Follow
Yoonjeong Kim
Yoonjeong Kim
DuDu Information Technology, Inc.
Verified email at swu.ac.kr
Title
Cited by
Cited by
Year
Privacy-aware role based access control model: Revisited for multi-policy conflict detection
Y Kim, E Song
2010 International Conference on Information Science and Applications, 1-7, 2010
162010
Efficient parallel exponentiation in GF (qn) using normal basis representations
MK Lee, Y Kim, K Park, Y Cho
Journal of Algorithms 54 (2), 205-221, 2005
82005
Preventing Bitcoin Selfish Mining Using Transaction Creation Time
YK Jihye Lee
2018 International Conference on Software Security and Assurance (ICSSA), 2018
52018
Robust lightweight fingerprint encryption using random block feedback
Y Kim, J Yoon, JH Joo, K Yi
Electronics letters 50 (4), 267-268, 2014
52014
Modified hierarchical privacy-aware role based access control model
S Arora, E Song, Y Kim
Proceedings of the 2012 ACM Research in Applied Computation Symposium, 344-347, 2012
52012
Safety comparison analysis against known/chosen plaintext attack of RBF (random block feedback) mode to other block cipher modes of operation
Y Kim, K Yi
The Journal of Korean Institute of Communications and Information Sciences …, 2014
32014
The random-block feedback mode for block ciphers
Y Kim, Y Cho
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2000
32000
Privacy-Preserving RFID Authentication Using Public Exponent Three RSA Algorithm
Y Kim, SY Ohm, K Yi
IEICE transactions on information and systems 92 (3), 545-547, 2009
22009
Efficient parallel exponentiation in GF(2n) using normal basis representations
MK Lee, Y Kim, K Park, Y Cho
Proceedings of the thirteenth annual ACM symposium on Parallel algorithms …, 2001
22001
Storage efficient algorithm for Hermite Normal Form using LLL
GH Cho, HS Lee, S Lim, Y Kim
Linear Algebra and its Applications 613, 183-200, 2021
2021
HNF Implementation Strategy Analysis for Lattice Cryptography (Lightning Talk)
Y Kim, H Yun, S Lim
2018 International Conference on Software Security and Assurance (ICSSA), 38-38, 2018
2018
블록 암호 연산 모드 RBF (Random Block Feedback) 의 알려진/선택 평문 공격에 대한 안전성 비교 분석
김윤정, 이강
한국통신학회논문지 39 (5), 317-322, 2014
2014
웹서버를 위한, 서비스 거부 공격에 강한 침입탐지시스템 구성
김윤정
융합보안논문지 8 (3), 1-8, 2008
2008
Aspnes, James, 127
R Beigel, DJ Bernstein, JM Boyer, Y Cho, D Eppstein, F Fich, B Gum, ...
Journal of Algorithms 54, 223, 2005
2005
Kenneth Weber, Vilmar Trevisan, Luiz Felipe Martins. A modular integer GCD al
R Beigel, D Eppstein, MK Lee, Y Kim, K Park, Y Cho, P Šparl, J Žerovnik, ...
Journal of Algorithms 54, 126, 2005
2005
ISO/IEC 의 IDS 기술 표준 동향
김윤정, 이기한
정보보호학회지 14 (2), 6-11, 2004
2004
병렬 지수승에서 라운드 수 축소를 위한 알고리즘
김윤정
정보보호학회논문지 14 (1), 113-119, 2004
2004
DES Modes of Operations DES Modes of Operations, 1980
Y KIM, Y CHO
IEICE transactions on fundamentals of electronics, communications and …, 2000
2000
Cryptography FAQ (Frequently Asked Questions), Section 2.1. 4 What is a block cipher? Cryptography FAQ (Frequently Asked Questions), Section 2.1. 4 What is a block cipher?, 1998
Y KIM, Y CHO
IEICE transactions on fundamentals of electronics, communications and …, 2000
2000
ftp://ftp/psy/up/oz/au/pub/Crypto. ftp://ftp/psy/up/oz/au/pub/Crypto.
Y KIM, Y CHO
IEICE transactions on fundamentals of electronics, communications and …, 2000
2000
The system can't perform the operation now. Try again later.
Articles 1–20