Author pages are created from data sourced from our academic publisher partnerships and public sources.
- Publications
- Influence
A More Compact Representation of XTR Cryptosystem
- M. Shirase, D. Han, Y. Hibino, H. Kim, T. Takagi
- Mathematics, Computer Science
- IEICE Trans. Fundam. Electron. Commun. Comput…
- 1 October 2008
TLDR
Efficient Implementation of Pairing-Based Cryptography on a Sensor Node
- M. Shirase, Yukinori Miyazaki, T. Takagi, D. Han, Dooho Choi
- Computer Science
- IEICE Trans. Inf. Syst.
- 1 May 2009
TLDR
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields
TLDR
Countermeasures against Power Analysis Attacks for the NTRU Public Key Cryptosystem
- Mun-Kyu Lee, J. Song, Dooho Choi, D. Han
- Computer Science
- IEICE Trans. Fundam. Electron. Commun. Comput…
- 2010
TLDR
Improved Computation of Square Roots in Specific Finite Fields
- D. Han, Dooho Choi, H. Kim
- Mathematics, Computer Science
- IEEE Transactions on Computers
- 1 February 2009
TLDR
Side Channel Attack on Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication
- Katsuyuki Okeya, D. Han
- Computer Science
- INDOCRYPT
- 8 December 2003
TLDR
Some Analysis of Radix-r Representations
TLDR
TinyECCK: Efficient Elliptic Curve Cryptography Implementation over GF(2m) on 8-Bit Micaz Mote
- Seog Chung Seo, D. Han, H. C. Kim, Seokhie Hong
- Computer Science
- IEICE Trans. Inf. Syst.
- 1 May 2008
TLDR
A Privacy-Protecting Authentication Scheme for Roaming Services with Smart Cards
- Kyungho Son, D. Han, D. Won
- Computer Science
- IEICE Trans. Commun.
- 1 May 2012
Chosen ciphertext Simple Power Analysis on software 8-bit implementation of ring-LWE encryption
- Aesun Park, D. Han
- Computer Science
- IEEE Asian Hardware-Oriented Security and Trust…
- 1 December 2016
TLDR