A Lightweight Hash-Based Blockchain Architecture for Industrial IoT B Seok, J Park, JH Park Applied Sciences 9 (18), 2019 | 128 | 2019 |
Secure D2D communication for 5G IoT network based on lightweight cryptography B Seok, JCS Sicato, T Erzhena, C Xuan, Y Pan, JH Park Applied Sciences 10 (1), 217, 2019 | 105 | 2019 |
Digital forensic investigation framework for the metaverse S Seo, B Seok, C Lee The Journal of Supercomputing 79 (9), 9467-9485, 2023 | 36 | 2023 |
Fast implementations of ARX-based lightweight block ciphers (SPARX, CHAM) on 32-bit processor B Seok, C Lee International Journal of Distributed Sensor Networks 15 (9), 2019 | 15 | 2019 |
HANMRE-An authenticated encryption secure against side-channel attacks for nonce-misuse and lightweight approaches SDP Tran, B Seok, C Lee Applied Soft Computing 97, 106663, 2020 | 10 | 2020 |
Decentralized access control for internet of things using decentralized identifiers and multi-signature smart contracts E Tcydenova, B Seok, M Cho, C Lee 2022 International Conference on Platform Technology and Service (PlatCon …, 2022 | 6 | 2022 |
Study on Remote Data Acquisition Methods Using OAuth Protocol of Android Operating System G Nam, S Gong, B Seok, C Lee Journal of the Korea Institute of Information Security & Cryptology 28 (1 …, 2018 | 4 | 2018 |
A novel approach to construct a good dataset for differential-neural cryptanalysis B Seok, D Chang, C Lee IEEE Transactions on Dependable and Secure Computing, 2024 | 3 | 2024 |
A Study on Application Method of Crypto-module for Industrial Control System B Seok, Y Kim, C Lee Journal of Digital Contents Society 18 (5), 1001-1008, 2017 | 3 | 2017 |
안드로이드 환경의 OAuth 프로토콜을 이용한 원격지 데이터 수집 방법 연구 남기훈, 공성현, 석병진, 이창훈 정보보호학회논문지 28 (1), 111-122, 2018 | 2 | 2018 |
A Security Analysis of Cryptocurrency Wallets against Password Brute-Force Attacks H Byun, J Kim, Y Jeong, B Seok, S Gong, C Lee Electronics 13 (13), 2433, 2024 | 1 | 2024 |
Adversarial Attacks on Pre-trained Deep Learning Models for Encrypted Traffic Analysis B Seok, K Shon Journal of Web Engineering 23 (6), 749-768, 2024 | | 2024 |
Truncated Differential-Neural Key Recovery Attacks on Round-Reduced HIGHT B Seok Electronics 13 (20), 4053, 2024 | | 2024 |
Analysis of Digital Forensics Artifacts Based on Deletion Methods in Mobile Wiping Applications J Kim, S Seo, B Seok, C Lee 2024 International Conference on Platform Technology and Service (PlatCon …, 2024 | | 2024 |
Related-Key Amplified Boomerang Attack on Full-Round MM-128 H Eom, B Seok, C Lee HUMAN-CENTRIC COMPUTING AND INFORMATION SCIENCES 13, 2023 | | 2023 |
Related-key Neural Distinguisher on Block Ciphers SPECK-32/64, HIGHT and GOST E Tcydenova, B Seok, C Lee Journal of Platform Technology 11 (1), 72-84, 2023 | | 2023 |
A Study on Creating WBC-AES Dummy LUT as a Countermeasure against DCA M Choi, B Seok, S Seo, C Lee Journal of the Korea Institute of Information Security & Cryptology 33 (3 …, 2023 | | 2023 |
국산 경량 블록 암호 PIPO, HIGHT, CHAM 고속 구현 연구 김인영, 석병진, 이창훈 디지털콘텐츠학회논문지 22 (12), 2063-2075, 2021 | | 2021 |
블록암호에 대한 신경망 암호해독 연구 동향 분석 B Seok, C Lee Review of KIISC 31 (6), 19-29, 2021 | | 2021 |
Analysis of DLL Hijacking Vulnerability in System Executable Files for Administrator Privileges of Windows J Bae, S Gong, B Seok, C Lee Proceedings of the Korea Information Processing Society Conference, 170-173, 2019 | | 2019 |