Digital Library[ Search Result ]
Search : "[ author: Yongjin Yeom ]" (9)
Subliminal Channels of CRYSTALS-Kyber Applicable in the Black Box Cryptographic Module and Potential Security Threats of IP Cameras
Youngrak Choi Yongjin Yeom Ju-Sung Kang
Vol. 48, No. 6, pp. 630-647, Jun. 2023
10.7840/kics.2023.48.6.630
Vol. 48, No. 6, pp. 630-647, Jun. 2023
10.7840/kics.2023.48.6.630
Methods to Detect Distribution Change for Noise Sources in Cryptographically Secure Random Number Generators
Hojoong Park Sujin Kwon Yongjin Yeom Ju-Sung Kang
Vol. 46, No. 7, pp. 1208-1218, Jul. 2021
10.7840/kics.2021.46.7.1208
Vol. 46, No. 7, pp. 1208-1218, Jul. 2021
10.7840/kics.2021.46.7.1208
Revisiting Cryptanalysis of Neural Plaintext Recovery Attack of DES
Sujin Kwon Hyoungshin Yim Ju-Sung Kang Yongjin Yeom
Vol. 46, No. 7, pp. 1109-1119, Jul. 2021
10.7840/kics.2021.46.7.1109
Vol. 46, No. 7, pp. 1109-1119, Jul. 2021
10.7840/kics.2021.46.7.1109
Parallel Processing and Performance Analysis of LWE-Based Post-Quantum Cryptography Using GPU
Yewon Kim Yongjin Yeom Ju-Sung Kang
Vol. 45, No. 12, pp. 2183-2192, Dec. 2020
10.7840/kics.2020.45.12.2183
Vol. 45, No. 12, pp. 2183-2192, Dec. 2020
10.7840/kics.2020.45.12.2183
Analysis of Min-Entropy Estimation of Markov Chain Output Sequences
Wontae Kim Hojoong Park Yongjin Yeom Ju-Sung Kang
Vol. 43, No. 12, pp. 1987-1997, Dec. 2018
10.7840/kics.2018.43.12.1987
Vol. 43, No. 12, pp. 1987-1997, Dec. 2018
10.7840/kics.2018.43.12.1987
High-Speed Implementation and Applications of Python Programs with Counter Type
Wontae Kim Hojoong Park Yongjin Yeom Ju-Sung Kang
Vol. 43, No. 8, pp. 1282-1296, Aug. 2018
10.7840/kics.2018.43.8.1282
Vol. 43, No. 8, pp. 1282-1296, Aug. 2018
10.7840/kics.2018.43.8.1282