Yi, Okyeon
43  results:
Search for persons X
?
2

Design of Hardware Cryptographic Module-Based Authenticatio..:

, In: Lecture Notes in Electrical Engineering; Proceedings of Innovative Computing 2024, Vol. 4,
Kim, Hyeongyeop ; Wi, Hansaem ; Jang, Changuk. - p. 335-340 , 2024
 
?
4

Analysis of Radioactive Decay Based Entropy Generator in th..:

, In: Information Security Applications; Lecture Notes in Computer Science,
Kim, Taewan ; Lee, Seyoon ; Yun, Seunghwan.. - p. 277-288 , 2023
 
?
6

DIM-Based Random Number Generation Using Quantum Noise Reso..:

Wi, Hansaem ; Lee, Seyoon ; Yi, Okyeon.
Wireless Communications and Mobile Computing.  2022 (2022)  - p. 1-12 , 2022
 
?
7

Convolution Neural Network-Based Sensitive Security Paramet..:

Kim, Hyunki ; Kim, Donghyun ; Yi, Okyeon.
Wireless Communications and Mobile Computing.  2022 (2022)  - p. 1-13 , 2022
 
?
8

A Study on Scalar Multiplication Parallel Processing for X2..:

Jang, Changuk ; Han, Juhong ; Sai, Akshita Maradapu Vera Venkata...
Wireless Communications and Mobile Computing.  2022 (2022)  - p. 1-17 , 2022
 
?
9

A study on data acquisition based on the Huawei smartphone ..:

Park, Myungseo ; Lee, Sehoon ; Yi, Okyeon.
Forensic Science International: Digital Investigation.  41 (2022)  - p. 301393 , 2022
 
?
11

A methodology for the decryption of encrypted smartphone ba..:

Park, Myungseo ; Yi, Okyeon ; Kim, Jongsung
Forensic Science International: Digital Investigation.  35 (2020)  - p. 301026 , 2020
 
?
14

Cryptanalysis of hash functions based on blockciphers suita..:

Kim, Hangi ; Kim, Do-won ; Yi, Okyeon.
Multimedia Tools and Applications.  78 (2018)  3 - p. 3107-3130 , 2018
 
1-15