​
Login / Signup
Okyeon Yi
Publication Activity (10 Years)
Years Active: 2000-2023
Publications (10 Years): 9
Top Topics
Underwater Acoustic
Pseudorandom
Security Analysis
Image Encryption
Top Venues
Digit. Investig.
WISA
ICTC
Multim. Tools Appl.
</>
Publications
</>
N. Kannaiya Raja
,
E. Laxmi Lydia
,
Thumpala Archana Acharya
,
K. Radhika
,
Eunmok Yang
,
Okyeon Yi
Rider Optimization With Deep Learning Based Image Encryption for Secure Drone Communication.
IEEE Access
11 (2023)
Myungseo Park
,
Sehoon Lee
,
Okyeon Yi
,
Jongsung Kim
A study on data acquisition based on the Huawei smartphone backup protocol.
Digit. Investig.
41 (2022)
Taewan Kim
,
Seyoon Lee
,
Seunghwan Yun
,
Jongbum Kim
,
Okyeon Yi
Analysis of Radioactive Decay Based Entropy Generator in the IoT Environments.
WISA
(2022)
Myungseo Park
,
Okyeon Yi
,
Jongsung Kim
A methodology for the decryption of encrypted smartphone backup data on android platform: A case study on the latest samsung smartphone backup system.
Digit. Investig.
35 (2020)
Hyunki Kim
,
Jinhyeok Oh
,
Changuk Jang
,
Okyeon Yi
,
Juhong Han
,
Hansaem Wi
,
Chanil Park
Analysis of the Noise Source Entropy Used in OpenSSL's Random Number Generation Mechanism.
ICTC
(2019)
Hangi Kim
,
Do-Won Kim
,
Okyeon Yi
,
Jongsung Kim
Cryptanalysis of hash functions based on blockciphers suitable for IoT service platform security.
Multim. Tools Appl.
78 (3) (2019)
Hyunki Kim
,
Jae-Hoon Lee
,
Okyeon Yi
Key Managements of Underwater Acoustic Communication Environments.
WISA
(2017)
Chae-Won Yun
,
Jae-Hoon Lee
,
Okyeon Yi
,
Soo-Hyun Park
Ticket-based authentication protocol for Underwater Wireless Sensor Network.
ICUFN
(2016)
Mukhridinkhon Ibragimov
,
Jae-Hoon Lee
,
Muppalla Kalyani
,
Jung-Il Namgung
,
Soo-Hyun Park
,
Okyeon Yi
,
Changhwa Kim
,
Yong-Kon Lim
CCM-UW Security Modes for Low-band Underwater Acoustic Sensor Networks.
Wirel. Pers. Commun.
89 (2) (2016)
Ju-Sung Kang
,
Nayoung Kim
,
Wangho Ju
,
Okyeon Yi
A Security Analysis of Key Expansion Functions Using Pseudorandom Permutations.
WISTP
(2014)
Jong-Yeon Park
,
Dong-Guk Han
,
Okyeon Yi
,
Jeong-Nyeo Kim
An improved side channel attack using event information of subtraction.
J. Netw. Comput. Appl.
38 (2014)
Min-Ku Kim
,
Dong-Guk Han
,
Jeong Choon Ryoo
,
Okyeon Yi
CPA performance enhancement based on spectrogram.
ICCST
(2012)
Ju-Sung Kang
,
Okyeon Yi
,
Min-Ku Kim
,
Ku-Young Chang
Practical Multi-party Versions of Private Set Intersection Protocols with Hardware Tokens.
FGIT-FGCN/DCA
(2012)
Jong-Yeon Park
,
Okyeon Yi
,
Dong-Guk Han
,
Dooho Choi
Ghost key patterns with Equidistant Chosen Message attack on RSA-CRT.
ICCST
(2011)
Ju-Sung Kang
,
Okyeon Yi
On Distinguished Points Method to Implement a Parallel Collision Search Attack on ECDLP.
FGIT-SecTech/DRBC
(2010)
Jong-Yeon Park
,
Ji-Sun Choi
,
Okyeon Yi
Methods for practical whitebox cryptography.
ICTC
(2010)
Sun-Hee Lim
,
Seunghwan Yun
,
Jongin Lim
,
Okyeon Yi
Formalizing the design, evaluation, and analysis of quality of protection in wireless networks.
J. Commun. Networks
11 (6) (2009)
Daesung Moon
,
Sungju Lee
,
Seunghwan Jung
,
Yongwha Chung
,
Miae Park
,
Okyeon Yi
Fingerprint Template Protection Using Fuzzy Vault.
ICCSA (3)
(2007)
Sun-Hee Lim
,
Okyeon Yi
,
Chang-Hoon Jung
,
Ki-Seok Bang
A Fast and Efficient Authentication Protocol for a Seamless Handover between a WLAN and WiBro.
COMSWARE
(2007)
Sun-Hee Lim
,
Ki-Seok Bang
,
Okyeon Yi
,
Jongin Lim
A Secure Handover Protocol Design in Wireless Networks with Formal Verification.
WWIC
(2007)
Deukjo Hong
,
Seokhie Hong
,
Wonil Lee
,
Sangjin Lee
,
Jongin Lim
,
Jaechul Sung
,
Okyeon Yi
Known-IV, Known-in-Advance-IV, and Replayed-and-Known-IV Attacks on Multiple Modes of Operation of Block Ciphers.
J. Cryptol.
19 (4) (2006)
Daesung Moon
,
Sungju Lee
,
Seunghwan Jung
,
Yongwha Chung
,
Okyeon Yi
,
Namil Lee
,
Kiyoung Moon
Privacy-Enhancing Fingerprint Authentication Using Cancelable Templates with Passwords.
WISA
(2006)
Jaechul Sung
,
Sangjin Lee
,
Jong In Lim
,
Wonil Lee
,
Okyeon Yi
Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation.
ICISC
(2001)
Deukjo Hong
,
Jaechul Sung
,
Seokhie Hong
,
Wonil Lee
,
Sangjin Lee
,
Jongin Lim
,
Okyeon Yi
Known-IV Attacks on Triple Modes of Operation of Block Ciphers.
ASIACRYPT
(2001)
Ju-Sung Kang
,
Sang-Uk Shin
,
Dowon Hong
,
Okyeon Yi
Provable Security of KASUMI and 3GPP Encryption Mode f8.
ASIACRYPT
(2001)
Ju-Sung Kang
,
Okyeon Yi
,
Dowon Hong
,
Hyun Sook Cho
Pseudorandomness of MISTY-Type Transformations and the Block Cipher KASUMI.
ACISP
(2001)
Heajoung Yoo
,
Seokhie Hong
,
Sangjin Lee
,
Jong In Lim
,
Okyeon Yi
,
Maenghee Sung
A Proposal of a New Public Key Cryptosystem Using Matrices over a Ring.
ACISP
(2000)