default search action
Dong Kyue Kim
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j22]Duhyun Jeon, Dongmin Lee, Dong Kyue Kim, Byong-Deok Choi:
A 325F2 Physical Unclonable Function Based on Contact Failure Probability With Bit Error Rate < 0.43 ppm After Preselection With 0.0177% Discard Ratio. IEEE J. Solid State Circuits 58(4): 1185-1196 (2023) - [j21]Piljoo Choi, Dong Kyue Kim:
Lightweight Polynomial Multiplication Accelerator for NTRU Using Shared SRAM. IEEE Trans. Circuits Syst. II Express Briefs 70(12): 4574-4578 (2023) - [c24]Yuri Oh, Seong-Cheon Park, Jung-Chan Na, Dong Kyue Kim:
GPU Acceleration of Chinese Remainder Theorem for Fully Homomorphic Encryption. ICEIC 2023: 1-4 - 2022
- [j20]Jaeseong Lee, Piljoo Choi, Dong Kyue Kim:
Lightweight and Low-Latency AES Accelerator Using Shared SRAM. IEEE Access 10: 30457-30464 (2022) - [j19]Piljoo Choi, Won Bae Kong, Ji-Hoon Kim, Mun-Kyu Lee, Dong Kyue Kim:
Architectural Supports for Block Ciphers in a RISC CPU Core by Instruction Overloading. IEEE Trans. Computers 71(11): 2844-2857 (2022) - [c23]Duhyun Jeon, Dongmin Lee, Dong Kyue Kim, Byong-Deok Choi:
Contact PUF: Highly Stable Physical Unclonable Functions Based on Contact Failure Probability in 180 nm, 130 nm, and 28 nm CMOS Processes. HOST 2022: 85-88 - 2021
- [j18]Piljoo Choi, Mun-Kyu Lee, Dong Kyue Kim:
ECC Coprocessor Over a NIST Prime Field Using Fast Partial Montgomery Reduction. IEEE Trans. Circuits Syst. I Regul. Pap. 68(3): 1206-1216 (2021) - [c22]Hyunwoo Heo, Donggeun You, Hyungseup Kim, Yongsu Kwon, Hyoungho Ko, Dong Kyue Kim, Byong-Deok Choi, Ji-Hoon Kim:
Secure IC with Countermeasure to Unpowered Physical Attack using On-chip Photodiode and Charge Pump. ICEIC 2021: 1-4 - 2020
- [j17]Duhyun Jeon, Jong-Hak Baek, Yong-Duck Kim, Jaeseong Lee, Dong Kyue Kim, Byong-Deok Choi:
A Physical Unclonable Function With Bit Error Rate × 10-8 Based on Contact Formation Probability Without Error Correction Code. IEEE J. Solid State Circuits 55(3): 805-816 (2020)
2010 – 2019
- 2019
- [j16]Piljoo Choi, Ji-Hoon Kim, Dong Kyue Kim:
Fast and Power-Analysis Resistant Ring Lizard Crypto-Processor Based on the Sparse Ternary Property. IEEE Access 7: 98684-98693 (2019) - 2018
- [j15]Hyungseup Kim, Youngwoon Ko, Yeongjin Mun, Byeoncheol Lee, Dong Kyue Kim, Byong-Deok Choi, Ji-Hoon Kim, Hyoungho Ko:
Secure circuit with optical energy harvesting against unpowered physical attacks. Comput. Electr. Eng. 70: 74-82 (2018) - [j14]Piljoo Choi, Mun-Kyu Lee, Ji-Hoon Kim, Dong Kyue Kim:
Low-Complexity Elliptic Curve Cryptography Processor Based on Configurable Partial Modular Reduction Over NIST Prime Fields. IEEE Trans. Circuits Syst. II Express Briefs 65-II(11): 1703-1707 (2018) - 2016
- [j13]Mun-Kyu Lee, Hyeonjin Nam, Dong Kyue Kim:
Secure bimodal PIN-entry method using audio signals. Comput. Secur. 56: 140-150 (2016) - 2015
- [c21]Duhyun Jeon, Jong-Hak Baek, Dong Kyue Kim, Byong-Deok Choi:
Towards Zero Bit-Error-Rate Physical Unclonable Function: Mismatch-Based vs. Physical-Based Approaches in Standard CMOS Technology. DSD 2015: 407-414 - [c20]Suk-Hwan Lee, Ki-Ryong Kwon, Dong Kyue Kim, Oh-Jun Kwon:
Hash function for 3D mesh model authentication. FCV 2015: 1-5 - 2012
- [c19]Piljoo Choi, Dong Kyue Kim:
Design of security enhanced TPM chip against invasive physical attacks. ISCAS 2012: 1787-1790 - 2011
- [j12]Dong Kyue Kim, Joong Chae Na, Jeong Seop Sim, Kunsoo Park:
Linear-Time Construction of Two-Dimensional Suffix Trees. Algorithmica 59(2): 269-297 (2011) - [j11]Heejin Park, Dong Kyue Kim:
Probabilistic Analysis on the Optimal Combination of Trial Division and Probabilistic Primality Tests for Safe Prime Generation. IEICE Trans. Inf. Syst. 94-D(6): 1210-1215 (2011) - [j10]Hankook Jang, Sang-Hwa Chung, Dong Kyue Kim, Yun-Sung Lee:
An Efficient Architecture for a TCP Offload Engine Based on Hardware/Software Co-design. J. Inf. Sci. Eng. 27(2): 493-509 (2011)
2000 – 2009
- 2009
- [j9]Joong Chae Na, Ji Eun Kim, Kunsoo Park, Dong Kyue Kim:
