- Cryptographic Implementations and Security
- Cryptography and Residue Arithmetic
- Coding theory and cryptography
- Cryptography and Data Security
- Internet of Things and Social Network Interactions
- Hand Gesture Recognition Systems
- Security and Verification in Computing
- Innovation in Digital Healthcare Systems
- Chaos-based Image/Signal Encryption
- Tactile and Sensory Interactions
- Computational Geometry and Mesh Generation
- Time Series Analysis and Forecasting
- Technology and Data Analysis
- Polynomial and algebraic computation
- Computer Graphics and Visualization Techniques
- Teleoperation and Haptic Systems
- Environmental Policies and Emissions
- Municipal Solid Waste Management
- Marine and Coastal Research
- Image and Video Stabilization
- Recycling and Waste Management Techniques
- Big Data and Business Intelligence
- Human Pose and Action Recognition
- Cultural and Historical Studies
- Digital Transformation in Industry
Samsung (South Korea)
2023
Samsung SDS (South Korea)
2023
National Institute for Mathematical Sciences
2020-2021
Korea Electronics Technology Institute
2017-2020
Korea University
2017-2020
Post-quantum signature schemes based on the MPC-in-the-Head (MPCitH) paradigm are recently attracting significant attention as their security solely depends one-wayness of underlying primitive, providing diversity for hardness assumption in post-quantum cryptography. Recent MPCitH-friendly ciphers have been designed using simple algebraic S-boxes operating a large field order to improve performance resulting schemes. Due structures, against attacks should be comprehensively studied.
Smart connected product (SCP) operation embodies the concept of internet things (IoT). To increase probability success SCP operations for customers, high quality IoT data across is imperative. go beyond sensor data, as integrate some other various type such timestamps, device metadata, business and external through processes. Therefore, traditional data-centric approaches that analyze correct their errors are not enough to preserve, in long-term basis, adequate levels data. This research...
Plastics have multiple applications in disposable products, high-end technology parts, etc., owing to their functionality and manufacturing flexibility. However, increased use has the global proportion of plastic wastes, which creates a serious environmental issue, thereby, creating demand for waste management techniques. Improving efficiency resource recovery by appropriate sorting collection systems is necessary successful recycling. Therefore, this study proposed three-step optimization...
Shuffling is an essential countermeasure employed during the implementation of cryptographic algorithms to mitigate vulnerabilities against side-channel attacks, regardless algorithm's nature. However, a comprehensive and structured shuffling framework has yet be established, resulting in need for developers create customized solutions adapted their specific algorithmic or operational requirements. This research paper introduces innovative systematic framework, providing with set guidelines...
An unintentional hand drift adversely affects the typing performance of conventional virtual keyboards. To overcome this, we proposed to utilize patterns skilled typists. First, as most typists enter keys in same column with a predetermined finger only, restricted these be typed by their corresponding fingers. Second, our investigation demonstrated that poses vary when touch different keys. Thus, rather than locating point case existing keyboards, attempted use unique infer target key. Based...
A signature scheme based on multivariate quadratic equations, Rainbow, was selected as one of digital finalists for NIST Post-Quantum Cryptography Standardization Round 3. In this paper, we provide efficient implementations Rainbow and UOV using the AVX2 instruction set. These include several optimizations signing to accelerate solving linear systems Vinegar value substitution. We propose a new block matrix inversion (BMI) method Lower-Diagonal-Upper decomposition blocks matrices Schur...
Advanced collision-based single trace attacks which can be applied on simple power analysis resistant scalar multiplications become virtual threat elliptic curve cryptosystems recently as their practical experimental results are increasingly reported in the literature. Since such based detecting collisions of data dependent leakage caused by underlying long integer multiplications, so-called global shuffling countermeasure breaks collision correlation independently randomizing execution...
In this paper, we present a highly optimized implementation of elliptic curve cryptography (ECC) over NIST P-256 for an 8-bit AVR microcontroller. For improving the performance ECC implementation, focus on optimizing field arithmetics. particular, optimize modular multiplication and squaring method exploiting state-of-the-art optimization technique, namely range shifted representation (RSR). With arithmetics, significantly improve scalar set speed record execution time variable base curve....
We propose a hand gesture recognition method that is compatible with head-up display (HUD) including small processing resource.For fast link adaptation HUD, it necessary to rapidly process and send the minimum amount of driver data from wearable device.Therefore, we use recognizes each an inertial measurement unit (IMU) sensor based on revised correlation matching.The executed by calculating between every axis acquired set.By classifying pre-defined values actions, proposed enables rapid...
In this study, we developed software for vehicle big data analysis to analyze the time-series of connected vehicles. We designed two modules: The first derive Pearson correlation coefficients collected and second conduct exploratory data. particular, analyzed dangerous driving patterns motorists based on safety standards Korea Transportation Safety Authority. also seasonal fuel efficiency (four seasons) mileage vehicles, identified rapid acceleration, deceleration, sudden stopping (harsh...
