Dr. Chong Hee Kim

Disclaimer: This page refers to former member of the group. Validity or accuracy of the following information is thus not guaranteed in any way.

208
Address:Microelectronics Laboratory, Place du Levant, 3
Office:b.105
Voice:+32 (0) 10 47 81 41
Fax:+32 (0) 10 47 25 98
E-Mail:
BibTeX - Kim

Publications

Chong Hee Kim, and Gildas Avoine. RFID distance bounding protocol with mixed challenges to prevent relay attacks, The 8th International Conference on Cryptology and Network Security - CANS2009, Volume 5888 of Lecture Notes in Computer Science, pages 119-133, Springer, December 2009 BibTeX

Chong Hee Kim, Gildas Avoine, François Koeune, François-Xavier Standaert, and Olivier Pereira. The Swiss-Knife RFID Distance Bounding Protocol, The 11th International Conference on Information Security and Cryptology - ICISC 2008, Volume 5461 of Lecture Notes in Computer Science, pages 98-115, Springer-Verlag, December 2008 BibTeX

Chong Hee Kim, and Jean-Jacques Quisquater. Method for Detecting Vulnerability to Doubling Attacks, 10th International Conference on Information and Communications Security - ICICS 2008, Volume 5308 of Lecture Notes in Computer Science, pages 97-110, Springer-Verlag, October 2008 BibTeX

Jörn-Marc Schmidt, and Chong Hee Kim. A Probing Attack on AES, The 9th International Workshop on Information Security Applications - WISA 2008, Lecture Notes in Computer Science, Springer, September 2008, to appear BibTeX

Chong Hee Kim, and Jean-Jacques Quisquater. New Differential Fault Analysis on AES Key Schedule: Two Faults are enough, Eighth Smart Card Research and Advanced Application IFIP Conference - CARDIS 2008, Volume 5189 of Lecture Notes in Computer Science, pages 48-60, Springer-Verlag, September 2008 BibTeX

Chong Hee Kim, Philippe Bulens, Christophe Petit, and Jean-Jacques Quisquater. Fault Attacks on Public Key Elements: Application to DLP based Schemes, Fifth European PKI Workshop - EUROPKI 2008, Volume 5057 of Lecture Notes in Computer Science, pages 182 - 195, Springer, June 2008 PDF BibTeX

Chong Hee Kim, Jong Hoon Shin, Jean-Jacques Quisquater, and Pil Joong Lee. Safe-Error Attack on SPA-FA resistant exponentiations using a HW modular multiplier, The International Conference on Information Security and Cryptology - ICISC 2007, Volume 4817 of Lecture Notes in Computer Science, pages 273 - 281, Springer, November 2007 BibTeX

Chong Hee Kim, and Jean-Jacques Quisquater. Faults, Injection Methods, and Fault Attacks, In IEEE Design and Test of Computers, Volume 24-6, pages 544-545, November 2007 BibTeX

Chong Hee Kim, and Jean-Jacques Quisquater. How can we overcome both side channel analysis and fault attacks on RSA-CRT?, 4th Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC 2007, pages 21-29, IEEE Computer Society Press, September 2007 BibTeX

Chong Hee Kim, and Jean-Jacques Quisquater. Fault attacks for CRT based RSA: new attacks, new results, and new countermeasures, Workshop in Information Security Theory and Practices: Smart cards, Mobile and Ubiquitous computing systems - WISTP 2007, Volume 4462 of Lecture Notes in Computer Science, pages 215-228, Springer-Verlag, May 2007 BibTeX

Chong Hee Kim, Yong Ho Hwang, and Pil Joong Lee. Practical Pay-TV Scheme using Traitor Tracing Scheme for Multiple Channels, Information Security Applications - WISA 2004, Volume 3325 of Lecture Notes in Computer Science, pages 265-279, Springer-Verlag, August 2004 BibTeX

Chong Hee Kim, Yong Ho Hwang, and Pil Joong Lee. TTS without Revocation Capability Secure against CCA2, Information Security and Privacy - ACISP 2004, Volume 3108 of Lecture Notes in Computer Science, pages 36-49, Springer-Verlag, July 2004 BibTeX

Yong Ho Hwang, Chong Hee Kim, and Pil Joong Lee. An Efficient Revocation Scheme for Stateless Receivers, Public Key Infrastructure - EuroPKI 2004, Volume 3093 of Lecture Notes in Computer Science, pages 322-334, Springer-Verlag, June 2004 BibTeX

Chong Hee Kim, Yong Ho Hwang, and Pil Joong Lee. An Effcient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack, Advances in Cryptology - ASIACRYPT 2003, Volume 2894 of Lecture Notes in Computer Science, pages 359-373, Springer-Verlag, November 2003 BibTeX

Yong Ho Hwang, Chong Hee Kim, and Pil Joong Lee. An Effcient Revocation Scheme with Minimal Message Length for Stateless Receivers, Information Security and Privacy - ACISP 2003, Volume 2727 of Lecture Notes in Computer Science, pages 377-386, Springer-Verlag, July 2003 BibTeX

Chong Hee Kim, and Pil Joong Lee. New Key Recovery in WAKE protocol, Public Key Cryptography - PKC 2001, Volume 1992 of Lecture Notes in Computer Science, pages 325-338, Springer-Verlag, February 2001 BibTeX

Copyright Notice

(click here to expand/retract)