Dong Kyue Kim

Orcid: 0000-0001-5614-0449

According to our database1, Dong Kyue Kim authored at least 45 papers between 1995 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Lightweight Polynomial Multiplication Accelerator for NTRU Using Shared SRAM.
IEEE Trans. Circuits Syst. II Express Briefs, December, 2023

A 325F<sup>2</sup> Physical Unclonable Function Based on Contact Failure Probability With Bit Error Rate < 0.43 ppm After Preselection With 0.0177% Discard Ratio.
IEEE J. Solid State Circuits, 2023

GPU Acceleration of Chinese Remainder Theorem for Fully Homomorphic Encryption.
Proceedings of the International Conference on Electronics, Information, and Communication, 2023

2022
Architectural Supports for Block Ciphers in a RISC CPU Core by Instruction Overloading.
IEEE Trans. Computers, 2022

Lightweight and Low-Latency AES Accelerator Using Shared SRAM.
IEEE Access, 2022

Contact PUF: Highly Stable Physical Unclonable Functions Based on Contact Failure Probability in 180 nm, 130 nm, and 28 nm CMOS Processes.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2022

2021
ECC Coprocessor Over a NIST Prime Field Using Fast Partial Montgomery Reduction.
IEEE Trans. Circuits Syst. I Regul. Pap., 2021

Secure IC with Countermeasure to Unpowered Physical Attack using On-chip Photodiode and Charge Pump.
Proceedings of the International Conference on Electronics, Information, and Communication, 2021

2020
A Physical Unclonable Function With Bit Error Rate × 10<sup>-8</sup> Based on Contact Formation Probability Without Error Correction Code.
IEEE J. Solid State Circuits, 2020

2019
Fast and Power-Analysis Resistant Ring Lizard Crypto-Processor Based on the Sparse Ternary Property.
IEEE Access, 2019

2018
Low-Complexity Elliptic Curve Cryptography Processor Based on Configurable Partial Modular Reduction Over NIST Prime Fields.
IEEE Trans. Circuits Syst. II Express Briefs, 2018

Secure circuit with optical energy harvesting against unpowered physical attacks.
Comput. Electr. Eng., 2018

2016
Secure bimodal PIN-entry method using audio signals.
Comput. Secur., 2016

2015
Hash function for 3D mesh model authentication.
Proceedings of the 21st Korea-Japan Joint Workshop on Frontiers of Computer Vision, 2015

Towards Zero Bit-Error-Rate Physical Unclonable Function: Mismatch-Based vs. Physical-Based Approaches in Standard CMOS Technology.
Proceedings of the 2015 Euromicro Conference on Digital System Design, 2015

2012
Design of security enhanced TPM chip against invasive physical attacks.
Proceedings of the 2012 IEEE International Symposium on Circuits and Systems, 2012

2011
An Efficient Architecture for a TCP Offload Engine Based on Hardware/Software Co-design.
J. Inf. Sci. Eng., 2011

Probabilistic Analysis on the Optimal Combination of Trial Division and Probabilistic Primality Tests for Safe Prime Generation.
IEICE Trans. Inf. Syst., 2011

Linear-Time Construction of Two-Dimensional Suffix Trees.
Algorithmica, 2011

2009
Improving Lookup Time Complexity of Compressed Suffix Arrays using Multi-ary Wavelet Tree.
J. Comput. Sci. Eng., 2009

Improving on-line construction of two-dimensional suffix trees for square matrices.
Inf. Process. Lett., 2009

Finding the longest common nonsuperstring in linear time.
Inf. Process. Lett., 2009

Fast Computation of Rank and Select Functions for Succinct Representation.
IEICE Trans. Inf. Syst., 2009

2008
Linearized Suffix Tree: an Efficient Index Data Structure with the Capabilities of Suffix Trees and Suffix Arrays.
Algorithmica, 2008

2007
A Simple Construction of Two-Dimensional Suffix Trees in Linear Time.
Proceedings of the Combinatorial Pattern Matching, 18th Annual Symposium, 2007

2006
Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols.
Proceedings of the Information Security Applications, 7th International Workshop, 2006

Watermarking for 3D Keyframe Animation Based on Geometry and Interpolator.
Proceedings of the Digital Watermarking, 5th International Workshop, 2006

MPEG Postprocessing System Using Edge Signal Variable Filter.
Proceedings of the Image Analysis and Recognition, Third International Conference, 2006

Chosen Message Attack Against Mukherjee-Ganguly-Chaudhuri's Message Authentication Scheme.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

2005
Constructing suffix arrays in linear time.
J. Discrete Algorithms, 2005

Efficient Hardware Implementation of Elliptic Curve Cryptography over <i>GF</i>(<i>p</i><sup><i>m</i></sup>).
Proceedings of the Information Security Applications, 6th International Workshop, 2005

Efficient Implementation of Rank and Select Functions for Succinct Representation.
Proceedings of the Experimental and Efficient Algorithms, 4th InternationalWorkshop, 2005

New Computation Paradigm for Modular Exponentiation Using a Graph Model.
Proceedings of the Stochastic Algorithms: Foundations and Applications, 2005

Probabilistic Analyses on Finding Optimal Combinations of Primality Tests in Real Applications.
Proceedings of the Information Security Practice and Experience, 2005

A New Compressed Suffix Tree Supporting Fast Search and Its Construction Algorithm Using Optimal Working Space.
Proceedings of the Combinatorial Pattern Matching, 16th Annual Symposium, 2005

Design and Implementation of Crypto Co-processor and Its Application to Security Systems.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

2004
A Fast Algorithm for Constructing Suffix Arrays for Fixed-Size Alphabets.
Proceedings of the Experimental and Efficient Algorithms, Third International Workshop, 2004

An Efficient Index Data Structure with the Capabilities of Suffix Trees and Suffix Arrays for Alphabets of Non-negligible Size.
Proceedings of the String Processing and Information Retrieval, 2004

2003
Generalizations of suffix arrays to multi-dimensional matrices.
Theor. Comput. Sci., 2003

Linear-Time Construction of Suffix Arrays.
Proceedings of the Combinatorial Pattern Matching, 14th Annual Symposium, 2003

1999
Efficient Algorithms for Approximate String Matching with Swaps.
J. Complex., 1999

Linear-Time Construction of Two-Dimensional Suffix Trees.
Proceedings of the Automata, 1999

1998
Constructing Suffix Arrays for Multi-dimensional Matrices.
Proceedings of the Combinatorial Pattern Matching, 9th Annual Symposium, 1998

1997
Efficient Algorithms for Approximate String Matching with Swaps (Extended Abstract).
Proceedings of the Combinatorial Pattern Matching, 8th Annual Symposium, 1997

1995
String Matching in Hypertext.
Proceedings of the Combinatorial Pattern Matching, 6th Annual Symposium, 1995


  Loading...