In this paper, we propose a novel key recovery attack against secure ECDSA signature generation employing regular table-based scalar multiplication. Our exploits leakage, denoted by collision information, which can be constructed iteratively determining whether two entries loaded from the table are same or not through side-channel analysis. Without knowing actual value of entries, an adversary recover private finding condition for several nonces linearly dependent exploiting only...
We analyze the security of RSA prime generation implemented on embedded devices by a practical power analysis attack. Unlike previous differential analysis-based attack primality tests exploiting deterministic relationship among multiple candidates manipulated consecutive tests, we propose collision-based Miller-Rabin test for single candidate which can recover secret with attempt collision characteristics simple resistant modular exponentiation algorithms. Hence, our does not require...
We present TwohandsMusic, a new real-time system for recognizing egocentric piano-playing gestures on planar objects by using depth camera. Existing methods have usually recognized single tap of one hand sensor installed in front or under the user's hand. In contrast, we consider multi-tap both hands camera near head. Our approach consists two steps: detection and gesture recognition. At step, detect 2DCNN (Convolutional Neural Network), called SegNet, generate cropped images, which is to be...
교통사고 요인 중 인적요인을 규제하는 대표적인 법령인 도로교통법은 법규위반자에 대해 형사적 제재와 행정적 제재를 규정하고 있다. 제재는 대부분 벌점을 기초로 이루지므로 명확하고 합리적 기준에 따라 적정한 수준에서 벌점이 규정되어야 할 필요가 이에 본 연구는 현행법령 상 인적피해 결과에 따른 벌점과 대물피해환산법에 사고심각도를 기준으로 현행벌점이 최소한의 기준을 만족하는지 검증하고 만족하는 법규위반과의 비교를 통해 구체적인 적정벌점을 산출하고자 한다. 자료는 2016-2018년에 발생한 데이터를 수집하였으며 10개 법규위반 별 사고결과 보고 현행법령상 해당 법규위반의 이를 상회하는지 단일표본 t-test를 분석하였다. 또한 충분히 높지 않은 것으로 나타난 법규위반들의 적정벌점 추정을 위해 법규위반들에 Welch’s ANOVA과 Games-Howell 사후분석을 수행하였다. 그 결과 첫째, 불법유턴, 교차로운행방법위반, 보행자보호의무위반, 직진우회전진행방해의 만족하지 못해...
현재 전력 분석은 여러 가지 부채널 분석 중 가장 활발하게 연구되고 있다. 1999년 Kocher 등에 의해 차분 분석이 제안된 이후로 소프트웨어/하드웨어 기반 암호 디바이스를 대상으로 하는 다양하고 현실적인 공격이 제안되었다. 본 논문은 공개키 알고리즘에 대하여 단 하나의 파형을 이용하는 전력분석에 안전한 대응기법의 취약성을 분석한다. 2010년 ICICS에서 Clavier 등은 지수승 파형으로 비밀 정보를 찾아낼 수 있는 수평적 상관관계 분석과 그에 대한 대응기법을 제안하였다. 그 하나인 "Blind operands in LIM" 대응기법은 큰 정수 곱셈의 두 입력에 덧셈 블라인딩을 이용하여 비밀정보와 관련된 중간 값 노출을 막는다. 그럼에도 불구하고 이 공격자가 알고 평문에 누설을 일으킬 취약점을 가지고 논문에서는 세 공격시나리오를 통해 분석했고 실제적인 실험을 이를 증명하였다. Until recently, power analysis is one of the most...
현재, ECDIS(Electronic Chart Display and Information System), RADAR(Radio Detection And Ranging), AIS(Automatic Identification System) 등의 선박용 통합내비게이션시스템(Integrated Navigation 응용프로그램은 일반적으로 서로 다른 하드웨어와 운영체제에서 운영된다. 즉, 통합내비게이션시스템을 운영하기 위해서는 각 항해용 애플리케이션마다 별도의 하드웨어가 필요하다. 본 논문에서는 XEN 가상화 플랫폼의 게스트 도메인(Guest Doamin/DomU)을 이용하여 MFD(Multi Function Display)를 지원하는 통합내비게이션시스템의 구조를 제안했다. 제안한 기반 통합 내비게이션시스템은 선박 내 항법장비에 대한 디지털 인터페이스 표준인 IEC61162-450/460 네트워크를 기반으로 한다. 또한, 우리는 플랫폼 통합내비게이션시스템 네트워크 표준인터페이스를...
본 논문에서는 전자기장 센서를 기반으로 손동작 인식을 통해 차량 내 조명을 제어하는 비접촉식 사용자 인터페이스 시스템을 개발했다. 새로운 차량용 구조를 제안했으며, 제안한 사용자의 손동작을 인식하기 위해 하드웨어를 설계 및 개발했으며, 데이터 송/수신과 처리를 위한 소프트웨어 모듈을 포함해 데이터를 확인하기 시뮬레이터 내부의 조명 제어의 시각화를 인터페이스(GUI) 소프트웨어를 개발 구현했다. 이용한 차량내 시스템의 구조와 흐름, 안정화 기법 개발된 시스템 전체에 관해 기술한다.