Hwajeong Seo
Orcid: 0000-0003-0069-9061
According to our database1,
Hwajeong Seo
authored at least 189 papers
between 2011 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
KpqClean Ver2: Comprehensive Benchmarking and Analysis of KpqC Algorithm Round 2 Submissions.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the 37th IEEE International System-on-Chip Conference, 2024
2023
Look-up the Rainbow: Table-based Implementation of Rainbow Signature on 64-bit ARMv8 Processors.
ACM Trans. Embed. Comput. Syst., September, 2023
K-XMSS and K-SPHINCS+: Enhancing Security in Next-Generation Mobile Communication and Internet Systems with Hash Based Signatures Using Korean Cryptography Algorithms.
Sensors, September, 2023
Entropy, July, 2023
Quantum Binary Field Multiplication with Optimized Toffoli Depth and Extension to Quantum Inversion.
Sensors, March, 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
High-speed Implementation of AIM symmetric primitives within AIMer digital signature.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Analysis of Parallel Implementation of Pilsung Block Cipher On Graphics Processing Unit.
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Information Security Applications - 24th International Conference, 2023
Proceedings of the Information Security Applications - 24th International Conference, 2023
Proceedings of the 31st IFIP/IEEE International Conference on Very Large Scale Integration, 2023
2022
Symmetry, November, 2022
Efficient Implementation of AES-CTR and AES-ECB on GPUs With Applications for High-Speed FrodoKEM and Exhaustive Key Search.
IEEE Trans. Circuits Syst. II Express Briefs, 2022
DPCrypto: Acceleration of Post-Quantum Cryptography Using Dot-Product Instructions on GPUs.
IEEE Trans. Circuits Syst. I Regul. Pap., 2022
K-XMSS and K-SPHINCS<sup>+</sup>: Hash based Signatures with\\Korean Cryptography Algorithms.
IACR Cryptol. ePrint Arch., 2022
Optimized Implementation of Encapsulation and Decapsulation of Classic McEliece on ARMv8.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Transformer encoder-based Crypto-Ransomware Detection for Low-Power Embedded Processors.
IACR Cryptol. ePrint Arch., 2022
Quantum Neural Network based Distinguisher for Differential Cryptanalysis on Simplified Block Ciphers.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
TensorCrypto: High Throughput Acceleration of Lattice-Based Cryptography Using Tensor Core on GPU.
IEEE Access, 2022
Efficient Implementation of Lightweight Hash Functions on GPU and Quantum Computers for IoT Applications.
IEEE Access, 2022
Optimized Implementation of SM4 on AVR Microcontrollers, RISC-V Processors, and ARM Processors.
IEEE Access, 2022
Parallel Implementation of PIPO and Its Application for Format Preserving Encryption.
IEEE Access, 2022
Proceedings of the Information Security Applications - 23rd International Conference, 2022
Proceedings of the Information Security Applications - 23rd International Conference, 2022
Optimized Implementation of Quantum Binary Field Multiplication with Toffoli Depth One.
Proceedings of the Information Security Applications - 23rd International Conference, 2022
Proceedings of the Progress in Cryptology - INDOCRYPT 2022, 2022
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2022
Side-Channel Analysis and Countermeasure Design for Implementation of Curve448 on Cortex-M4.
Proceedings of the 11th International Workshop on Hardware and Architectural Support for Security and Privacy, 2022
2021
ACM Trans. Embed. Comput. Syst., 2021
IEEE Trans. Computers, 2021
Quantum Inf. Process., 2021
IACR Cryptol. ePrint Arch., 2021
No Silver Bullet: Optimized Montgomery Multiplication on Various 64-bit ARM Platforms.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
DPCrypto: Acceleration of Post-quantum Cryptographic Algorithms using Dot-Product Instruction on GPUs.
IACR Cryptol. ePrint Arch., 2021
Look-up the Rainbow: Efficient Table-based Parallel Implementation of Rainbow Signature on 64-bit ARMv8 Processors.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
A New Method for Designing Lightweight S-Boxes With High Differential and Linear Branch Numbers, and its Application.
