Digital Library


Search: "[ author: 서석충 ]" (11)
    Efficient Implementation of NIST LWC SPARKLE on 64-Bit ARMv8
    , , , , , , , , , Vol. 33, No. 3, pp. 401-410, Jun. 2023
    10.13089/JKIISC.2023.33.3.401

    , , , Vol. 31, No. 3, pp. 463-471, Jun. 2021
    10.13089/JKIISC.2021.31.3.463

    , , , Vol. 31, No. 3, pp. 331-340, Jun. 2021
    10.13089/JKIISC.2021.31.3.331

    Design and Implementation of High-Speed Software Cryptographic Modules Using GPU
    송진교, 안상우, 서석충, Vol. 30, No. 6, pp. 1279-1289, Dec. 2020
    10.13089/JKIISC.2020.30.6.1279
    Keywords: Cryptographic module, Software, CMVP, KCMVP, CPU, GPU, Cryptographic module, Software, CMVP, KCMVP, CPU, GPU

    Security Verification of Korean Open Crypto Source Codes with Differential Fuzzing Analysis Method
    윤형준, 서석충, Vol. 30, No. 6, pp. 1225-1236, Dec. 2020
    10.13089/JKIISC.2020.30.6.1225
    Keywords: Software Testing, Differential Fuzzing, Cryptographic Library, Vulnerability, Software Testing, Differential Fuzzing, Cryptographic Library, Vulnerability

    Study on Selftest Requirements in Cryptographic Module Validation Program with FIPS-OpenSSL Source Code Analysis
    서석충, Vol. 29, No. 5, pp. 985-996, Oct. 2019
    10.13089/JKIISC.2019.29.5.985
    Keywords: Cryptographic Modules (CMs), Cryptographic Module Validation Program (CMVP), SelfTest, Conditional SelfTest, Power-on SelfTest, Cryptographic Modules (CMs), Cryptographic Module Validation Program (CMVP), SelfTest, Conditional SelfTest, Power-on SelfTest

    An Efficient Data Authentication Scheme for Content Centric Networking
    Seog Chung Seo, Vol. 26, No. 6, pp. 1375-1386, Dec. 2016
    10.13089/JKIISC.2016.26.6.1375
    Keywords: Content Centric Networking, hash chain, Merkle Hash Tree, Data authentication

    Security Analysis against RVA-based DPA Countermeasure Applied to $Eta_T$ Pairing Algorithm
    Seog-Chung Seo, Dong-Guk Han, Seok-Hie Hong, Vol. 21, No. 2, pp. 83-90, Apr. 2011
    10.13089/JKIISC.2011.21.2.83
    Keywords: $Eta_T$ Pairing, Efficient Countermeasure, DPA

    New Efficient Scalar Multiplication Algorithms Based on Montgomery Ladder Method for Elliptic Curve Cryptosystems
    Sung-Min Cho, Seog-Chung Seo, Tae-Hyun Kim, Yung-Ho Park, Seok-Hie Hong, Vol. 19, No. 4, pp. 3-20, Aug. 2009
    10.13089/JKIISC.2009.19.4.3
    Keywords: Elliptic Curve Cryptosystem, Montgomery ladder, Simple Power Analysis

    TinyECCK : Efficient Implementation of Elliptic Curve Cryptosystem over GF$(2^m)$ on 8-bit Micaz Mote
    Seog-Chung Seo, Dong-Guk Han, Seok-Hie Hong, Vol. 18, No. 3, pp. 9-22, Jun. 2008
    10.13089/JKIISC.2008.18.3.9
    Keywords: Elliptic Curve Cryptography, Wireless Sensor Networks, Efficient Implementation