What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Okyeon Yi
Google Scholar
10
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/asiajcis
AI-Driven Defense Mechanism for Lattice-Based Post-Quantum Cryptography: Adaptive Mitigation Against Side-Channel Attacks.
Wibby Aldryani Astuti Praditasari
Hyungyeop Kim
Hyejin Yoon
Danang Rimbawa
Okyeon Yi
2022
conf/wisa
Analysis of Radioactive Decay Based Entropy Generator in the IoT Environments.
Taewan Kim
Seyoon Lee
Seunghwan Yun
Jongbum Kim
Okyeon Yi
2017
conf/wisa
Key Managements of Underwater Acoustic Communication Environments.
Hyunki Kim
Jae-Hoon Lee
Okyeon Yi
2006
journals/joc
Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers.
Deukjo Hong
Seokhie Hong
Wonil Lee
Sangjin Lee
Jongin Lim
Jaechul Sung
Okyeon Yi
2006
conf/wisa
Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates with Passwords.
Daesung Moon
Sungju Lee
Seunghwan Jung
Yongwha Chung
Okyeon Yi
Namil Lee
Kiyoung Moon
2001
conf/acisp
Pseudorandomness of MISTY-Type Transformations and the Block Cipher KASUMI.
Ju-Sung Kang
Okyeon Yi
Dowon Hong
Hyun Sook Cho
2001
conf/icisc
Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation.
Jaechul Sung
Sangjin Lee
Jong In Lim
Wonil Lee
Okyeon Yi
2001
conf/asiacrypt
Known-IV Attacks on Triple Modes of Operation of Block Ciphers.
Deukjo Hong
Jaechul Sung
Seokhie Hong
Wonil Lee
Sangjin Lee
Jongin Lim
Okyeon Yi
2001
conf/asiacrypt
Provable Security of KASUMI and 3GPP Encryption Mode f8.
Ju-Sung Kang
Sang-Uk Shin
Dowon Hong
Okyeon Yi
2000
conf/acisp
A Proposal of a New Public Key Cryptosystem Using Matrices over a Ring.
Heajoung Yoo
Seokhie Hong
Sangjin Lee
Jong In Lim
Okyeon Yi
Maenghee Sung
Coauthors
Daesung Moon
(1)
Danang Rimbawa
(1)
Deukjo Hong
(2)
Dowon Hong
(2)
Heajoung Yoo
(1)
Hyejin Yoon
(1)
Hyun Sook Cho
(1)
Hyungyeop Kim
(1)
Hyunki Kim
(1)
Jae-Hoon Lee
(1)
Jaechul Sung
(3)
Jong In Lim
(2)
Jongbum Kim
(1)
Jongin Lim
(2)
Ju-Sung Kang
(2)
Kiyoung Moon
(1)
Maenghee Sung
(1)
Namil Lee
(1)
Okyeon Yi
(10)
Sang-Uk Shin
(1)
Sangjin Lee
(4)
Seokhie Hong
(3)
Seunghwan Jung
(1)
Seunghwan Yun
(1)
Seyoon Lee
(1)
Sungju Lee
(1)
Taewan Kim
(1)
Wibby Aldryani Astuti Praditasari
(1)
Wonil Lee
(3)
Yongwha Chung
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to