8   Artículos

 
en línea
ByeongGyu Park, Suhri Kim, Seokhie Hong, HeeSeok Kim and Seog Chung Seo    
Beginning with the proposal of the McEliece cryptosystem in 1978, code-based cryptography has positioned itself as one of main categories in post-quantum cryptography (PQC). To date, the algebraic security of certain variants of McEliece cryptosystems ha... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Donghoe Heo, Suhri Kim, Young-Ho Park and Seokhie Hong    
In this paper, we present the performance and security analysis for various commutative SIDH (CSIDH)-based algorithms. As CSIDH offers a smaller key size than SIDH and provides a relatively efficient signature scheme, numerous CSIDH-based key exchange al... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Seokhie Hong    
Revista: Applied Sciences    Formato: Electrónico

 
en línea
HanBit Kim, Seokhie Hong and HeeSeok Kim    
A masking method is a widely known countermeasure against side-channel attacks. To apply a masking method to cryptosystems consisting of Boolean and arithmetic operations, such as ARX (Addition, Rotation, XOR) block ciphers, a masking conversion algorith... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »