Search Results - "Kwon, Hyeokdong"

  • Showing 1 - 20 results of 20
Refine Results
  1. 1

    ACE: ARIA-CTR Encryption for Low-End Embedded Processors by Seo, Hwajeong, Kwon, Hyeokdong, Kim, Hyunji, Park, Jaehoon

    Published in Sensors (Basel, Switzerland) (06-07-2020)
    “…In this paper, we present the first optimized implementation of ARIA block cipher on low-end 8-bit Alf and Vegard’s RISC processor (AVR) microcontrollers. To…”
    Get full text
    Journal Article
  2. 2

    Efficient Implementation of PRESENT and GIFT on Quantum Computers by Jang, Kyungbae, Song, Gyeongju, Kim, Hyunjun, Kwon, Hyeokdong, Kim, Hyunji, Seo, Hwajeong

    Published in Applied sciences (01-06-2021)
    “…Grover search algorithm is the most representative quantum attack method that threatens the security of symmetric key cryptography. If the Grover search…”
    Get full text
    Journal Article
  3. 3

    Fast Number Theoretic Transform for Ring-LWE on 8-bit AVR Embedded Processor by Seo, Hwajeong, Kwon, Hyeokdong, Kwon, Yongbeen, Kim, Kyungho, Choi, Seungju, Kim, Hyunjun, Jang, Kyoungbae

    Published in Sensors (Basel, Switzerland) (05-04-2020)
    “…In this paper, we optimized Number Theoretic Transform (NTT) and random sampling operations on low-end 8-bit AVR microcontrollers. We focused on the optimized…”
    Get full text
    Journal Article
  4. 4

    Grover on Korean Block Ciphers by Jang, Kyoungbae, Choi, Seungju, Kwon, Hyeokdong, Kim, Hyunji, Park, Jaehoon, Seo, Hwajeong

    Published in Applied sciences (01-09-2020)
    “…The Grover search algorithm reduces the security level of symmetric key cryptography with n-bit security level to O(2n/2). In order to evaluate the Grover…”
    Get full text
    Journal Article
  5. 5

    Convolutional Neural Network-Based Cryptography Ransomware Detection for Low-End Embedded Processors by Kim, Hyunji, Park, Jaehoon, Kwon, Hyeokdong, Jang, Kyoungbae, Seo, Hwajeong

    Published in Mathematics (Basel) (01-04-2021)
    “…A crypto-ransomware has the process to encrypt victim’s files. Afterward, the crypto-ransomware requests a ransom for the password of encrypted files to…”
    Get full text
    Journal Article
  6. 6

    Parallel Implementations of ARIA on ARM Processors and Graphics Processing Unit by Eum, Siwoo, Kim, Hyunjun, Kwon, Hyeokdong, Sim, Minjoo, Song, Gyeongju, Seo, Hwajeong

    Published in Applied sciences (01-12-2022)
    “…The ARIA block cipher algorithm is Korean standard, IETF standard (RFC 5794), and part of the TLS/SSL protocol. In this paper, we present the parallel…”
    Get full text
    Journal Article
  7. 7

    Parallel Implementation of PIPO and Its Application for Format Preserving Encryption by Kim, Hyunji, Kim, Hyunjun, Eum, Siwoo, Kwon, Hyeokdong, Yang, Yujin, Seo, Hwajeong

    Published in IEEE access (2022)
    “…The PIPO block cipher, a domestic lightweight block cipher, was announced at ICISC'20. In particular, the bitslicing technique is implemented in the S-Layer…”
    Get full text
    Journal Article
  8. 8

    ASIC-Resistant Proof of Work Based on Power Analysis of Low-End Microcontrollers by Kim, Hyunjun, Kim, Kyungho, Kwon, Hyeokdong, Seo, Hwajeong

    Published in Mathematics (Basel) (01-08-2020)
    “…Application-Specific Integrated Circuit (ASIC)-resistant Proof-of-Work (PoW) is widely adopted in modern cryptocurrency. The operation of ASIC-resistant PoW on…”
    Get full text
    Journal Article
  9. 9

    Optimized Implementation of SM4 on AVR Microcontrollers, RISC-V Processors, and ARM Processors by Kwon, Hyeokdong, Kim, Hyunjun, Eum, Siwoo, Sim, Minjoo, Kim, Hyunji, Lee, Wai-Kong, Hu, Zhi, Seo, Hwajeong

    Published in IEEE access (2022)
    “…At 2003, the SM4 block cipher was introduced that is a Chinese domestic cryptographic. It is mandated in the Chinese National Standard for Wireless LAN Wired…”
    Get full text
    Journal Article
  10. 10

    High-Speed Implementation of PRESENT on AVR Microcontroller by Kwon, Hyeokdong, Kim, Young Beom, Seo, Seog Chung, Seo, Hwajeong

    Published in Mathematics (Basel) (01-02-2021)
    “…We propose the compact PRESENT on embedded processors. To obtain high-performance, PRESENT operations, including an add-round-key, a substitute layer and…”
    Get full text
    Journal Article
  11. 11

