Hyunjun Kim

ORCID: 0000-0001-6810-0903
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptographic Implementations and Security
  • Coding theory and cryptography
  • Parallel Computing and Optimization Techniques
  • Chaos-based Image/Signal Encryption
  • Advanced Data Storage Technologies
  • Spinal Fractures and Fixation Techniques
  • Quantum Computing Algorithms and Architecture
  • Distributed and Parallel Computing Systems
  • Spine and Intervertebral Disc Pathology
  • Technology and Data Analysis
  • Scoliosis diagnosis and treatment
  • Cryptography and Residue Arithmetic
  • Cloud Computing and Resource Management
  • Security and Verification in Computing
  • Diverse Approaches in Healthcare and Education Studies
  • Text and Document Classification Technologies
  • Recommender Systems and Techniques
  • Educational Systems and Policies
  • Spam and Phishing Detection
  • Energy and Environmental Systems
  • Distributed systems and fault tolerance
  • Embedded Systems Design Techniques
  • Cryptography and Data Security
  • Real-Time Systems Scheduling
  • Quantum Information and Cryptography

Hanyang University Guri Hospital
2024-2025

Samsung (South Korea)
2006-2025

Hansung University
2020-2024

Sungkyunkwan University
2013-2023

Samsung Medical Center
2018-2023

Inha University
2004-2008

Hankuk University of Foreign Studies
2003

Grover search algorithm is the most representative quantum attack method that threatens security of symmetric key cryptography. If applied to cryptography, level target cryptography can be lowered from n-bit n2-bit. When applying Grover’s block cipher potential attacks, must implemented as circuits. Starting with AES cipher, a number works have been conducted optimize and implement ciphers into Recently, many studies published lightweight In this paper, we present optimal circuit designs...

10.3390/app11114776 article EN cc-by Applied Sciences 2021-05-23

BACKGROUND AND OBJECTIVES: Cement augmentation and hook fixation are popular prophylactic techniques against proximal junctional kyphosis (PJK) development. However, the efficacy of cement has been inconsistent conflicting. This study investigated effects in preventing PJK after adult spinal deformity surgery. METHODS: We included patients undergoing ≥7-level fusion including sacrum for deformity. The were divided into 3 groups: no-augmentation, cement, groups. was evaluated as mild...

10.1227/neu.0000000000003454 article EN Neurosurgery 2025-04-11

The advancements in quantum computing and the potential for polynomial-time solutions to traditional public key cryptography (i.e., Rivest–Shamir–Adleman (RSA) elliptic-curve (ECC)) using Shor’s algorithm pose a serious threat security of pre-quantum blockchain technologies. This paper proposes an efficient quantum-safe that incorporates new consensus algorithms. We integrate post-quantum signature schemes into blockchain’s transaction signing verification processes enhance resistance...

10.3390/app14188394 article EN cc-by Applied Sciences 2024-09-18

At 2003, the SM4 block cipher was introduced that is a Chinese domestic cryptographic. It mandated in National Standard for Wireless LAN Wired Authentication and Privacy Infrastructure (WAPI), because algorithm developed use wireless sensor networks to provide safety network environment. The uses 128-bit size 32-bit round key. consists of 32 rounds one reverse translation R. In this paper, we present optimized implementation on 8-bit AVR microcontrollers, which are widely used devices;...

10.1109/access.2022.3195217 article EN cc-by IEEE Access 2022-01-01

The TMO (time-triggered message-triggered object) model is a well-known real-time object for distributed and timeliness-guaranteed computing. We developed two execution engines, named WTMOS LTMOS, the former Windows platforms latter Linux platforms. Those are middleware engines supporting deadline driven of methods IPC. have several advantages such as heterogeneous computing support, flexibility, high portability. However, deadline-driven schedulers middlewares lose temporal accuracy in some...

10.1109/isorc.2002.1003731 article EN 2003-06-25

In this paper, we propose a quantum circuit for the SPEEDY block cipher first time and estimate its security strength based on post-quantum presented by NIST. The of symmetric key cryptography is estimated at cost Grover retrieval algorithm. Grover’s algorithm in computers reduces n-bit ciphers to n2 bits. implementation required target cipher. We resource implementing an optimized way show that provides either 128-bit (i.e., NIST level 1) or 192-bit 3) depending number rounds. Based our...

