Yongjin Yeom
Yongjin Yeom
Professor of Mathematics, Kookmin University
Verified email at - Homepage
Cited by
Cited by
New block cipher: ARIA
D Kwon, J Kim, S Park, SH Sung, Y Sohn, JH Song, Y Yeom, E Yoon, ...
International conference on information security and cryptology, 432-445, 2003
On the security of Camellia against the square attack
Y Yeom, S Park, I Kim
International Workshop on Fast Software Encryption, 89-99, 2002
A new class of single cycle T-functions
J Hong, DH Lee, Y Yeom, D Han
International Workshop on Fast Software Encryption, 68-82, 2005
A study of integral type cryptanalysis on Camellia
Y Yeom, S Park, I Kim
Proceedings of the 2003 Symposium on Cryptography and Information Security …, 2003
Dynamic ransomware protection using deterministic random bit generator
H Kim, D Yoo, JS Kang, Y Yeom
2017 IEEE Conference on Application, Information and Network Security (AINS …, 2017
High-speed implementations of block cipher aria using graphics processing units
Y Yeom, Y Cho, M Yung
2008 International Conference on Multimedia and Ubiquitous Engineering (mue …, 2008
Cryptanalysis of the Paeng-Jung-Ha cryptosystem from PKC 2003
D Han, MH Kim, Y Yeom
International Workshop on Public Key Cryptography, 107-117, 2007
Improved impossible differential attacks on large-block Rijndael
L Zhang, W Wu, JH Park, BW Koo, Y Yeom
International Conference on Information Security, 298-315, 2008
T-function based streamcipher TSC-4
D Moon, D Kwon, D Han, J Lee, GH Ryu, DW Lee, Y Yeom, S Chee
SASC 2006 Stream Ciphers Revisited, 254, 2006
Efficient RFID authentication protocols based on pseudorandom sequence generators
J Lee, Y Yeom
Designs, Codes and Cryptography 51 (2), 195-210, 2009
T-function based stream cipher TSC-3
J Hong, D Lee, Y Yeom, D Han, S Chee
ECRYPT Stream Cipher Project, 2005
Recoverable random numbers in an internet of things operating system
T Yoo, JS Kang, Y Yeom
Entropy 19 (3), 113, 2017
Related-key boomerang attack on block cipher SQUARE
B Koo, Y Yeom, J Song
IEICE transactions on fundamentals of electronics, communications and …, 2011
Vulnerability of an RFID authentication protocol proposed in at SecUbiq 2005
D Kwon, D Han, J Lee, Y Yeom
International Conference on Embedded and Ubiquitous Computing, 262-270, 2006
High-Speed Implementations of Block Ciphers on Graphics Processing Units Using CUDA Library
YJ Yeom, YK Cho
Journal of the Korea Institute of Information Security & Cryptology 18 (3 …, 2008
A frequency-domain parallel method for the numerical approximation of parabolic problems
CO Lee, J Lee, D Sheen, Y Yeom
Computer methods in applied mechanics and engineering 169 (1-2), 19-29, 1999
Practical true random number generator using CMOS image sensor dark noise
BK Park, H Park, YS Kim, JS Kang, Y Yeom, C Ye, S Moon, SW Han
IEEE Access 7, 91407-91413, 2019
Probabilistic analysis of AIS. 31 statistical tests for TRNGs and their applications to security evaluations
H Park, JS Kang, Y Yeom
Journal of The Korea Institute of Information Security & Cryptology 26 (1 …, 2016
A study on the one-to-many authentication scheme for cryptosystem based on quantum key distribution
M Bae, JS Kang, Y Yeom
2017 International Conference on Platform Technology and Service (PlatCon), 1-4, 2017
A Study of the Parallelization of Hybrid SAT Solver using CUDA
T Yoo, S Kim, Y Yeom, J Kang
Advanced Scienceand Technology Letters 48, 19-24, 2014
The system can't perform the operation now. Try again later.
Articles 1–20