default search action
Giyoon Kim
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j21]Yongjin Jeon, Seungjun Baek, Giyoon Kim, Jongsung Kim:
A Framework for Generating S-Box Circuits with Boyar-Peralta Algorithm-Based Heuristics, and Its Applications to AES, SNOW3G, and Saturnin. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2025(1): 586-631 (2025) - 2024
- [j20]Giyoon Kim, Soojin Kang, Uk Hur, Jongsung Kim:
A study on vulnerability of the Wickr login system in windows from a live forensics perspective. Comput. Secur. 139: 103672 (2024) - [j19]Seungjun Baek, Giyoon Kim, Jongsung Kim:
Preimage attacks on reduced-round Ascon-Xof. Des. Codes Cryptogr. 92(8): 2197-2217 (2024) - [j18]Soojin Kang, Uk Hur, Giyoon Kim, Jongsung Kim:
Forensic analysis and data decryption of tencent meeting in windows environment. Forensic Sci. Int. Digit. Investig. 51: 301818 (2024) - [j17]Seungjun Baek, Yongjin Jeon, Giyoon Kim, Jongsung Kim:
On Impossible and Truncated Distinguishers for IoT-Friendly AEAD Algorithms. IEEE Internet Things J. 11(19): 31878-31891 (2024) - [i5]Giyoon Kim, Soojin Kang, Seungjun Baek, Kimoon Kim, Jongsung Kim:
A Method for Decrypting Data Infected with Rhysida Ransomware. CoRR abs/2402.06440 (2024) - [i4]Seungjun Baek, Giyoon Kim, Jongsung Kim:
Preimage Attacks on Reduced-Round Ascon-Xof. IACR Cryptol. ePrint Arch. 2024: 371 (2024) - [i3]Yongjin Jeon, Seungjun Baek, Giyoon Kim, Jongsung Kim:
A Framework for Generating S-Box Circuits with Boyer-Peralta Algorithm-Based Heuristics, and Its Applications to AES, SNOW3G, and Saturnin. IACR Cryptol. ePrint Arch. 2024: 1996 (2024) - 2023
- [j16]Uk Hur, Giyoon Kim, Soojin Kang, Jongsung Kim:
Forensic analysis for multi-platform Cisco Webex. Forensic Sci. Int. Digit. Investig. 47: 301659 (2023) - [c2]Seungjun Baek, Giyoon Kim, Yongjin Jeon, Jongsung Kim:
Enhancing the Related-Key Security of PIPO Through New Key Schedules. ICISC (1) 2023: 3-18 - 2022
- [j15]Giyoon Kim, Yongjin Jeon, Jongsung Kim:
Speeding Up LAT: Generating a Linear Approximation Table Using a Bitsliced Implementation. IEEE Access 10: 4919-4923 (2022) - [j14]Yongjin Jeon, Seungjun Baek, Hangi Kim, Giyoon Kim, Jongsung Kim:
Differential uniformity and linearity of S-boxes by multiplicative complexity. Cryptogr. Commun. 14(4): 849-874 (2022) - [j13]Soram Kim, Giyoon Kim, Sumin Shin, Byungchul Youn, Jian Song, Insoo Lee, Jongsung Kim:
Methods for recovering deleted data from the Realm database: Case study on Minitalk and Xabber. Digit. Investig. 40(Supplement): 301353 (2022) - [j12]Sumin Shin, Giyoon Kim, Soram Kim, Jongsung Kim:
Forensic analysis of note and journal applications. Digit. Investig. 40(Supplement): 301355 (2022) - [j11]Giyoon Kim, Soram Kim, Soojin Kang, Jongsung Kim:
A method for decrypting data infected with Hive ransomware. J. Inf. Secur. Appl. 71: 103387 (2022) - [i2]Giyoon Kim, Soram Kim, Soojin Kang, Jongsung Kim:
A Method for Decrypting Data Infected with Hive Ransomware. CoRR abs/2202.08477 (2022) - 2021
- [j10]Giyoon Kim, Hangi Kim, Yeachan Heo, Yongjin Jeon, Jongsung Kim:
Generating Cryptographic S-Boxes Using the Reinforcement Learning. IEEE Access 9: 83092-83104 (2021) - [j9]Hangi Kim, Yongjin Jeon, Giyoon Kim, Jongsung Kim, Bo-Yeon Sim, Dong-Guk Han, Hwajeong Seo, Seonggyeom Kim, Seokhie Hong, Jaechul Sung, Deukjo Hong:
A New Method for Designing Lightweight S-Boxes With High Differential and Linear Branch Numbers, and its Application. IEEE Access 9: 150592-150607 (2021) - [j8]Giyoon Kim, Soram Kim, Myungseo Park, Younjai Park, Insoo Lee, Jongsung Kim:
Forensic analysis of instant messaging apps: Decrypting Wickr and private text messaging data. Digit. Investig. 37: 301138 (2021) - [j7]Uk Hur, Myungseo Park, Giyoon Kim, Younjai Park, Insoo Lee, Jongsung Kim:
Corrigendum to "Data acquisition methods using backup data decryption of sony smartphones" [Foren. Sci. Int: Digital Investigation 31 (2019) 200890]. Digit. Investig. 37: 301180 (2021) - [j6]Myungseo Park, Giyoon Kim, Younjai Park, Insoo Lee, Jongsung Kim:
Corrigendum to "Decrypting password-based encrypted backup data for Huawei smartphones" [Digital Investigation 28 (2019) 200890]. Digit. Investig. 39: 301179 (2021) - [j5]Giyoon Kim, Myungseo Park, Jongsung Kim:
A study on LG content lock and data acquisition from apps based on content lock function. Digit. Investig. 39: 301284 (2021) - [j4]Soojin Kang, Giyoon Kim, Myungseo Park, Jongsung Kim:
Methods for decrypting the data encrypted by the latest Samsung smartphone backup programs in Windows and macOS. Digit. Investig. 39: 301310 (2021) - 2020
- [j3]Giyoon Kim, Myungseo Park, Sehoon Lee, Younjai Park, Insoo Lee, Jongsung Kim:
A study on the decryption methods of telegram X and BBM-Enterprise databases in mobile and PC. Digit. Investig. 35: 300998 (2020) - [c1]Hangi Kim, Yongjin Jeon, Giyoon Kim, Jongsung Kim, Bo-Yeon Sim, Dong-Guk Han, Hwajeong Seo, Seonggyeom Kim, Seokhie Hong, Jaechul Sung, Deukjo Hong:
PIPO: A Lightweight Block Cipher with Efficient Higher-Order Masking Software Implementations. ICISC 2020: 99-122 - [i1]Hangi Kim, Yongjin Jeon, Giyoon Kim, Jongsung Kim, Bo-Yeon Sim, Dong-Guk Han, Hwajeong Seo, Seonggyeom Kim, Seokhie Hong, Jaechul Sung, Deukjo Hong:
A New Method for Designing Lightweight S-boxes with High Differential and Linear Branch Numbers, and Its Application. IACR Cryptol. ePrint Arch. 2020: 1582 (2020)
2010 – 2019
- 2019
- [j2]Myungseo Park, Giyoon Kim, Younjai Park, Insoo Lee, Jongsung Kim:
Decrypting password-based encrypted backup data for Huawei smartphones. Digit. Investig. 28(Supplement): 119-125 (2019) - [j1]Uk Hur, Myungseo Park, Giyoon Kim, Younjai Park, Insoo Lee, Jongsung Kim:
Data acquisition methods using backup data decryption of Sony smartphones. Digit. Investig. 31 (2019)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-16 23:10 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint