Giyoon Kim

According to our database1, Giyoon Kim authored at least 20 papers between 2019 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Preimage Attacks on Reduced-Round Ascon-Xof.
IACR Cryptol. ePrint Arch., 2024

A Method for Decrypting Data Infected with Rhysida Ransomware.
CoRR, 2024

2023
Forensic analysis for multi-platform Cisco Webex.
Forensic Sci. Int. Digit. Investig., December, 2023

Enhancing the Related-Key Security of PIPO Through New Key Schedules.
Proceedings of the Information Security and Cryptology - ICISC 2023, 2023

2022
A method for decrypting data infected with Hive ransomware.
J. Inf. Secur. Appl., 2022

Forensic analysis of note and journal applications.
Digit. Investig., 2022

Methods for recovering deleted data from the Realm database: Case study on Minitalk and Xabber.
Digit. Investig., 2022

Differential uniformity and linearity of S-boxes by multiplicative complexity.
Cryptogr. Commun., 2022

Speeding Up LAT: Generating a Linear Approximation Table Using a Bitsliced Implementation.
IEEE Access, 2022

2021
Corrigendum to "Decrypting password-based encrypted backup data for Huawei smartphones" [Digital Investigation 28 (2019) 200890].
Digit. Investig., 2021

A study on LG content lock and data acquisition from apps based on content lock function.
Digit. Investig., 2021

Forensic analysis of instant messaging apps: Decrypting Wickr and private text messaging data.
Digit. Investig., 2021

Methods for decrypting the data encrypted by the latest Samsung smartphone backup programs in Windows and macOS.
Digit. Investig., 2021

Corrigendum to "Data acquisition methods using backup data decryption of sony smartphones" [Foren. Sci. Int: Digital Investigation 31 (2019) 200890].
Digit. Investig., 2021

Generating Cryptographic S-Boxes Using the Reinforcement Learning.
IEEE Access, 2021

A New Method for Designing Lightweight S-Boxes With High Differential and Linear Branch Numbers, and its Application.
IEEE Access, 2021

2020
A study on the decryption methods of telegram X and BBM-Enterprise databases in mobile and PC.
Digit. Investig., 2020

PIPO: A Lightweight Block Cipher with Efficient Higher-Order Masking Software Implementations.
Proceedings of the Information Security and Cryptology - ICISC 2020, 2020

2019
Decrypting password-based encrypted backup data for Huawei smartphones.
Digit. Investig., 2019

Data acquisition methods using backup data decryption of Sony smartphones.
Digit. Investig., 2019


  Loading...