Joo Yeon Cho

Orcid: 0000-0003-0351-0885

According to our database1, Joo Yeon Cho authored at least 29 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Quantum-Resistant MACsec and IPsec for Virtual Private Networks.
Proceedings of the Security Standardisation Research - 8th International Conference, 2023

2022
Machine-learning-based anomaly detection in optical fiber monitoring.
JOCN, 2022

ML-based Anomaly Detection in Optical Fiber Monitoring.
CoRR, 2022

DeepALM: Holistic Optical Network Monitoring based on Machine Learning.
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2022

2021
Using QKD in MACsec for secure Ethernet networks.
IET Quantum Commun., September, 2021

Post-quantum MACsec in Ethernet Networks.
J. Cyber Secur. Mobil., 2021

Demonstration of Software-defined Key Management for Quantum Key Distribution Network.
Proceedings of the Optical Fiber Communications Conference and Exhibition, 2021

Secure Collaborative Learning for Predictive Maintenance in Optical Networks.
Proceedings of the Secure IT Systems - 26th Nordic Conference, NordSec 2021, Virtual Event, 2021

Secure Open Fronthaul Interface for 5G Networks.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Securing Ethernet-based Optical Fronthaul for 5G Network.
J. Cyber Secur. Mobil., 2020

TLV-to-MUC Express: Post-quantum MACsec in VXLAN.
Proceedings of the Secure IT Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, 2020

Demonstration of Flexible and Scalable Quantum-resistant Encryption with Threshold Key Management in Optical Networks.
Proceedings of the European Conference on Optical Communications, 2020

Post-quantum MACsec key agreement for ethernet networks.
Proceedings of the ARES 2020: The 15th International Conference on Availability, 2020

2019
Multidimensional Linear Cryptanalysis.
J. Cryptol., 2019

Securing Optical Networks by Modern Cryptographic Techniques.
Proceedings of the Secure IT Systems, 2019

2018
Automatic Intent-Based Secure Service Creation Through a Multilayer SDN Network Orchestration.
JOCN, 2018

Practical Authentication and Access Control for Software-Defined Networking over Optical Networks.
Proceedings of the 2018 Workshop on Security in Softwarized Networks: Prospects and Challenges, 2018

2009
Linear Cryptanalysis of Reduced-Round PRESENT.
IACR Cryptol. ePrint Arch., 2009

Improved Linear Cryptanalysis of SOSEMANUK.
Proceedings of the Information, Security and Cryptology, 2009

Multidimensional Extension of Matsui's Algorithm 2.
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009

Statistical Tests for Key Recovery Using Multidimensional Extension of Matsui's Algorithm 1.
Proceedings of the Symmetric Cryptography, 11.01. - 16.01.2009, 2009

2008
A New Technique for Multidimensional Linear Cryptanalysis with Applications on Reduced Round Serpent.
Proceedings of the Information Security and Cryptology, 2008

Multidimensional Linear Cryptanalysis of Reduced Round Serpent.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008

2007
An Improved Distinguisher for Dragon.
IACR Cryptol. ePrint Arch., 2007

Multiple Modular Additions and Crossword Puzzle Attack on NLSv2.
IACR Cryptol. ePrint Arch., 2007

2006
Crossword Puzzle Attack on NLS.
IACR Cryptol. ePrint Arch., 2006

Formal analysis of card-based payment systems in mobile devices.
Proceedings of the proceedings of the Fourth Australasian Symposium on Grid Computing and e-Research (AusGrid 2006) and the Fourth Australasian Information Security Workshop (Network Security) (AISW 2006), 2006

Distinguishing Attack on SOBER-128 with Linear Masking.
Proceedings of the Information Security and Privacy, 11th Australasian Conference, 2006

2004
Algebraic Attacks on SOBER-t32 and SOBER-t16 without Stuttering.
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004


  Loading...