10.3390/app12146870 article EN cc-by Applied Sciences 2022-07-07

Current memory system hierarchy consists of cache memory, main and secondary storage. Each level in this has a different access speed to tolerate the long latency lower but supports large capacity as whole system. As new technologies introduce non-volatile memories powerful enough close performance gap previous generation memories, we can devise that replaces DRAM with for memory. To adopt technology, discuss file based on tmpfs three aspects need be included, evaluate its against popular...

10.1145/2513228.2513325 article EN 2013-10-01

Mission-critical embedded systems simultaneously run multiple graphics-processing-unit (GPU) computing tasks with different criticality and timeliness requirements. Considerable research effort has been dedicated to supporting the preemptive priority scheduling of GPU kernels. However, hardware-supported preemption leads lengthy delays complicated designs, most software approaches depend on voluntary yielding resources from restructured We propose a kernel scheme that harnesses idempotence...

10.1109/tc.2020.2988251 article EN IEEE Transactions on Computers 2020-04-20

Large-scale quantum computers that can execute practical algorithms have the potential to solve complex problems are currently challenging for classical computers. This involves converting these into a form be processed by circuits, crucial process requires minimizing resources like qubit count, gate and circuit depth. Our work focuses on implementing optimizing foundational task of finance, known as option pricing, circuit. enables utilization computing benefits, within financial domain....

10.1109/vlsi-soc57769.2023.10321843 article EN 2023-10-16

Modern GPUs concurrently deploy thousands of threads to maximize thread level parallelism (TLP) for performance. For some applications, however, maximized TLP leads significant performance degradation, as many concurrent compete the limited amount data cache. In this paper, we propose a compiler-assisted throttling scheme, which limits number active groups reduce cache contention and consequently improve A few dynamic schemes have been proposed alleviate by monitoring behavior, but they...

10.1145/3337821.3337886 article EN 2019-07-25

An optimized AES (Advanced Encryption Standard) implementation of Galois Counter Mode operation (GCM) on low-end microcontrollers is presented in this paper. Two optimization methods are applied to proposed implementations. First, the counter (CTR) mode speed-optimized and ensures constant timing. The main idea replacing expensive operations, including AddRound Key, SubBytes, ShiftRows, MixColumns, into simple look-up table access. Unlike previous works, does not require updates during...

10.3390/app10093131 article EN cc-by Applied Sciences 2020-04-30

According to continuous increasing of spam email, 92.6% recent total email is known email. In this research, we will show an adaptive learning system that filter emails based on user's action pattern as time goes by. paper, consider relationship between actions such what took after one and how long does it take. They analyze each has much meaning, effect filtering emails. And in turn determines weight for experimentation, compare results research weighted Bayesian classifier using real data...

10.1109/iwsca.2008.38 article EN 2008-07-01

In modern information technology systems, secure storage and transmission of personal sensitive data are recognized as important tasks. These requirements achieved through robust encryption methods. Argon2 is an advanced cryptographic algorithm that emerged the winner in Password Hashing Competition (PHC), offering a concrete measure. also provides mechanism against side-channel attacks cracking using parallel processing (e.g., GPU). this paper, we analyze existing GPU-based implementation...

10.3390/app13169295 article EN cc-by Applied Sciences 2023-08-16

The ARIA block cipher algorithm is Korean standard, IETF standard (RFC 5794), and part of the TLS/SSL protocol. In this paper, we present parallel implementation on ARMv8 processors GPU. processor latest 64-bit ARM architecture supports ASIMD for implementations. With feature, 4 16 encryption blocks are implemented to optimize substitution layer using four different Sboxes. Compared previous works, performance was improved by 2.76× 8.73× at 4-plaintext 16-plaintext cases, respectively. We...

10.3390/app122312246 article EN cc-by Applied Sciences 2022-11-30
Coming Soon ...