Follow
Dooho Choi
Dooho Choi
Korea University Sejong
Verified email at korea.ac.kr
Title
Cited by
Cited by
Year
New signature scheme using conjugacy problem
KH Ko, DH Choi, MS Cho, JW Lee
Cryptology ePrint Archive, 2002
1222002
Countermeasures against power analysis attacks for the NTRU public key cryptosystem
MK Lee, JE Song, D Choi, DG Han
IEICE transactions on fundamentals of electronics, communications and …, 2010
592010
A security framework for a drone delivery service
SH Seo, J Won, E Bertino, Y Kang, D Choi
Proceedings of the 2nd workshop on micro aerial vehicle networks, systems …, 2016
502016
Electronic tag including privacy level information and privacy protection apparatus and method using RFID tag
BG Lee, DH Choi, HW Kim, KI Chung
US Patent 7,847,694, 2010
472010
Differential Fault Analysis for Round‐Reduced AES by Fault Injection
JH Park, SJ Moon, DH Choi, YS Kang, JC Ha
ETRI Journal 33 (3), 434-442, 2011
442011
Two-factor fuzzy commitment for unmanned IoT devices security
D Choi, SH Seo, YS Oh, Y Kang
IEEE Internet of Things Journal 6 (1), 335-348, 2018
422018
Method and system for authenticating rfid tag
YS Kang, YJ Choi, DH Choi, KI Chung, HS Cho
US Patent App. 12/498,221, 2010
402010
Mobile IP and WLAN with AAA authentication protocol using identity-based cryptography
BG Lee, DH Choi, HG Kim, SW Sohn, KH Park
10th International Conference on Telecommunications, 2003. ICT 2003. 1, 597-603, 2003
402003
Privacy-preserving cross-user source-based data deduplication in cloud storage
S Lee, D Choi
2012 International conference on ICT convergence (ICTC), 329-330, 2012
372012
Efficient implementation of pairing-based cryptography on a sensor node
M Shirase, Y Miyazaki, T Takagi, DG Han, D Choi
IEICE transactions on information and systems 92 (5), 909-917, 2009
372009
Puf based iot device authentication scheme
B Kim, S Yoon, Y Kang, D Choi
2019 international conference on information and communication technology …, 2019
362019
Parameterizations of 1-bridge torus knots
DH Choi, KH Ko
Journal of Knot Theory and Its Ramifications 12 (04), 463-491, 2003
332003
Improved computation of square roots in specific finite fields
DG Han, D Choi, H Kim
IEEE Transactions on Computers 58 (2), 188-196, 2008
322008
Product authentication service of consumer's mobile RFID device
J Kim, D Choi, I Kim, H Kim
2006 IEEE International Symposium on Consumer Electronics, 1-6, 2006
302006
Puf-based authentication scheme for iot devices
S Yoon, B Kim, Y Kang, D Choi
2020 international conference on information and communication technology …, 2020
262020
Secure device and method for preventing side channel attack
JH Kim, YS Kang, DH Choi, YJ Choi
US Patent 8,341,758, 2012
242012
Practical covert wireless unidirectional communication in IEEE 802.11 environment
H Seong, I Kim, Y Jeon, MK Oh, S Lee, D Choi
IEEE Internet of Things Journal 10 (2), 1499-1516, 2022
212022
Electronic tag for protecting privacy and method of protecting privacy using the same
DH Choi, JH Kim, HW Kim, KI Chung
US Patent App. 11/893,496, 2008
212008
Implementing side channel analysis evaluation boards of KLA-SCARF system
YJ Choi, DH Choi, JC Ryou
Journal of the Korea Institute of Information Security & Cryptology 24 (1 …, 2014
202014
Wireless transceiver aided run-time secret key extraction for IoT device security
MK Oh, S Lee, Y Kang, D Choi
IEEE Transactions on Consumer Electronics 66 (1), 11-21, 2019
192019
The system can't perform the operation now. Try again later.
Articles 1–20