Yongjin Yeom

Orcid: 0000-0002-8240-8661

According to our database1, Yongjin Yeom authored at least 23 papers between 2002 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
IPCC7: Post-Quantum Encryption Scheme Based on a Perfect Dominating Set in 3-Regular Graph.
IEEE Access, 2024

2023
Practical Entropy Accumulation for Random Number Generators with Image Sensor-Based Quantum Noise Sources.
Entropy, July, 2023

2021
Accelerated implementation for testing IID assumption of NIST SP 800-90B using GPU.
PeerJ Comput. Sci., 2021

2020
Cryptanalysis of the obfuscated round boundary technique for whitebox cryptography.
Sci. China Inf. Sci., 2020

2019
A Lightweight BCH Code Corrector of TRNG with Measurable Dependence.
Secur. Commun. Networks, 2019

Practical True Random Number Generator Using CMOS Image Sensor Dark Noise.
IEEE Access, 2019

2018
Probability distributions for the Linux entropy estimator.
Discret. Appl. Math., 2018

2017
Analysis of random noise generated by graphic processing units.
Int. J. Serv. Technol. Manag., 2017

Recoverable Random Numbers in an Internet of Things Operating System.
Entropy, 2017

On the Additional Chi-Square Tests for the IID Assumption of NIST SP 800-90B.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

2016
The OpenWRT's Random Number Generator Designed Like /dev/urandom and Its Vulnerability.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2016

Probabilistic Analysis for the Relationship Between Min-Entropy and Guessing Attack.
Proceedings of the Advances in Computer Science and Ubiquitous Computing, 2016

2012
Generating Random Numbers for Cryptographic Modules Using Race Conditions in GPU.
Proceedings of the Computer Applications for Graphics, Grid Computing, and Industrial Environment, 2012

2011
Related-Key Boomerang Attack on Block Cipher SQUARE.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

2010
A Cryptographic SoC for Robust Protection of Secret Keys in IPTV DRM Systems.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

2009
Efficient RFID authentication protocols based on pseudorandom sequence generators.
Des. Codes Cryptogr., 2009

2008
High-Speed Implementations of Block Cipher ARIA Using Graphics Processing Units.
Proceedings of the 2008 International Conference on Multimedia and Ubiquitous Engineering (MUE 2008), 2008

Improved Impossible Differential Attacks on Large-Block Rijndael.
Proceedings of the Information Security, 11th International Conference, 2008

2007
Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003.
Proceedings of the Public Key Cryptography, 2007

2006
Vulnerability of an RFID Authentication Protocol Proposed in at SecUbiq 2005.
Proceedings of the Emerging Directions in Embedded and Ubiquitous Computing, 2006

2005
A New Class of Single Cycle T-Functions.
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005

2003
New Block Cipher: ARIA.
Proceedings of the Information Security and Cryptology, 2003

2002
On the Security of CAMELLIA against the Square Attack.
Proceedings of the Fast Software Encryption, 9th International Workshop, 2002


  Loading...