Yongjin Yeom
Yongjin Yeom
Professor of Mathematics, Kookmin University
kookmin.ac.kr의 이메일 확인됨 - 홈페이지
New block cipher: ARIA
D Kwon, J Kim, S Park, SH Sung, Y Sohn, JH Song, Y Yeom, EJ Yoon, ...
International Conference on Information Security and Cryptology, 432-445, 2003
On the security of Camellia against the square attack
Y Yeom, S Park, I Kim
International Workshop on Fast Software Encryption, 89-99, 2002
A new class of single cycle T-functions
J Hong, DH Lee, Y Yeom, D Han
International Workshop on Fast Software Encryption, 68-82, 2005
A study of integral type cryptanalysis on Camellia
Y Yeom, S Park, I Kim
Proceedings of the 2003 Symposium on Cryptography and Information Security …, 2003
High-speed implementations of block cipher aria using graphics processing units
Y Yeom, Y Cho, M Yung
2008 International Conference on Multimedia and Ubiquitous Engineering (mue …, 2008
Improved impossible differential attacks on large-block Rijndael
L Zhang, W Wu, JH Park, BW Koo, Y Yeom
International Conference on Information Security, 298-315, 2008
Cryptanalysis of the Paeng-Jung-Ha cryptosystem from PKC 2003
D Han, MH Kim, Y Yeom
International Workshop on Public Key Cryptography, 107-117, 2007
T-function based streamcipher TSC-4
D Moon, D Kwon, D Han, J Lee, GH Ryu, DW Lee, Y Yeom, S Chee
SASC 2006 Stream Ciphers Revisited, 254, 2006
Dynamic ransomware protection using deterministic random bit generator
H Kim, D Yoo, JS Kang, Y Yeom
2017 IEEE Conference on Application, Information and Network Security (AINS …, 2017
Efficient RFID authentication protocols based on pseudorandom sequence generators
J Lee, Y Yeom
Designs, Codes and Cryptography 51 (2), 195-210, 2009
T-function based stream cipher TSC-3
J Hong, DH Lee, Y Yeom, D Han, S Chee
ECRYPT Stream Cipher Project, 2005
Recoverable random numbers in an internet of things operating system
T Yoo, JS Kang, Y Yeom
Entropy 19 (3), 113, 2017
Related-key boomerang attack on block cipher SQUARE
B Koo, Y Yeom, J Song
IEICE transactions on fundamentals of electronics, communications and …, 2011
Vulnerability of an RFID authentication protocol proposed in at SecUbiq 2005
D Kwon, D Han, J Lee, Y Yeom
International Conference on Embedded and Ubiquitous Computing, 262-270, 2006
High-Speed Implementations of Block Ciphers on Graphics Processing Units Using CUDA Library
YJ Yeom, YK Cho
Journal of the Korea Institute of Information Security & Cryptology 18 (3 …, 2008
A frequency-domain parallel method for the numerical approximation of parabolic problems
CO Lee, J Lee, D Sheen, Y Yeom
Computer methods in applied mechanics and engineering 169 (1-2), 19-29, 1999
A study on the one-to-many authentication scheme for cryptosystem based on quantum key distribution
M Bae, JS Kang, Y Yeom
2017 International Conference on Platform Technology and Service (PlatCon), 1-4, 2017
New entropy source for cryptographic modules using openMP in multicore CPUs
J Kim, T Yoo, Y Yeom, O Yi
International Journal of Security and its Applications 7 (4), 445-452, 2013
Generating random numbers for cryptographic modules using race conditions in GPU
Y Yeom
Computer Applications for Graphics, Grid Computing, and Industrial …, 2012
Key derivation functions using the dual key agreement based on QKD and RSA cryptosystem
H Park, M Bae, JS Kang, Y Yeom
The Journal of Korean Institute of Communications and Information Sciences …, 2016
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20