    Optimized Implementation of Simpira on Microcontrollers for Secure Massive Learning by Sim, Minjoo, Eum, Siwoo, Kwon, Hyeokdong, Jang, Kyungbae, Kim, Hyunjun, Kim, Hyunji, Song, Gyeongju, Lee, Waikong, Seo, Hwajeong

    Published in Symmetry (Basel) (01-11-2022)
    “…Internet of Things (IoT) technology, in which numerous devices cooperate, has a significant impact on existing industries, such as smart factories, smart cars,…”
    Get full text
    Journal Article
  12. 12

    Delivery technique for the pedicled transverse rectus abdominis myocutaneous flap by Lee, Jin Sun, Kwon, Hyeokdong, Lee, Won Suk, Oh, Sang-Ha

    Published in Archives of Aesthetic Plastic Surgery (01-10-2022)
    “…The pedicled transverse rectus abdominis myocutaneous (TRAM) flap is often used during breast reconstruction. After completely elevating the flap, a medial…”
    Get full text
    Journal Article
  13. 13

    PAGE—Practical AES-GCM Encryption for Low-End Microcontrollers by Kim, Kyungho, Choi, Seungju, Kwon, Hyeokdong, Kim, Hyunjun, Liu, Zhe, Seo, Hwajeong

    Published in Applied sciences (01-05-2020)
    “…An optimized AES (Advanced Encryption Standard) implementation of Galois Counter Mode of operation (GCM) on low-end microcontrollers is presented in this…”
    Get full text
    Journal Article
  14. 14

    Efficient Implementation of ARX-Based Block Ciphers on 8-Bit AVR Microcontrollers by Kim, YoungBeom, Kwon, Hyeokdong, An, SangWoo, Seo, Hwajeong, Seo, Seog Chung

    Published in Mathematics (Basel) (01-10-2020)
    “…As the development of Internet of Things (IoT), the data exchanged through the network has significantly increased. To secure the sensitive data with user’s…”
    Get full text
    Journal Article
  15. 15

    Masked Implementation of Format Preserving Encryption on Low-End AVR Microcontrollers and High-End ARM Processors by Kim, Hyunjun, Sim, Minjoo, Jang, Kyoungbae, Kwon, Hyeokdong, Uhm, Siwoo, Seo, Hwajeong

    Published in Mathematics (Basel) (01-06-2021)
    “…Format-Preserving Encryption (FPE) for Internet of Things (IoT) enables the data encryption while preserving the format and length of original data. With these…”
    Get full text
    Journal Article
  16. 16

    Parallel Implementations of ARX-Based Block Ciphers on Graphic Processing Units by An, SangWoo, Kim, YoungBeom, Kwon, Hyeokdong, Seo, Hwajeong, Seo, Seog Chung

    Published in Mathematics (Basel) (01-11-2020)
    “…With the development of information and communication technology, various types of Internet of Things (IoT) devices have widely been used for convenient…”
    Get full text
    Journal Article
  17. 17

    Secure HIGHT Implementation on ARM Processors by Seo, Hwajeong, Kim, Hyunjun, Jang, Kyungbae, Kwon, Hyeokdong, Sim, Minjoo, Song, Gyeongju, Uhm, Siwoo, Kim, Hyunji

    Published in Mathematics (Basel) (01-05-2021)
    “…Secure and compact designs of HIGHT block cipher on representative ARM microcontrollers are presented in this paper. We present several optimizations for…”
    Get full text
    Journal Article
  18. 18

    Serratia marcescens infection in a patient after a fat graft: a case report by Kim, Sunje, Kwon, Hyeokdong, Ahn, Chang Hwan, Ha, Yooseok, Kim, Joo-Hak, Kyung, Hyun Woo, Oh, Sang-Ha, Yang, Ho Jik, Song, Seung Han

    Published in Archives of Aesthetic Plastic Surgery (01-07-2022)
    “…Serratia marcescens is a Gram-negative, facultatively anaerobic bacillus that has been implicated in hospital-acquired infections. Because no previous cases of…”
    Get full text
    Journal Article
  19. 19

    Parallel quantum addition for Korean block ciphers by Jang, Kyungbae, Song, Gyeongju, Kim, Hyunjun, Kwon, Hyeokdong, Kim, Hyunji, Seo, Hwajeong

    Published in Quantum information processing (09-11-2022)
    “…Malicious users using quantum computers can employ quantum attacks on modern cryptography algorithms. Grover’s search algorithm, a well-known quantum…”
    Get full text
    Journal Article
  20. 20

    Designing with relaxed skin tension line in perforator-based island flap for sacral sore reconstruction: A STROBE-compliant observational study by Kwon, Hyeokdong, Ahn, Chang Hwan, Kim, Sunje, Kim, Joo-Hak, Kyung, Hyun Woo, Song, Seung Han, Oh, Sang-Ha, Yang, Ho Jik, Ha, Yooseok

    Published in Medicine (Baltimore) (16-09-2022)
    “…Many various types of operative techniques have been performed used to treat make-up for sacral defects. Perforator-based flaps with flap transposition, but…”
    Get full text
    Journal Article