Yongjin Yeom
Yongjin Yeom
Professor of Mathematics, Kookmin University
Verified email at - Homepage
Cited by
Cited by
New block cipher: ARIA
D Kwon, J Kim, S Park, SH Sung, Y Sohn, JH Song, Y Yeom, EJ Yoon, ...
Information Security and Cryptology-ICISC 2003: 6th International Conference …, 2004
On the security of Camellia against the square attack
Y Yeom, S Park, I Kim
Fast Software Encryption: 9th International Workshop, FSE 2002 Leuven …, 2002
A new class of single cycle T-functions
J Hong, DH Lee, Y Yeom, D Han
Fast Software Encryption: 12th International Workshop, FSE 2005, Paris …, 2005
Dynamic ransomware protection using deterministic random bit generator
H Kim, D Yoo, JS Kang, Y Yeom
2017 IEEE Conference on Application, Information and Network Security (AINS …, 2017
A study of integral type cryptanalysis on Camellia
Y Yeom, S Park, I Kim
Proceedings of the 2003 Symposium on Cryptography and Information Security …, 2003
High-speed implementations of block cipher aria using graphics processing units
Y Yeom, Y Cho, M Yung
2008 International Conference on Multimedia and Ubiquitous Engineering (mue …, 2008
Improved Impossible Differential Attacks on Large-Block Rijndael.
L Zhang, W Wu, JH Park, B Koo, Y Yeom
ISC 5222, 298-315, 2008
Cryptanalysis of the Paeng-Jung-Ha cryptosystem from PKC 2003
D Han, MH Kim, Y Yeom
Public Key Cryptography–PKC 2007: 10th International Conference on Practice …, 2007
T-function based streamcipher TSC-4
D Moon, D Kwon, D Han, J Lee, GH Ryu, DW Lee, Y Yeom, S Chee
SASC 2006 Stream Ciphers Revisited, 254, 2006
T-function based stream cipher TSC-3
J Hong, DH Lee, Y Yeom, D Han, S Chee
ECRYPT Stream Cipher Project, 2005
Recoverable random numbers in an internet of things operating system
T Yoo, JS Kang, Y Yeom
Entropy 19 (3), 113, 2017
Efficient RFID authentication protocols based on pseudorandom sequence generators
J Lee, Y Yeom
Designs, Codes and Cryptography 51, 195-210, 2009
Related-key boomerang attack on block cipher SQUARE
B Koo, Y Yeom, J Song
IEICE transactions on fundamentals of electronics, communications and …, 2011
Vulnerability of an RFID authentication protocol proposed in at SecUbiq 2005
D Kwon, D Han, J Lee, Y Yeom
Emerging Directions in Embedded and Ubiquitous Computing: EUC 2006 Workshops …, 2006
Practical true random number generator using CMOS image sensor dark noise
BK Park, H Park, YS Kim, JS Kang, Y Yeom, C Ye, S Moon, SW Han
IEEE Access 7, 91407-91413, 2019
High-Speed Implementations of Block Ciphers on Graphics Processing Units Using CUDA Library
YJ Yeom, YK Cho
Journal of the Korea Institute of Information Security & Cryptology 18 (3 …, 2008
A frequency-domain parallel method for the numerical approximation of parabolic problems
CO Lee, J Lee, D Sheen, Y Yeom
Computer methods in applied mechanics and engineering 169 (1-2), 19-29, 1999
Probabilistic analysis of AIS. 31 statistical tests for TRNGs and their applications to security evaluations
H Park, JS Kang, Y Yeom
Journal of The Korea Institute of Information Security & Cryptology 26 (1 …, 2016
Key derivation functions using the dual key agreement based on QKD and RSA cryptosystem
H Park, M Bae, JS Kang, Y Yeom
The Journal of Korean Institute of Communications and Information Sciences …, 2016
A Study of the Parallelization of Hybrid SAT Solver using CUDA
T Yoo, S Kim, Y Yeom, J Kang
Adv Sci Technol Lett 48 (1/2), 19-24, 2014
The system can't perform the operation now. Try again later.
Articles 1–20