IEEE Access, 2021
Proceedings of the Information Security Applications - 22nd International Conference, 2021
Proceedings of the Information Security Applications - 22nd International Conference, 2021
Proceedings of the 28th IEEE Symposium on Computer Arithmetic, 2021
2020
ACM Trans. Embed. Comput. Syst., 2020
Four$\mathbb {Q}$Q on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks.
IEEE Trans. Dependable Secur. Comput., 2020
IEEE Trans. Circuits Syst. I Regul. Pap., 2020
IEEE Trans. Computers, 2020
Sensors, 2020
IEEE Internet Things J., 2020
Proceedings of the Information Security Applications - 21st International Conference, 2020
Detecting Block Cipher Encryption for Defense Against Crypto Ransomware on Low-End Internet of Things.
Proceedings of the Information Security Applications - 21st International Conference, 2020
Impact of Optimized Operations A· B, A· C for Binary Field Inversion on Quantum Computers.
Proceedings of the Information Security Applications - 21st International Conference, 2020
Generative Adversarial Networks-Based Pseudo-Random Number Generator for Embedded Processors.
Proceedings of the Information Security and Cryptology - ICISC 2020, 2020
PIPO: A Lightweight Block Cipher with Efficient Higher-Order Masking Software Implementations.
Proceedings of the Information Security and Cryptology - ICISC 2020, 2020
2019
Hybrid approach of parallel implementation on CPU-GPU for high-speed ECDSA verification.
J. Supercomput., 2019
IEEE Trans. Inf. Forensics Secur., 2019
Lightweight Implementations of NIST P-256 and SM2 ECC on 8-bit Resource-Constraint Embedded Device.
ACM Trans. Embed. Comput. Syst., 2019
Memory-Efficient Implementation of Elliptic Curve Cryptography for the Internet-of-Things.
IEEE Trans. Dependable Secur. Comput., 2019
Secur. Commun. Networks, 2019
Proceedings of the Information Security Applications - 20th International Conference, 2019
Proceedings of the Information Security and Cryptology - ICISC 2019, 2019
Proceedings of the Information Security and Cryptology - ICISC 2019, 2019
2018
J. Supercomput., 2018
J. Supercomput., 2018
ACM Trans. Embed. Comput. Syst., 2018
ACM Trans. Embed. Comput. Syst., 2018
SIDH on ARM: Faster Modular Multiplications for Faster Post-Quantum Supersingular Isogeny Key Exchange.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018
Efficient Parallel Implementation of Matrix Multiplication for Lattice-Based Cryptography on Modern ARM Processor.
Secur. Commun. Networks, 2018
Highly Efficient Implementation of NIST-Compliant Koblitz Curve for 8-bit AVR-Based Sensor Nodes.
IEEE Access, 2018
Proceedings of the Information Security Applications - 19th International Conference, 2018
Proceedings of the Information Security Applications - 19th International Conference, 2018
Proceedings of the Advanced Multimedia and Ubiquitous Engineering, 2018
Proceedings of the Tenth International Conference on Ubiquitous and Future Networks, 2018
Proceedings of the Tenth International Conference on Ubiquitous and Future Networks, 2018
Proceedings of the Information Security and Cryptology - ICISC 2018, 2018
2017
ACM Trans. Embed. Comput. Syst., 2017
ACM Trans. Embed. Comput. Syst., 2017
On Emerging Family of Elliptic Curves to Secure Internet of Things: ECC Comes of Age.
IEEE Trans. Dependable Secur. Comput., 2017
J. Inform. and Commun. Convergence Engineering, 2017
J. Inform. and Commun. Convergence Engineering, 2017
J. Inform. and Commun. Convergence Engineering, 2017
IACR Cryptol. ePrint Arch., 2017
Lightweight Fault Attack Resistance in Software Using Intra-instruction Redundancy, Revisited.
Proceedings of the Information Security Applications - 18th International Conference, 2017
Proceedings of the Information Security Applications - 18th International Conference, 2017
Proceedings of the Information Security Applications - 18th International Conference, 2017
Proceedings of the Ninth International Conference on Ubiquitous and Future Networks, 2017
Proceedings of the Ninth International Conference on Ubiquitous and Future Networks, 2017
Proceedings of the International Conference on Information and Communication Technology Convergence, 2017
Secure Number Theoretic Transform and Speed Record for Ring-LWE Encryption on Embedded Processors.
