Dong-Guk HAN


Simple and Provably Secure Anonymous Authenticated Key Exchange with a Binding Property
Kyungho SON Dong-Guk HAN Dongho WON 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2015/01/01
Vol. E98-B  No. 1  pp. 160-170
Type of Manuscript:  PAPER
Category: Fundamental Theories for Communications
Keyword: 
wireless communicationkey exchangeauthenticationanonymitycommunication binding property
 Summary | Full Text:PDF | (Errata[Uploaded on May 15,2015])

Performance Improvement of Power Analysis Attacks on AES with Encryption-Related Signals
You-Seok LEE Young-Jun LEE Dong-Guk HAN Ho-Won KIM Hyoung-Nam KIM 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/06/01
Vol. E95-A  No. 6  pp. 1091-1094
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
power analysisside-channel attacksecurity
 Summary | Full Text:PDF

A Privacy-Protecting Authentication Scheme for Roaming Services with Smart Cards
Kyungho SON Dong-Guk HAN Dongho WON 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2012/05/01
Vol. E95-B  No. 5  pp. 1819-1821
Type of Manuscript:  LETTER
Category: Fundamental Theories for Communications
Keyword: 
wireless communicationauthenticationanonymitytraceabilitysmart card
 Summary | Full Text:PDF

Acceleration of Differential Power Analysis through the Parallel Use of GPU and CPU
Sung Jae LEE Seog Chung SEO Dong-Guk HAN Seokhie HONG Sangjin LEE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/09/01
Vol. E93-A  No. 9  pp. 1688-1692
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
differential power analysis (DPA)graphic processing unit (GPU)compute unified device architecture (CUDA)
 Summary | Full Text:PDF

Countermeasures against Power Analysis Attacks for the NTRU Public Key Cryptosystem
Mun-Kyu LEE Jeong Eun SONG Dooho CHOI Dong-Guk HAN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/01/01
Vol. E93-A  No. 1  pp. 153-163
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Cryptanalysis
Keyword: 
NTRUpower analysis attacksimple power analysiscorrelation power analysiscountermeasure
 Summary | Full Text:PDF

Efficient Implementation of Pairing-Based Cryptography on a Sensor Node
Masaaki SHIRASE Yukinori MIYAZAKI Tsuyoshi TAKAGI Dong-Guk HAN Dooho CHOI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/05/01
Vol. E92-D  No. 5  pp. 909-917
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Implementation Issues
Keyword: 
ηT pairingsensor nodeATmega128Lfinite field multiplicationassembly implementation
 Summary | Full Text:PDF

TinyECCK16: An Efficient Field Multiplication Algorithm on 16-bit Environment and Its Application to Tmote Sky Sensor Motes
Seog Chung SEO Dong-Guk HAN Seokhie HONG 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/05/01
Vol. E92-D  No. 5  pp. 918-928
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Implementation Issues
Keyword: 
wireless sensor networkelliptic curve cryptosystemefficient implementation
 Summary | Full Text:PDF

A More Compact Representation of XTR Cryptosystem
Masaaki SHIRASE Dong-Guk HAN Yasushi HIBINO Howon KIM Tsuyoshi TAKAGI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/10/01
Vol. E91-A  No. 10  pp. 2843-2850
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
cryptographyXTR cryptosystemfinite fieldefficient implementationcompact representation
 Summary | Full Text:PDF

TinyECCK: Efficient Elliptic Curve Cryptography Implementation over GF(2m) on 8-Bit Micaz Mote
Seog Chung SEO Dong-Guk HAN Hyung Chan KIM Seokhie HONG 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/05/01
Vol. E91-D  No. 5  pp. 1338-1347
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Implementation
Keyword: 
wireless sensor networkElliptic Curve CryptosystemTinyOSKoblitz curve
 Summary | Full Text:PDF

Enhanced Exhaustive Search Attack on Randomized BSD Type Countermeasure
Dong-Guk HAN Katsuyuki OKEYA Tae Hyun KIM Yoon Sung HWANG Beomin KIM Young-Ho PARK 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/05/01
Vol. E89-A  No. 5  pp. 1316-1327
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
elliptic curve cryptosystemside channel attacksSPADPABSD representationHa-Moon countermeasureEbeid-Hasan countermeasureAgagliate et al.'s countermeasure
 Summary | Full Text:PDF

Side Channel Cryptanalysis on XTR Public Key Cryptosystem
Dong-Guk HAN Tetsuya IZU Jongin LIM Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/05/01
Vol. E88-A  No. 5  pp. 1214-1223
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
XTR public key cryptosystemside channel attacksSPAdata-bit DPAaddress-bit DPAdoubling attackrefined power analysiszero-value attack
 Summary | Full Text:PDF

Cryptanalysis of Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication
Katsuyuki OKEYA Dong-Guk HAN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/05/01
Vol. E88-A  No. 5  pp. 1140-1147
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
elliptic curve cryptosystemsside channel attacksSPADPAHa-Moon's countermeasurefinite Markov chain
 Summary | Full Text:PDF