- User Authentication and Security Systems
- Cryptographic Implementations and Security
- Parallel Computing and Optimization Techniques
- Chaos-based Image/Signal Encryption
- Distributed and Parallel Computing Systems
- Quantum Computing Algorithms and Architecture
- Computability, Logic, AI Algorithms
- Advanced Malware Detection Techniques
Kookmin University
2024
SPHINCS <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <tex-math notation="LaTeX">$+$</tex-math> </inline-formula> was selected as one of NIST Post-Quantum Cryptography Digital Signature Algorithms (PQC-DSA). However, processes are slower compared to other PQC-DSA. When integrating it into protocols ( notation="LaTeX">$e.g.$</tex-math> , TLS and IPSec), optimization research from the server perspective becomes crucial. Therefore, we...
The increasing sensitivity of personal information has led to the widespread adoption encryption technology for unstructured files and various applications. However, this presents significant challenges law enforcement agencies tasked with gathering evidence crime investigations prosecutions. use impede forensic efforts poses difficulties, as passwords encrypted cannot be easily obtained. Consequently, there is a pressing need develop high-speed techniques cracking access critical evidence....