Giyoon Kim

According to our database1, Giyoon Kim authored at least 27 papers between 2019 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

2019
2020
2021
2022
2023
2024
2025
0
1
2
3
4
5
6
7
8
3
6
1
5
7
1
2
1
1

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
A Framework for Generating S-Box Circuits with Boyar-Peralta Algorithm-Based Heuristics, and Its Applications to AES, SNOW3G, and Saturnin.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2025

Analyzing the Web and UWP versions of WhatsApp for digital forensics.
Forensic Sci. Int. Digit. Investig., 2025

How to decrypt files encrypted by Rhysida ransomware without the attacker's private key.
Comput. Secur., 2025

2024
On Impossible and Truncated Distinguishers for IoT-Friendly AEAD Algorithms.
IEEE Internet Things J., October, 2024

Preimage attacks on reduced-round Ascon-Xof.
Des. Codes Cryptogr., August, 2024

A Framework for Generating S-Box Circuits with Boyer-Peralta Algorithm-Based Heuristics, and Its Applications to AES, SNOW3G, and Saturnin.
IACR Cryptol. ePrint Arch., 2024

Forensic analysis and data decryption of tencent meeting in windows environment.
Forensic Sci. Int. Digit. Investig., 2024

A Method for Decrypting Data Infected with Rhysida Ransomware.
CoRR, 2024

A study on vulnerability of the Wickr login system in windows from a live forensics perspective.
Comput. Secur., 2024

2023
Forensic analysis for multi-platform Cisco Webex.
Forensic Sci. Int. Digit. Investig., December, 2023

Enhancing the Related-Key Security of PIPO Through New Key Schedules.
Proceedings of the Information Security and Cryptology - ICISC 2023, 2023

2022
A method for decrypting data infected with Hive ransomware.
J. Inf. Secur. Appl., 2022

Forensic analysis of note and journal applications.
Digit. Investig., 2022

Methods for recovering deleted data from the Realm database: Case study on Minitalk and Xabber.
Digit. Investig., 2022

Differential uniformity and linearity of S-boxes by multiplicative complexity.
Cryptogr. Commun., 2022

Speeding Up LAT: Generating a Linear Approximation Table Using a Bitsliced Implementation.
IEEE Access, 2022

2021
Corrigendum to "Decrypting password-based encrypted backup data for Huawei smartphones" [Digital Investigation 28 (2019) 200890].
Digit. Investig., 2021

A study on LG content lock and data acquisition from apps based on content lock function.
Digit. Investig., 2021

Forensic analysis of instant messaging apps: Decrypting Wickr and private text messaging data.
Digit. Investig., 2021

Methods for decrypting the data encrypted by the latest Samsung smartphone backup programs in Windows and macOS.
Digit. Investig., 2021

Corrigendum to "Data acquisition methods using backup data decryption of sony smartphones" [Foren. Sci. Int: Digital Investigation 31 (2019) 200890].
Digit. Investig., 2021

Generating Cryptographic S-Boxes Using the Reinforcement Learning.
IEEE Access, 2021

A New Method for Designing Lightweight S-Boxes With High Differential and Linear Branch Numbers, and its Application.
IEEE Access, 2021

2020
A study on the decryption methods of telegram X and BBM-Enterprise databases in mobile and PC.
Digit. Investig., 2020

PIPO: A Lightweight Block Cipher with Efficient Higher-Order Masking Software Implementations.
Proceedings of the Information Security and Cryptology - ICISC 2020, 2020

2019
Decrypting password-based encrypted backup data for Huawei smartphones.
Digit. Investig., 2019

Data acquisition methods using backup data decryption of Sony smartphones.
Digit. Investig., 2019


  Loading...