New block cipher: ARIA D Kwon, J Kim, S Park, SH Sung, Y Sohn, JH Song, Y Yeom, E Yoon, ... International conference on information security and cryptology, 432-445, 2003 | 275 | 2003 |
On the security of Camellia against the square attack Y Yeom, S Park, I Kim International Workshop on Fast Software Encryption, 89-99, 2002 | 62 | 2002 |
A new class of single cycle T-functions J Hong, DH Lee, Y Yeom, D Han International Workshop on Fast Software Encryption, 68-82, 2005 | 52 | 2005 |
A study of integral type cryptanalysis on Camellia Y Yeom, S Park, I Kim Proceedings of the 2003 Symposium on Cryptography and Information Security …, 2003 | 22 | 2003 |
Dynamic ransomware protection using deterministic random bit generator H Kim, D Yoo, JS Kang, Y Yeom 2017 IEEE Conference on Application, Information and Network Security (AINS …, 2017 | 21 | 2017 |
High-speed implementations of block cipher aria using graphics processing units Y Yeom, Y Cho, M Yung 2008 International Conference on Multimedia and Ubiquitous Engineering (mue …, 2008 | 21 | 2008 |
Cryptanalysis of the Paeng-Jung-Ha cryptosystem from PKC 2003 D Han, MH Kim, Y Yeom International Workshop on Public Key Cryptography, 107-117, 2007 | 19 | 2007 |
Improved impossible differential attacks on large-block Rijndael L Zhang, W Wu, JH Park, BW Koo, Y Yeom International Conference on Information Security, 298-315, 2008 | 18 | 2008 |
T-function based streamcipher TSC-4 D Moon, D Kwon, D Han, J Lee, GH Ryu, DW Lee, Y Yeom, S Chee SASC 2006 Stream Ciphers Revisited, 254, 2006 | 18 | 2006 |
Efficient RFID authentication protocols based on pseudorandom sequence generators J Lee, Y Yeom Designs, Codes and Cryptography 51 (2), 195-210, 2009 | 16 | 2009 |
T-function based stream cipher TSC-3 J Hong, D Lee, Y Yeom, D Han, S Chee ECRYPT Stream Cipher Project, 2005 | 16 | 2005 |
Recoverable random numbers in an internet of things operating system T Yoo, JS Kang, Y Yeom Entropy 19 (3), 113, 2017 | 15 | 2017 |
Related-key boomerang attack on block cipher SQUARE B Koo, Y Yeom, J Song IEICE transactions on fundamentals of electronics, communications and …, 2011 | 14 | 2011 |
Vulnerability of an RFID authentication protocol proposed in at SecUbiq 2005 D Kwon, D Han, J Lee, Y Yeom International Conference on Embedded and Ubiquitous Computing, 262-270, 2006 | 14 | 2006 |
High-Speed Implementations of Block Ciphers on Graphics Processing Units Using CUDA Library YJ Yeom, YK Cho Journal of the Korea Institute of Information Security & Cryptology 18 (3 …, 2008 | 11 | 2008 |
A frequency-domain parallel method for the numerical approximation of parabolic problems CO Lee, J Lee, D Sheen, Y Yeom Computer methods in applied mechanics and engineering 169 (1-2), 19-29, 1999 | 11 | 1999 |
Practical true random number generator using CMOS image sensor dark noise BK Park, H Park, YS Kim, JS Kang, Y Yeom, C Ye, S Moon, SW Han IEEE Access 7, 91407-91413, 2019 | 10 | 2019 |
Probabilistic analysis of AIS. 31 statistical tests for TRNGs and their applications to security evaluations H Park, JS Kang, Y Yeom Journal of The Korea Institute of Information Security & Cryptology 26 (1 …, 2016 | 9 | 2016 |
A study on the one-to-many authentication scheme for cryptosystem based on quantum key distribution M Bae, JS Kang, Y Yeom 2017 International Conference on Platform Technology and Service (PlatCon), 1-4, 2017 | 7 | 2017 |
A Study of the Parallelization of Hybrid SAT Solver using CUDA T Yoo, S Kim, Y Yeom, J Kang Advanced Scienceand Technology Letters 48, 19-24, 2014 | 7 | 2014 |