Jihoon Kwon

Orcid: 0000-0001-9093-4189

According to our database1, Jihoon Kwon authored at least 22 papers between 2015 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Enhancing Compositional Reasoning in CLIP via Reconstruction and Alignment of Text Descriptions.
CoRR, October, 2025

Can LLMs Hit Moving Targets? Tracking Evolving Signals in Corporate Disclosures.
CoRR, October, 2025

FinAgentBench: A Benchmark Dataset for Agentic Retrieval in Financial Question Answering.
CoRR, August, 2025

Structuring the Unstructured: A Multi-Agent System for Extracting and Querying Financial KPIs and Guidance.
CoRR, May, 2025

FinDER: Financial Dataset for Question Answering and Evaluating Retrieval-Augmented Generation.
CoRR, April, 2025

Bridging Language Models and Financial Analysis.
CoRR, March, 2025

Efficient Implementations of AIMer Post-Quantum Signature Scheme for Low-End to High-End IoT Devices.
IEEE Internet Things J., 2025

BOOTKITTY: A Stealthy Bootkit-Rootkit Against Modern Operating Systems.
Proceedings of the 19th USENIX WOOT Conference on Offensive Technologies, 2025

BootMarker: UEFI Bootkit Defense via Control-Flow Verification.
Proceedings of the Information Security - 28th International Conference, 2025

2024
Linq-Embed-Mistral Technical Report.
CoRR, 2024

2023
Efficient Continuous Key Agreement With Reduced Bandwidth From a Decomposable KEM.
IEEE Access, 2023

Systematization of Shuffling Countermeasures: With an Application to CRYSTALS-Dilithium.
IEEE Access, 2023

AIM: Symmetric Primitive for Shorter Signatures with Stronger Security.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2021
Single-Trace Attack on NIST Round 3 Candidate Dilithium Using Machine Learning-Based Profiling.
IEEE Access, 2021

2020
Single-Trace Attacks on Message Encoding in Lattice-Based KEMs.
IEEE Access, 2020

FPL: White-Box Secure Block Cipher Using Parallel Table Look-Ups.
Proceedings of the Topics in Cryptology - CT-RSA 2020, 2020

2019
Novel Side-Channel Attacks on Quasi-Cyclic Code-Based Cryptography.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2019

2018
Correction to: An efficient implementation of pairing-based cryptography on MSP430 processor.
J. Supercomput., 2018

An efficient implementation of pairing-based cryptography on MSP430 processor.
J. Supercomput., 2018

Efficient Isogeny Computations on Twisted Edwards Curves.
Secur. Commun. Networks, 2018

New Hybrid Method for Isogeny-based Cryptosystems using Edwards Curves.
IACR Cryptol. ePrint Arch., 2018

2015
Human Detection Using Doppler Radar Based on Physical Characteristics of Targets.
IEEE Geosci. Remote. Sens. Lett., 2015


  Loading...