Jinkeon Kang

ORCID: 0000-0003-2142-8236
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptographic Implementations and Security
  • Chaos-based Image/Signal Encryption
  • Coding theory and cryptography
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Cryptography and Data Security
  • Advanced Neural Network Applications
  • Video Surveillance and Tracking Methods
  • Autonomous Vehicle Technology and Safety
  • DNA and Biological Computing
  • Privacy-Preserving Technologies in Data
  • Cloud Data Security Solutions
  • Advanced Authentication Protocols Security
  • Advanced Malware Detection Techniques
  • Digital Rights Management and Security
  • Internet Traffic Analysis and Secure E-voting

National Institute of Standards
2021-2024

National Institute of Standards and Technology
2021-2024

Information Technology Laboratory
2021

Indraprastha Institute of Information Technology Delhi
2016-2020

Indian Institute of Technology Delhi
2020

Korea University
2009-2019

Autonomous driving is becoming one of the leading industrial research areas. Therefore many automobile companies are coming up with semi to fully autonomous solutions. Among these solutions, lane detection vital driver-assist features that play a crucial role in decision-making process vehicle. A variety solutions have been proposed detect lanes on road, which ranges from using hand-crafted state-of-the-art end-to-end trainable deep learning architectures. Most architectures trained traffic...

10.23919/iccas47443.2019.8971488 article EN 2019-10-01

Ascon family is one of the finalists National Institute Standards and Technology (NIST) lightweight cryptography standardization process. The includes three Authenticated Encryption with Associated Data (AEAD) schemes: Ascon-128 (primary), Ascon-128a, Ascon-80pq. In this paper, we study resistance against conditional cube attacks in nonce-misuse setting, present new state- key-recovery attacks. Our recover full state secret key Ascon-128a when reduced to 7 out 8 rounds Ascon-permutation for...

10.1109/access.2022.3223991 article EN cc-by IEEE Access 2022-11-21

MD-64 is a 64-bit block cipher with 128-bit secret key and based on data-dependent operations for the fast hardware performance. suitable to applications in resource constrained environments such as wireless sensor networks. In this paper, we propose related-key amplified boomerang attack full-round MD-64. Our requires 2 <sup xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">95</sup> encryptions xmlns:xlink="http://www.w3.org/1999/xlink">43.1</sup>...

10.1109/waina.2012.52 article EN 2012-03-01

At AES’00, a collision attack on 7-round reduced AES was proposed. In this paper, we apply idea to seven SPN block ciphers, AES-192/256, Crypton-192/256, mCrypton-96/128, and Anubis. Applying our attacks improve the result based meet-in-the-middle (AES-192) proposed in AES’00 (AES-256), respectively. Our Anubis is superior known cryptanalytic it. cases of Crypton-192/256 are applicable 8-round versions. The results mCrypton-96/128 more practical than them.

10.1155/2013/713673 article EN cc-by Journal of Applied Mathematics 2013-01-01

10.1587/transfun.2024eap1001 article EN IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences 2024-01-01

64-비트 블록 암호 KT-64는 CSPNs (Controlled Substitution-Permutation Networks)를 사용하여 FPGA와 같은 하드웨어 구현에 적합하도록 설계된 암호이다. 본 논문에서는 KT-64의 전체 라운드에 대한 확장된 연관키 부메랑 공격을 제안한다. 논문에서 소개하는 공격은 KT-64에 최초의 공격이며, <TEX>$2^{45.5}$</TEX>개의 선택 평문을 이용하여 <TEX>$2^{65.17}$</TEX>의 KT-64 암호화 연산을 수행하여 비밀키를 복구한다. is a 64-bit block cipher which use suitable for the efficient FPGA implementation. In this paper, we propose related-key amplified boomerang attack on full-round KT-64. The requires <TEX>$2^{45.5}$</TEX> chosen...

10.3745/kipstc.2012.19c.1.055 article EN The KIPS Transactions PartC 2012-02-29

A technique of authenticated encryption for memory constrained devices called sp-AELM was proposed by Agrawal et al. at ACISP 2015. The sp-ALEM construction utilizes a sponge-based primitive to support online and decryption functionalities. Online in the is achieved standard manner processing plaintext blocks as they arrive produce ciphertext blocks. However, storing only one intermediate state releasing it user upon correct verification. This allows legitimate generate herself. scheme...

10.3390/cryptography2040037 article EN cc-by Cryptography 2018-12-04

Autonomous driving is becoming one of the leading industrial research areas. Therefore many automobile companies are coming up with semi to fully autonomous solutions. Among these solutions, lane detection vital driver-assist features that play a crucial role in decision-making process vehicle. A variety solutions have been proposed detect lanes on road, which ranges from using hand-crafted state-of-the-art end-to-end trainable deep learning architectures. Most architectures trained traffic...

10.48550/arxiv.2001.00236 preprint EN cc-by-nc-sa arXiv (Cornell University) 2020-01-01

In Conference on Cryptographic Hardware and Embedded System 2017, Bernstein et al. proposed GIMLI, a 384-bit permutation with 24 rounds, which aims to provide high performance various platforms. 2019, the full-round (24 rounds) GIMLI was used as an underlying primitive for building AEAD GIMLI-CIPHER hash function GIMLI-HASH, were submitted NIST Lightweight Cryptography Standardisation process selected one of second-round candidates. Transactions Symmetric Cryptology 2021, Liu presented...

10.1049/ise2.12060 article EN cc-by-nc-nd IET Information Security 2022-03-22
Coming Soon ...