, ICT Express, 2021 (IF=4.2, JCR 상위 28.1%)
GyuSang Kim, Dongjun Park, HeeSeok Kim, Seokhie Hong, Side Channel Vulnerability in Parity Computation of Generic Key Reconciliation Process on QKD, ICTC 2021
HanBit Kim, HeeSeok Kim, Seokhie Hong, Power-Balancing Software Implementation to Mitigate Side-Channel Attacks without Using Look-Up Tables, Applied Sciences, 2020 (IF=2.5, JCR 상위 27.7%)
Sunghyun Jin, Suhri Kim, HeeSeok Kim, Seokhie Hong, Recent advances in deep learning-based side-channel analysis, ETRI Journal, 2020 (IF=1.6, JCR 상위 70.2%)
ByeongGyu Park, Suhri Kim, Seokhie Hong, HeeSeok Kim, Seog Chung Seo, Single Trace Analysis against HyMES by Exploitation of Joint Distributions of Leakages, Applied Sciences, 2020 (IF=2.5, JCR 상위 27.7%)
Sangyub Lee, Sung Min Cho, HeeSeok Kim, Seokhie Hong, A Combined Single Trace Attack on Global Shuffling Long Integer Multiplication and its Novel Countermeasure, IEEE Access, 2020 (IF=3.6, JCR 상위 35.2%)
Seog Chung Seo, HeeSeok Kim†, SCA-Resistant GCM Implementation on 8-Bit AVR Microcontrollers, IEEE Access, 2019 (IF=3.6, JCR 상위 35.2%)
HanBit Kim, Seokhie Hong, HeeSeok Kim†, Lightweight Conversion from Arithmetic to Boolean Masking for Embedded IoT Processor, Applied Sciences, 2019 (IF=2.5, JCR 상위 27.7%)
Sangyub Lee, Sung Min Cho, HeeSeok Kim, Seokhie Hong, A Practical Collision-Based Power Analysis on RSA Prime Generation and Its Countermeasure, IEEE Access, 2019 (IF=3.6, JCR 상위 35.2%)
Sung Min Cho, Sunghyun Jin, HeeSeok Kim†, Side-Channel Vulnerabilities of Unified Point Addition pm Binary Huff Curve and Its Countermeasure, Applied Sciences, 2018 (IF=2.5, JCR 상위 27.7%)
Soojung An, Suhri Kim, Sunghyun Jin, HanBit Kim, HeeSeok Kim†, Single Trace Side Channel Analysis on NTRU Implementation, Applied Sciences, 2018 (IF=2.5, JCR 상위 27.7%)
HeeSeok Kim*†, Thwarting Side-Channel Analysis against RSA Cryptosystems with Additive Blinding, Information Sciences, 2017 (IF=6.8, JCR 상위 7.9%)
HeeSeok Kim*, Seokhie Hong, New Type of Collision Attack on First-Order Masked AES, ETRI Journal, 2016 (IF=1.6, JCR 상위 70.2%)
Neil Hanley*, HeeSeok Kim*, Michael Tunstall, Exploiting Collisions in Addition Chain-Based Exponentiation Algorithms Using a Single Trace, CT-RSA 2015 (IACR Cryptography 분야 주요 conference)
Jiyeon Choi, HeeSeok Kim, Jangwon Choi, Jungsuk Song, A malware classification method based on generic malware information, ICONIP 2015
HeeSeok Kim*, Dong-Guk Han, Seokhie Hong, JaeCheol Ha, Message Blinding Method Requiring no Multiplicative Inversion for RSA, ACM Transactions on Embedded Computing Systems, 2014 (IF=2.6, JCR 상위 45.3%)
HeeSeok Kim*, Sang-Soo Choi, Jungsuk Song, A methodology for multipurpose DNS Sinkhole analyzing double bounce emails , ICONIP 2013
HeeSeok Kim*, Seokhie Hong, Jongin Lim, A Fast and Provably Secure Higher-Order Masking of AES S-box, CHES 2011 (Cryptographic Engineering 분야 top-tier conference)
HeeSeok Kim*, Dong-Guk Han, Seokhie Hong, First-Order Side Channel Attacks on Zhang’s Countermeasures, Information Sciences, 2011 (IF=6.8, JCR 상위 7.9%)
HeeSeok Kim*, Young In Cho, Dooho Choi, Dong‐Guk Han, Seokhie Hong, An Efficient Masked Implementation for SEED Based on Combined Masking, ETRI Journal, 2011 (IF=1.6, JCR 상위 70.2%)
HeeSeok Kim*, Tae Hyun Kim, Dong‐Guk Han, Seokhie Hong, Efficient Masking Methods Appropriate for the Block Ciphers ARIA and AES, ETRI Journal, 2010 (IF=1.6, JCR 상위 70.2%)
HeeSeok Kim*, Tae Hyun Kim, Joong Chul Yoon, Seokhie Hong, Practical Second-Order Correlation Power Analysis on the Message Blinding Method and Its Novel Countermeasure for RSA, ETRI Journal, 2010 (IF=1.6, JCR 상위 70.2%)
HeeSeok Kim*, Tae Hyun Kim, Jeong Choon Ryoo, Dong-Guk Han, Ho Won Kim, Jongin Lim, Enhanced doubling attacks on signed-all-bits set recoding , WISTP 2007