Patents by Inventor Dong-Guk Han

Dong-Guk Han has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 11853419
    Abstract: A method for preventing side-channel attack according to an embodiment includes generating an order table which includes a position index value for each bit value of a bit string that is secret information to be generated through a decryption algorithm of an Nth Degree Truncated Polynomial Ring Units (NTRU) LPRime algorithm, shuffling a sort order of the position index value for the each bit value in the order table based on a random number, determining a generation order for the each bit value according to the sort order of the position index value for the each bit value in the order table, and generating the secret information through the decryption algorithm. The secret information is generated by generating the each bit value according to the determined generation order.
    Type: Grant
    Filed: February 1, 2021
    Date of Patent: December 26, 2023
    Assignees: SAMSUNG SDS CO., LTD., Kookmin University Industry Academy Cooperation Foundation
    Inventors: Ji Hoon Kwon, Joo Hee Lee, Hyo Jin Yoon, Ji Hoon Cho, Dong Guk Han, Bo Yeon Sim, Il Ju Kim, Tae Ho Lee, Jae Seung Han
  • Patent number: 11509460
    Abstract: A method for performing a matrix multiplication operation being secure against side-channel attacks according to one embodiment, which is performed by a computing device comprising one or more processors and a memory storing one or more programs to be executed by the one or more processors, includes shuffling an order of execution of multiplication operations between elements of a first matrix and elements of a second matrix for a matrix multiplication operation between the first matrix and the second matrix; and performing the matrix multiplication operation based on the shuffled order of execution.
    Type: Grant
    Filed: October 26, 2019
    Date of Patent: November 22, 2022
    Assignees: SAMSUNG SDS CO.. LTD., Kookmin University Industry Academnv Cooperation Foundation
    Inventors: Kyu-Young Choi, Duk-Jae Moon, Ji-Hoon Cho, Dong Guk Han, Bo Yeon Sim, Jae Geun Moon, Ae Sun Park
  • Publication number: 20220129545
    Abstract: Disclosed is a fault injection attack method including determining a trigger start point in time based on an input signal for a crypto device; determining a trigger end point in time based on an output signal of the crypto device; setting a trigger based on the trigger start point in time and the trigger end point in time; and performing a fault injection attack based on the set trigger.
    Type: Application
    Filed: October 28, 2021
    Publication date: April 28, 2022
    Inventors: Han Sup LIM, Jong Hyeok LEE, Dong Guk HAN
  • Publication number: 20220129547
    Abstract: A method for preventing side-channel attack according to an embodiment includes generating an order table which includes a position index value for each bit value of a bit string that is secret information to be generated through a decryption algorithm of an Nth Degree Truncated Polynomial Ring Units (NTRU) LPRime algorithm, shuffling a sort order of the position index value for the each bit value in the order table based on a random number, determining a generation order for the each bit value according to the sort order of the position index value for the each bit value in the order table, and generating the secret information through the decryption algorithm. The secret information is generated by generating the each bit value according to the determined generation order.
    Type: Application
    Filed: February 1, 2021
    Publication date: April 28, 2022
    Inventors: Ji Hoon KWON, Joo Hee LEE, Hyo Jin YOON, Ji Hoon CHO, Dong Guk HAN, Bo Yeon SIM, Il Ju KIM, Tae Ho LEE, Jae Seung HAN
  • Publication number: 20210105134
    Abstract: A method for performing a matrix multiplication operation being secure against side-channel attacks according to one embodiment, which is performed by a computing device comprising one or more processors and a memory storing one or more programs to be executed by the one or more processors, includes shuffling an order of execution of multiplication operations between elements of a first matrix and elements of a second matrix for a matrix multiplication operation between the first matrix and the second matrix; and performing the matrix multiplication operation based on the shuffled order of execution.
    Type: Application
    Filed: October 26, 2019
    Publication date: April 8, 2021
    Inventors: Kyu-Young Choi, Duk-Jae Moon, Ji-Hoon Cho, Dong Guk HAN, Bo Yeon SIM, Jae Geun MOON, Ae Sun PARK
  • Publication number: 20100067690
    Abstract: Provided is a scalar multiplication method unified with a simple power analysis (SPA) resistant left-to-right recording in a crypto system based on an elliptic curve and a pairing. The scalar multiplication method includes: recording an L-digit secret key k? from a radix-r n-digit secret key k by comparing two successive elements with each other from the most significant digit with duplication allowed in order to generate the L-digit secret key k?; and performing scalar multiplication between the secret key k and a point P on an elliptic curve to output a scalar multiplication value Q=kP using the secret key k?.
    Type: Application
    Filed: June 22, 2007
    Publication date: March 18, 2010
    Applicant: Electronics and Telecommunications Research Institute
    Inventors: Dong-Guk Han, Doo-Ho Choi, Ho-Won Kim, Kyo-II Chung, Sung-Kyoung Kim, Jongin Lim