Hyeokdong Kwon
Orcid: 0000-0002-9173-512X
According to our database1,
Hyeokdong Kwon
authored at least 34 papers
between 2018 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Look-up the Rainbow: Table-based Implementation of Rainbow Signature on 64-bit ARMv8 Processors.
ACM Trans. Embed. Comput. Syst., September, 2023
IACR Cryptol. ePrint Arch., 2023
High-speed Implementation of AIM symmetric primitives within AIMer digital signature.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Information Security Applications - 24th International Conference, 2023
2022
Symmetry, November, 2022
K-XMSS and K-SPHINCS<sup>+</sup>: Hash based Signatures with\\Korean Cryptography Algorithms.
IACR Cryptol. ePrint Arch., 2022
Optimized Implementation of Encapsulation and Decapsulation of Classic McEliece on ARMv8.
IACR Cryptol. ePrint Arch., 2022
Optimized Implementation of SM4 on AVR Microcontrollers, RISC-V Processors, and ARM Processors.
IEEE Access, 2022
Parallel Implementation of PIPO and Its Application for Format Preserving Encryption.
IEEE Access, 2022
Proceedings of the Information Security Applications - 23rd International Conference, 2022
2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Look-up the Rainbow: Efficient Table-based Parallel Implementation of Rainbow Signature on 64-bit ARMv8 Processors.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Information Security Applications - 22nd International Conference, 2021
Proceedings of the Information Security Applications - 22nd International Conference, 2021
2020
ACM Trans. Embed. Comput. Syst., 2020
Sensors, 2020
Proceedings of the Information Security Applications - 21st International Conference, 2020
Detecting Block Cipher Encryption for Defense Against Crypto Ransomware on Low-End Internet of Things.
Proceedings of the Information Security Applications - 21st International Conference, 2020
Impact of Optimized Operations A· B, A· C for Binary Field Inversion on Quantum Computers.
Proceedings of the Information Security Applications - 21st International Conference, 2020
2019
Proceedings of the Information Security Applications - 20th International Conference, 2019
Proceedings of the Information Security and Cryptology - ICISC 2019, 2019
2018
Proceedings of the Information Security Applications - 19th International Conference, 2018
Proceedings of the Information Security Applications - 19th International Conference, 2018
Proceedings of the Information Security and Cryptology - ICISC 2018, 2018