Sunyeop Kim

Orcid: 0000-0002-6825-7887

According to our database1, Sunyeop Kim authored at least 13 papers between 2021 and 2026.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

On csauthors.net:

Bibliography

2026
Key-Recovery Attack on 5-Round AES with Multiple-of-8 Property.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2026

Improving Neural-Inspired Integral Distinguishers via a Linear-Algebraic Approach.
IACR Cryptol. ePrint Arch., 2026

2025
Redefining Security in Shadow Cipher for IoT Nodes: New Full-Round Practical Distinguisher and the Infeasibility of Key-Recovery Attacks.
IEEE Internet Things J., March, 2025

SAECHAM: Secure and Efficient Lightweight Block Cipher CHAM Variant.
IEEE Internet Things J., 2025

MIFA: An MILP-based Framework for Improving Differential Fault Attacks.
IACR Cryptol. ePrint Arch., 2025

Towards Optimal Differential Attacks on FLY and PIPO.
IACR Cryptol. ePrint Arch., 2025

2024
Differential Factors Revisited: A Sufficient Condition for the Practical Use of Differential Factors.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024

Byte-wise equal property of ARADI.
IACR Cryptol. ePrint Arch., 2024

Revisiting the Multiple-of Property for SKINNY: The Exact Computation of the Number of Right Pairs.
IEEE Access, 2024

2023
Shining Light on the Shadow: Full-round Practical Distinguisher for Lightweight Block Cipher Shadow.
IACR Cryptol. ePrint Arch., 2023

2022
Toffoli gate count Optimized Space-Efficient Quantum Circuit for Binary Field Multiplication.
IACR Cryptol. ePrint Arch., 2022

Integral Cryptanalysis of Lightweight Block Cipher PIPO.
IEEE Access, 2022

2021
Efficient Quantum Circuit of Proth Number Modular Multiplication.
Proceedings of the Information Security and Cryptology - ICISC 2021, 2021


  Loading...