Search Results - "Kwon, Hyeokdong"
-
1
ACE: ARIA-CTR Encryption for Low-End Embedded Processors
Published in Sensors (Basel, Switzerland) (06-07-2020)“…In this paper, we present the first optimized implementation of ARIA block cipher on low-end 8-bit Alf and Vegard’s RISC processor (AVR) microcontrollers. To…”
Get full text
Journal Article -
2
Efficient Implementation of PRESENT and GIFT on Quantum Computers
Published in Applied sciences (01-06-2021)“…Grover search algorithm is the most representative quantum attack method that threatens the security of symmetric key cryptography. If the Grover search…”
Get full text
Journal Article -
3
Fast Number Theoretic Transform for Ring-LWE on 8-bit AVR Embedded Processor
Published in Sensors (Basel, Switzerland) (05-04-2020)“…In this paper, we optimized Number Theoretic Transform (NTT) and random sampling operations on low-end 8-bit AVR microcontrollers. We focused on the optimized…”
Get full text
Journal Article -
4
Grover on Korean Block Ciphers
Published in Applied sciences (01-09-2020)“…The Grover search algorithm reduces the security level of symmetric key cryptography with n-bit security level to O(2n/2). In order to evaluate the Grover…”
Get full text
Journal Article -
5
Convolutional Neural Network-Based Cryptography Ransomware Detection for Low-End Embedded Processors
Published in Mathematics (Basel) (01-04-2021)“…A crypto-ransomware has the process to encrypt victim’s files. Afterward, the crypto-ransomware requests a ransom for the password of encrypted files to…”
Get full text
Journal Article -
6
Parallel Implementations of ARIA on ARM Processors and Graphics Processing Unit
Published in Applied sciences (01-12-2022)“…The ARIA block cipher algorithm is Korean standard, IETF standard (RFC 5794), and part of the TLS/SSL protocol. In this paper, we present the parallel…”
Get full text
Journal Article -
7
Parallel Implementation of PIPO and Its Application for Format Preserving Encryption
Published in IEEE access (2022)“…The PIPO block cipher, a domestic lightweight block cipher, was announced at ICISC'20. In particular, the bitslicing technique is implemented in the S-Layer…”
Get full text
Journal Article -
8
ASIC-Resistant Proof of Work Based on Power Analysis of Low-End Microcontrollers
Published in Mathematics (Basel) (01-08-2020)“…Application-Specific Integrated Circuit (ASIC)-resistant Proof-of-Work (PoW) is widely adopted in modern cryptocurrency. The operation of ASIC-resistant PoW on…”
Get full text
Journal Article -
9
Optimized Implementation of SM4 on AVR Microcontrollers, RISC-V Processors, and ARM Processors
Published in IEEE access (2022)“…At 2003, the SM4 block cipher was introduced that is a Chinese domestic cryptographic. It is mandated in the Chinese National Standard for Wireless LAN Wired…”
Get full text
Journal Article -
10
High-Speed Implementation of PRESENT on AVR Microcontroller
Published in Mathematics (Basel) (01-02-2021)“…We propose the compact PRESENT on embedded processors. To obtain high-performance, PRESENT operations, including an add-round-key, a substitute layer and…”
Get full text
Journal Article -
11
Optimized Implementation of Simpira on Microcontrollers for Secure Massive Learning
Published in Symmetry (Basel) (01-11-2022)“…Internet of Things (IoT) technology, in which numerous devices cooperate, has a significant impact on existing industries, such as smart factories, smart cars,…”
Get full text
Journal Article -
12
Delivery technique for the pedicled transverse rectus abdominis myocutaneous flap
Published in Archives of Aesthetic Plastic Surgery (01-10-2022)“…The pedicled transverse rectus abdominis myocutaneous (TRAM) flap is often used during breast reconstruction. After completely elevating the flap, a medial…”
Get full text
Journal Article -
13
PAGE—Practical AES-GCM Encryption for Low-End Microcontrollers
Published in Applied sciences (01-05-2020)“…An optimized AES (Advanced Encryption Standard) implementation of Galois Counter Mode of operation (GCM) on low-end microcontrollers is presented in this…”
Get full text
Journal Article -
14
Efficient Implementation of ARX-Based Block Ciphers on 8-Bit AVR Microcontrollers
Published in Mathematics (Basel) (01-10-2020)“…As the development of Internet of Things (IoT), the data exchanged through the network has significantly increased. To secure the sensitive data with user’s…”
Get full text
Journal Article -
15
Masked Implementation of Format Preserving Encryption on Low-End AVR Microcontrollers and High-End ARM Processors
Published in Mathematics (Basel) (01-06-2021)“…Format-Preserving Encryption (FPE) for Internet of Things (IoT) enables the data encryption while preserving the format and length of original data. With these…”
Get full text
Journal Article -
16
Parallel Implementations of ARX-Based Block Ciphers on Graphic Processing Units
Published in Mathematics (Basel) (01-11-2020)“…With the development of information and communication technology, various types of Internet of Things (IoT) devices have widely been used for convenient…”
Get full text
Journal Article -
17
Secure HIGHT Implementation on ARM Processors
Published in Mathematics (Basel) (01-05-2021)“…Secure and compact designs of HIGHT block cipher on representative ARM microcontrollers are presented in this paper. We present several optimizations for…”
Get full text
Journal Article -
18
Serratia marcescens infection in a patient after a fat graft: a case report
Published in Archives of Aesthetic Plastic Surgery (01-07-2022)“…Serratia marcescens is a Gram-negative, facultatively anaerobic bacillus that has been implicated in hospital-acquired infections. Because no previous cases of…”
Get full text
Journal Article -
19
Parallel quantum addition for Korean block ciphers
Published in Quantum information processing (09-11-2022)“…Malicious users using quantum computers can employ quantum attacks on modern cryptography algorithms. Grover’s search algorithm, a well-known quantum…”
Get full text
Journal Article -
20
Designing with relaxed skin tension line in perforator-based island flap for sacral sore reconstruction: A STROBE-compliant observational study
Published in Medicine (Baltimore) (16-09-2022)“…Many various types of operative techniques have been performed used to treat make-up for sacral defects. Perforator-based flaps with flap transposition, but…”
Get full text
Journal Article