New block cipher: ARIA D Kwon, J Kim, S Park, SH Sung, Y Sohn, JH Song, Y Yeom, EJ Yoon, ... Information Security and Cryptology-ICISC 2003: 6th International Conference …, 2004 | 293 | 2004 |
On the security of Camellia against the square attack Y Yeom, S Park, I Kim Fast Software Encryption: 9th International Workshop, FSE 2002 Leuven …, 2002 | 63 | 2002 |
A new class of single cycle T-functions J Hong, DH Lee, Y Yeom, D Han Fast Software Encryption: 12th International Workshop, FSE 2005, Paris …, 2005 | 49 | 2005 |
Dynamic ransomware protection using deterministic random bit generator H Kim, D Yoo, JS Kang, Y Yeom 2017 IEEE Conference on Application, Information and Network Security (AINS …, 2017 | 26 | 2017 |
A study of integral type cryptanalysis on Camellia Y Yeom, S Park, I Kim Proceedings of the 2003 Symposium on Cryptography and Information Security …, 2003 | 24 | 2003 |
High-speed implementations of block cipher aria using graphics processing units Y Yeom, Y Cho, M Yung 2008 International Conference on Multimedia and Ubiquitous Engineering (mue …, 2008 | 23 | 2008 |
Improved Impossible Differential Attacks on Large-Block Rijndael. L Zhang, W Wu, JH Park, B Koo, Y Yeom ISC 5222, 298-315, 2008 | 19 | 2008 |
Cryptanalysis of the Paeng-Jung-Ha cryptosystem from PKC 2003 D Han, MH Kim, Y Yeom Public Key Cryptography–PKC 2007: 10th International Conference on Practice …, 2007 | 19 | 2007 |
T-function based streamcipher TSC-4 D Moon, D Kwon, D Han, J Lee, GH Ryu, DW Lee, Y Yeom, S Chee SASC 2006 Stream Ciphers Revisited, 254, 2006 | 19 | 2006 |
T-function based stream cipher TSC-3 J Hong, DH Lee, Y Yeom, D Han, S Chee ECRYPT Stream Cipher Project, 2005 | 17 | 2005 |
Recoverable random numbers in an internet of things operating system T Yoo, JS Kang, Y Yeom Entropy 19 (3), 113, 2017 | 16 | 2017 |
Efficient RFID authentication protocols based on pseudorandom sequence generators J Lee, Y Yeom Designs, Codes and Cryptography 51, 195-210, 2009 | 16 | 2009 |
Related-key boomerang attack on block cipher SQUARE B Koo, Y Yeom, J Song IEICE transactions on fundamentals of electronics, communications and …, 2011 | 14 | 2011 |
Vulnerability of an RFID authentication protocol proposed in at SecUbiq 2005 D Kwon, D Han, J Lee, Y Yeom Emerging Directions in Embedded and Ubiquitous Computing: EUC 2006 Workshops …, 2006 | 14 | 2006 |
Practical true random number generator using CMOS image sensor dark noise BK Park, H Park, YS Kim, JS Kang, Y Yeom, C Ye, S Moon, SW Han IEEE Access 7, 91407-91413, 2019 | 13 | 2019 |
High-Speed Implementations of Block Ciphers on Graphics Processing Units Using CUDA Library YJ Yeom, YK Cho Journal of the Korea Institute of Information Security & Cryptology 18 (3 …, 2008 | 12 | 2008 |
A frequency-domain parallel method for the numerical approximation of parabolic problems CO Lee, J Lee, D Sheen, Y Yeom Computer methods in applied mechanics and engineering 169 (1-2), 19-29, 1999 | 12 | 1999 |
Probabilistic analysis of AIS. 31 statistical tests for TRNGs and their applications to security evaluations H Park, JS Kang, Y Yeom Journal of The Korea Institute of Information Security & Cryptology 26 (1 …, 2016 | 9 | 2016 |
Key derivation functions using the dual key agreement based on QKD and RSA cryptosystem H Park, M Bae, JS Kang, Y Yeom The Journal of Korean Institute of Communications and Information Sciences …, 2016 | 7 | 2016 |
A Study of the Parallelization of Hybrid SAT Solver using CUDA T Yoo, S Kim, Y Yeom, J Kang Adv Sci Technol Lett 48 (1/2), 19-24, 2014 | 7 | 2014 |