Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Yeom, Yongjin
add a person with the name Yeom, Yongjin
 

Other publications of authors with the same name

Practical True Random Number Generator Using CMOS Image Sensor Dark Noise., , , , , , , and . IEEE Access, (2019)Related-Key Boomerang Attack on Block Cipher SQUARE., , and . IEICE Transactions, 94-A (1): 3-9 (2011)Recoverable Random Numbers in an Internet of Things Operating System., , and . Entropy, 19 (3): 113 (2017)Related-Key Boomerang Attack on Block Cipher SQUARE., , and . IACR Cryptology ePrint Archive, (2010)Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003., , and . Public Key Cryptography, volume 4450 of Lecture Notes in Computer Science, page 107-117. Springer, (2007)Efficient RFID authentication protocols based on pseudorandom sequence generators., and . Des. Codes Cryptogr., 51 (2): 195-210 (2009)Efficient RFID authentication protocols based on pseudorandom sequence generators., and . IACR Cryptology ePrint Archive, (2008)A New Class of Single Cycle T-Functions., , , and . FSE, volume 3557 of Lecture Notes in Computer Science, page 68-82. Springer, (2005)Improved Impossible Differential Attacks on Large-Block Rijndael., , , , and . ISC, volume 5222 of Lecture Notes in Computer Science, page 298-315. Springer, (2008)A Cryptographic SoC for Robust Protection of Secret Keys in IPTV DRM Systems., , , and . IEICE Transactions, 93-A (1): 194-201 (2010)