Digital Library
Search: "[ author: Seo Hwa Jeong ]" (5)
Post-Quantum Security Strength Evaluation through Implementation of Quantum Circuit for SIMECK
Song Gyeong Ju, Jang Kyung Bae, Sim Min Joo, Seo Hwa Jeong KIPS Transactions on Computer and Communication Systems,
Vol. 12, No. 6, pp. 181-188,
Jun.
2023
https://doi.org/10.3745/KTCCS.2023.12.6.181
Keywords: SIMECK Quantum Circuit, Grover algorithm, Quantum Computing, Quantum Security Strength

Keywords: SIMECK Quantum Circuit, Grover algorithm, Quantum Computing, Quantum Security Strength
Analysis of Grover Attack Cost and Post-Quantum Security Strength Evaluation for Lightweight Cipher SPARKLE SCHWAEMM
Yang Yu Jin, Jang Kyung Bae, Kim Hyun Ji, Song Gyung Ju, Lim Se Jin, Seo Hwa Jeong KIPS Transactions on Computer and Communication Systems,
Vol. 11, No. 12, pp. 453-460,
Dec.
2022
https://doi.org/10.3745/KTCCS.2022.11.12.453
Keywords: Quantum Computer, Lightweight Block cipher, SPARKLE, Grover Search Algorithm

Keywords: Quantum Computer, Lightweight Block cipher, SPARKLE, Grover Search Algorithm
Optimized Implementation of PIPO Lightweight Block Cipher on 32-bit RISC-V Processor
Eum Si Woo, Jang Kyung Bae, Song Gyeong Ju, Lee Min Woo, Seo Hwa Jeong KIPS Transactions on Computer and Communication Systems,
Vol. 11, No. 6, pp. 167-174,
Jun.
2022
https://doi.org/10.3745/KTCCS.2022.11.6.167
Keywords: PIPO, RISC-V, Lightweight Block cipher, Optimization Implementation

Keywords: PIPO, RISC-V, Lightweight Block cipher, Optimization Implementation
A Medical Staff Identification System by Using of Beacon, Iris Recognition and Blockchain
Lim Se Jin, Kwon Hyeok Dong, Seo Hwa Jeong KIPS Transactions on Computer and Communication Systems,
Vol. 10, No. 1, pp. 1-6,
Jan.
2021
https://doi.org/10.3745/KTCCS.2021.10.1.1
Keywords: Iris Recognition, Beacon, Blockchain, identity authentication

Keywords: Iris Recognition, Beacon, Blockchain, identity authentication
Implementation of Optimized 1st-Order Masking AES Algorithm Against Side-Channel-Analysis
Kim Kyung Ho, Seo Hwa Jeong KIPS Transactions on Computer and Communication Systems,
Vol. 8, No. 9, pp. 225-230,
Sep.
2019
https://doi.org/10.3745/KTCCS.2019.8.9.225
Keywords: AES, Side-Channel-Attack, Masking, Optimization