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017
Four \mathbb Q on Embedded Devices with Strong Countermeasures Against Side-Channel Attacks.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017
Proceedings of the 24th IEEE Symposium on Computer Arithmetic, 2017
2016
Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for 8-bit AVR-Based Sensor Nodes.
IEEE Trans. Inf. Forensics Secur., 2016
Efficient arithmetic on ARM-NEON and its application for high-speed RSA implementation.
Secur. Commun. Networks, 2016
J. Inform. and Commun. Convergence Engineering, 2016
J. Inform. and Commun. Convergence Engineering, 2016
A Synthesis of Multi-Precision Multiplication and Squaring Techniques for 8-Bit Sensor Nodes: State-of-the-Art Research and Future Challenges.
J. Comput. Sci. Technol., 2016
Multi-precision Squaring for Public-Key Cryptography on Embedded Microprocessors, a Step Forward.
Proceedings of the Information Security Applications - 17th International Workshop, 2016
Proceedings of the Information Security Applications - 17th International Workshop, 2016
Efficient Scalar Multiplication for Ate Based Pairing over KSS Curve of Embedding Degree 18.
Proceedings of the Information Security Applications - 17th International Workshop, 2016
Key Update at Train Stations: Two-Layer Dynamic Key Update Scheme for Secure Train Communications.
Proceedings of the Security and Privacy in Communication Networks, 2016
Proceedings of the Radio Frequency Identification and IoT Security, 2016
Proceedings of the IEEE International Conference on Consumer Electronics-Taiwan, 2016
2015
Secur. Commun. Networks, 2015
Performance evaluation of twisted Edwards-form elliptic curve cryptography for wireless sensor nodes.
Secur. Commun. Networks, 2015
J. Inform. and Commun. Convergence Engineering, 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Comput. Secur., 2015
Proceedings of the Information Security Applications - 16th International Workshop, 2015
Proceedings of the Information Security Applications - 16th International Workshop, 2015
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015
Efficient Implementation of ECDH Key Exchange for MSP430-Based Wireless Sensor Networks.
Proceedings of the 10th ACM Symposium on Information, 2015
2014
Binary and prime field multiplication for public key cryptography on embedded microprocessors.
Secur. Commun. Networks, 2014
J. Inform. and Commun. Convergence Engineering, 2014
J. Inform. and Commun. Convergence Engineering, 2014
J. Inform. and Commun. Convergence Engineering, 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Information Security Applications - 15th International Workshop, 2014
Proceedings of the Information Security Applications - 15th International Workshop, 2014
Proceedings of the IEEE World Forum on Internet of Things, 2014
Proceedings of the IEEE World Forum on Internet of Things, 2014
Proceedings of the International Conference on Information and Communication Technology Convergence, 2014
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014
Proceedings of the Information and Communications Security - 16th International Conference, 2014
Proceedings of the Future Data and Security Engineering - First International Conference, 2014
2013
Fixed-Base Comb with Window-Non-Adjacent Form (NAF) Method for Scalar Multiplication.
Sensors, 2013
Secur. Commun. Networks, 2013
Implementation of Multi-Precision Multiplication over Sensor Networks with Efficient Instructions.
J. Inform. and Commun. Convergence Engineering, 2013
Proceedings of the Progress in Cryptology - INDOCRYPT 2013, 2013
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013
Efficient Implementation of NIST-Compliant Elliptic Curve Cryptography for Sensor Nodes.
Proceedings of the Information and Communications Security - 15th International Conference, 2013
2012
J. Inform. and Commun. Convergence Engineering, 2012
J. Inform. and Commun. Convergence Engineering, 2012
J. Inform. and Commun. Convergence Engineering, 2012
J. Inform. and Commun. Convergence Engineering, 2012
J. Inform. and Commun. Convergence Engineering, 2012
Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors.
Proceedings of the Information Security Applications - 13th International Workshop, 2012
2011
J. Inform. and Commun. Convergence Engineering, 2011
Transmission Power Range based Sybil Attack Detection Method over Wireless Sensor Networks.
J. Inform. and Commun. Convergence Engineering, 2011