Chong Hee KIM
Chong Hee KIM
Principal Security evaluator of Brightsight
Verified email at
Cited by
Cited by
The Swiss-knife RFID distance bounding protocol
C Kim, G Avoine, F Koeune, FX Standaert, O Pereira
Information Security and Cryptology–ICISC 2008, 98-115, 2009
Fault attacks for CRT based RSA: New attacks, new results, and new countermeasures
CH Kim, JJ Quisquater
IFIP International Workshop on Information Security Theory and Practices …, 2007
RFID distance bounding protocol with mixed challenges to prevent relay attacks
CH Kim, G Avoine
International conference on cryptology and network security, 119-133, 2009
New differential fault analysis on AES key schedule: Two faults are enough
CH Kim, JJ Quisquater
International Conference on Smart Card Research and Advanced Applications, 48-60, 2008
Faults, injection methods, and fault attacks
CH Kim, JJ Quisquater
IEEE Design & Test of Computers 24 (6), 544-545, 2007
Improved differential fault analysis on AES key schedule
CH Kim
IEEE transactions on information forensics and security 7 (1), 41-50, 2011
Differential fault analysis against AES-192 and AES-256 with minimal faults
CH Kim
2010 Workshop on Fault Diagnosis and Tolerance in Cryptography, 3-9, 2010
How can we overcome both side channel analysis and fault attacks on RSA-CRT?
CH Kim, JJ Quisquater
Workshop on Fault Diagnosis and Tolerance in Cryptography (FDTC 2007), 21-29, 2007
RFID distance bounding protocols with mixed challenges
CH Kim, G Avoine
IEEE Transactions on Wireless Communications 10 (5), 1618-1626, 2011
Security of distance-bounding: A survey
G Avoine, MA Bingöl, I Boureanu, S Čapkun, G Hancke, S Kardaş, ...
ACM Computing Surveys (CSUR) 51 (5), 1-33, 2018
An efficient public key trace and revoke scheme secure against adaptive chosen ciphertext attack
CH Kim, YH Hwang, PJ Lee
International Conference on the Theory and Application of Cryptology and …, 2003
Differential fault analysis of AES: Toward reducing number of faults
CH Kim
Information Sciences 199, 43-57, 2012
Mutual distance bounding protocols
G Avoine, CH Kim
IEEE Transactions on Mobile Computing 12 (5), 830-839, 2012
Safe-error attack on SPA-FA resistant exponentiations using a HW modular multiplier
CH Kim, JH Shin, JJ Quisquater, PJ Lee
International Conference on Information Security and Cryptology, 273-281, 2007
Practical pay-TV scheme using traitor tracing scheme for multiple channels
C Kim, Y Hwang, P Lee
Information Security Applications, 264-277, 2005
A probing attack on AES
JM Schmidt, CH Kim
International Workshop on Information Security Applications, 256-265, 2008
Fault attacks on public key elements: Application to DLP-based schemes
CH Kim, P Bulens, C Petit, JJ Quisquater
European Public Key Infrastructure Workshop, 182-195, 2008
An efficient revocation scheme with minimal message length for stateless receivers
YH Hwang, CH Kim, PJ Lee
Australasian Conference on Information Security and Privacy, 377-386, 2003
Determining the validity of a connection between a reader and a transponder
CH Kim
US Patent 8,698,605, 2014
Security analysis of YKHL distance bounding protocol with adjustable false acceptance rate
CH Kim
IEEE communications letters 15 (10), 1078-1080, 2011
The system can't perform the operation now. Try again later.
Articles 1–20