Keywords: AES, Side-Channel-Attack, Masking, Optimization
Category Search
Publications
-
Vol. 13, 2024
-
Vol. 12, 2023
- Vol. 12, No. 12 (Dec. 2023)
- Vol. 12, No. 11 (Nov. 2023)
- Vol. 12, No. 10 (Oct. 2023)
- Vol. 12, No. 9 (Sep. 2023)
- Vol. 12, No. 8 (Aug. 2023)
- Vol. 12, No. 7 (Jul. 2023)
- Vol. 12, No. 6 (Jun. 2023)
- Vol. 12, No. 5 (May. 2023)
- Vol. 12, No. 4 (Apr. 2023)
- Vol. 12, No. 3 (Mar. 2023)
- Vol. 12, No. 2 (Feb. 2023)
- Vol. 12, No. 1 (Jan. 2023)
-
Vol. 11, 2022
- Vol. 11, No. 12 (Dec. 2022)
- Vol. 11, No. 11 (Nov. 2022)
- Vol. 11, No. 10 (Oct. 2022)
- Vol. 11, No. 9 (Sep. 2022)
- Vol. 11, No. 8 (Aug. 2022)
- Vol. 11, No. 7 (Jul. 2022)
- Vol. 11, No. 6 (Jun. 2022)
- Vol. 11, No. 5 (May. 2022)
- Vol. 11, No. 4 (Apr. 2022)
- Vol. 11, No. 3 (Mar. 2022)
- Vol. 11, No. 2 (Feb. 2022)
- Vol. 11, No. 1 (Jan. 2022)
-
Vol. 10, 2021
- Vol. 10, No. 12 (Dec. 2021)
- Vol. 10, No. 11 (Nov. 2021)
- Vol. 10, No. 10 (Oct. 2021)
- Vol. 10, No. 9 (Sep. 2021)
- Vol. 10, No. 8 (Aug. 2021)
- Vol. 10, No. 7 (Jul. 2021)
- Vol. 10, No. 6 (Jun. 2021)
- Vol. 10, No. 5 (May. 2021)
- Vol. 10, No. 4 (Apr. 2021)
- Vol. 10, No. 3 (Mar. 2021)
- Vol. 10, No. 2 (Feb. 2021)
- Vol. 10, No. 1 (Jan. 2021)
-
Vol. 9, 2020
- Vol. 9, No. 12 (Dec. 2020)
- Vol. 9, No. 11 (Nov. 2020)
- Vol. 9, No. 10 (Oct. 2020)
- Vol. 9, No. 9 (Sep. 2020)
- Vol. 9, No. 8 (Aug. 2020)
- Vol. 9, No. 7 (Jul. 2020)
- Vol. 9, No. 6 (Jun. 2020)
- Vol. 9, No. 5 (May. 2020)
- Vol. 9, No. 4 (Apr. 2020)
- Vol. 9, No. 3 (Mar. 2020)
- Vol. 9, No. 2 (Feb. 2020)
- Vol. 9, No. 1 (Jan. 2020)
-
Vol. 8, 2019
- Vol. 8, No. 12 (Dec. 2019)
- Vol. 8, No. 11 (Nov. 2019)
- Vol. 8, No. 10 (Oct. 2019)
- Vol. 8, No. 9 (Sep. 2019)
- Vol. 8, No. 8 (Aug. 2019)
- Vol. 8, No. 7 (Jul. 2019)
- Vol. 8, No. 6 (Jun. 2019)
- Vol. 8, No. 5 (May. 2019)
- Vol. 8, No. 4 (Apr. 2019)
- Vol. 8, No. 3 (Mar. 2019)
- Vol. 8, No. 2 (Feb. 2019)
- Vol. 8, No. 1 (Jan. 2019)
-
Vol. 7, 2018
- Vol. 7, No. 12 (Dec. 2018)
- Vol. 7, No. 11 (Nov. 2018)
- Vol. 7, No. 10 (Oct. 2018)
- Vol. 7, No. 9 (Sep. 2018)
- Vol. 7, No. 8 (Aug. 2018)
- Vol. 7, No. 7 (Jul. 2018)
- Vol. 7, No. 6 (Jun. 2018)
- Vol. 7, No. 5 (May. 2018)
- Vol. 7, No. 4 (Apr. 2018)
- Vol. 7, No. 3 (Mar. 2018)
- Vol. 7, No. 2 (Feb. 2018)
- Vol. 7, No. 1 (Jan. 2018)
-
Vol. 6, 2017
- Vol. 6, No. 12 (Dec. 2017)
- Vol. 6, No. 11 (Nov. 2017)
- Vol. 6, No. 10 (Oct. 2017)
- Vol. 6, No. 9 (Sep. 2017)
- Vol. 6, No. 8 (Aug. 2017)
- Vol. 6, No. 7 (Jul. 2017)
- Vol. 6, No. 6 (Jun. 2017)
- Vol. 6, No. 5 (May. 2017)
- Vol. 6, No. 4 (Apr. 2017)
- Vol. 6, No. 3 (Mar. 2017)
- Vol. 6, No. 2 (Feb. 2017)
- Vol. 6, No. 1 (Jan. 2017)
-
Vol. 5, 2016
- Vol. 5, No. 12 (Dec. 2016)
- Vol. 5, No. 11 (Nov. 2016)
- Vol. 5, No. 10 (Oct. 2016)
- Vol. 5, No. 9 (Sep. 2016)
- Vol. 5, No. 8 (Aug. 2016)
- Vol. 5, No. 7 (Jul. 2016)
- Vol. 5, No. 6 (Jun. 2016)
- Vol. 5, No. 5 (May. 2016)
- Vol. 5, No. 4 (Apr. 2016)
- Vol. 5, No. 3 (Mar. 2016)
- Vol. 5, No. 2 (Feb. 2016)
- Vol. 5, No. 1 (Jan. 2016)
-
Vol. 4, 2015
- Vol. 4, No. 12 (Dec. 2015)
- Vol. 4, No. 11 (Nov. 2015)
- Vol. 4, No. 10 (Oct. 2015)
- Vol. 4, No. 9 (Sep. 2015)
- Vol. 4, No. 8 (Aug. 2015)
- Vol. 4, No. 7 (Jul. 2015)
- Vol. 4, No. 6 (Jun. 2015)
- Vol. 4, No. 5 (May. 2015)
- Vol. 4, No. 4 (Apr. 2015)
- Vol. 4, No. 3 (Mar. 2015)
- Vol. 4, No. 2 (Feb. 2015)
- Vol. 4, No. 1 (Jan. 2015)
-
Vol. 3, 2014
- Vol. 3, No. 12 (Dec. 2014)
- Vol. 3, No. 11 (Nov. 2014)
- Vol. 3, No. 10 (Oct. 2014)
- Vol. 3, No. 9 (Sep. 2014)
- Vol. 3, No. 8 (Aug. 2014)
- Vol. 3, No. 7 (Jul. 2014)
- Vol. 3, No. 6 (Jun. 2014)
- Vol. 3, No. 5 (May. 2014)
- Vol. 3, No. 4 (Apr. 2014)
- Vol. 3, No. 3 (Mar. 2014)
- Vol. 3, No. 2 (Feb. 2014)
- Vol. 3, No. 1 (Jan. 2014)
-
Vol. 2, 2013
- Vol. 2, No. 12 (Dec. 2013)
- Vol. 2, No. 11 (Nov. 2013)
- Vol. 2, No. 10 (Oct. 2013)
- Vol. 2, No. 9 (Sep. 2013)
- Vol. 2, No. 8 (Aug. 2013)
- Vol. 2, No. 7 (Jul. 2013)
- Vol. 2, No. 6 (Jun. 2013)
- Vol. 2, No. 5 (May. 2013)
- Vol. 2, No. 4 (Apr. 2013)
- Vol. 2, No. 3 (Mar. 2013)
- Vol. 2, No. 2 (Feb. 2013)
- Vol. 2, No. 1 (Jan. 2013)
-
Vol. 1, 2012
Old Journals
Indexing
All publications of KTCCS is indexed in DOI, EBSCO, Google Scholar, Crossref, and CrossCheck.
KTCCS is also selected as the Journal for Accreditation by NRF (National Research Foundation of Korea).