Fast Computation of Rank and Select Functions for Succinct Representation. IEICE Trans. Inf. Syst. 92-D(10): 2025-2033 (2009) - [j8]Joong Chae Na, Namhee Kim, Jeong Seop Sim, Dong Kyue Kim:
Improving on-line construction of two-dimensional suffix trees for square matrices. Inf. Process. Lett. 109(10): 504-508 (2009) - [j7]Joong Chae Na, Dong Kyue Kim, Jeong Seop Sim:
Finding the longest common nonsuperstring in linear time. Inf. Process. Lett. 109(18): 1066-1070 (2009) - [j6]Zheng Wu, Joong Chae Na, Minhwan Kim, Dong Kyue Kim:
Improving Lookup Time Complexity of Compressed Suffix Arrays using Multi-ary Wavelet Tree. J. Comput. Sci. Eng. 3(1): 1-14 (2009) - 2008
- [j5]Dong Kyue Kim, Minhwan Kim, Heejin Park:
Linearized Suffix Tree: an Efficient Index Data Structure with the Capabilities of Suffix Trees and Suffix Arrays. Algorithmica 52(3): 350-377 (2008) - 2007
- [c18]Dong Kyue Kim, Joong Chae Na, Jeong Seop Sim, Kunsoo Park:
A Simple Construction of Two-Dimensional Suffix Trees in Linear Time. CPM 2007: 352-364 - 2006
- [c17]Mun-Kyu Lee, Dowon Hong, Dong Kyue Kim:
Chosen Message Attack Against Mukherjee-Ganguly-Chaudhuri's Message Authentication Scheme. CIS 2006: 427-434 - [c16]Chan-Ho Han, Suk Hwan Lee, Seong Geun Kwon, Ki-Ryong Kwon, Dong Kyue Kim:
MPEG Postprocessing System Using Edge Signal Variable Filter. ICIAR (1) 2006: 146-155 - [c15]Suk Hwan Lee, Ki-Ryong Kwon, Dong Kyue Kim:
Watermarking for 3D Keyframe Animation Based on Geometry and Interpolator. IWDW 2006: 138-149 - [c14]Mun-Kyu Lee, Jung Ki Min, Seok Hun Kang, Sang-Hwa Chung, Howon Kim, Dong Kyue Kim:
Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols. WISA 2006: 173-186 - 2005
- [j4]Dong Kyue Kim, Jeong Seop Sim, Heejin Park, Kunsoo Park:
Constructing suffix arrays in linear time. J. Discrete Algorithms 3(2-4): 126-142 (2005) - [c13]Howon Kim, Mun-Kyu Lee, Dong Kyue Kim, Sang-Kyoon Chung, Kyoil Chung:
Design and Implementation of Crypto Co-processor and Its Application to Security Systems. CIS (2) 2005: 1104-1109 - [c12]Dong Kyue Kim, Heejin Park:
A New Compressed Suffix Tree Supporting Fast Search and Its Construction Algorithm Using Optimal Working Space. CPM 2005: 33-44 - [c11]Heejin Park, Sang-Kil Park, Ki-Ryong Kwon, Dong Kyue Kim:
Probabilistic Analyses on Finding Optimal Combinations of Primality Tests in Real Applications. ISPEC 2005: 74-84 - [c10]Chi Seong Park, Mun-Kyu Lee, Dong Kyue Kim:
New Computation Paradigm for Modular Exponentiation Using a Graph Model. SAGA 2005: 170-179 - [c9]Dong Kyue Kim, Joong Chae Na, Ji Eun Kim, Kunsoo Park:
Efficient Implementation of Rank and Select Functions for Succinct Representation. WEA 2005: 315-327 - [c8]Mun-Kyu Lee, Keon Tae Kim, Howon Kim, Dong Kyue Kim:
Efficient Hardware Implementation of Elliptic Curve Cryptography over GF(pm). WISA 2005: 207-217 - 2004
- [c7]Dong Kyue Kim, Jeong Eun Jeon, Heejin Park:
An Efficient Index Data Structure with the Capabilities of Suffix Trees and Suffix Arrays for Alphabets of Non-negligible Size. SPIRE 2004: 138-149 - [c6]Dong Kyue Kim, Junha Jo, Heejin Park:
A Fast Algorithm for Constructing Suffix Arrays for Fixed-Size Alphabets. WEA 2004: 301-314 - 2003
- [j3]Dong Kyue Kim, Yoo Ah Kim, Kunsoo Park:
Generalizations of suffix arrays to multi-dimensional matrices. Theor. Comput. Sci. 302(1-3): 223-238 (2003) - [j2]Dong Kyue Kim, Yoo Ah Kim, Kunsoo Park:
Generalizations of suffix arrays to multi-dimensional matrices. Theor. Comput. Sci. 302(1-3): 401-416 (2003) - [c5]Dong Kyue Kim, Jeong Seop Sim, Heejin Park, Kunsoo Park:
Linear-Time Construction of Suffix Arrays. CPM 2003: 186-199
1990 – 1999
- 1999
- [j1]Dong Kyue Kim, Jee-Soo Lee, Kunsoo Park, Yookun Cho:
Efficient Algorithms for Approximate String Matching with Swaps. J. Complex. 15(1): 128-147 (1999) - [c4]Dong Kyue Kim, Kunsoo Park:
Linear-Time Construction of Two-Dimensional Suffix Trees. ICALP 1999: 463-472 - 1998
- [c3]Dong Kyue Kim, Yoo Ah Kim, Kunsoo Park:
Constructing Suffix Arrays for Multi-dimensional Matrices. CPM 1998: 126-139 - 1997
- [c2]Jee-Soo Lee, Dong Kyue Kim, Kunsoo Park, Yookun Cho:
Efficient Algorithms for Approximate String Matching with Swaps (Extended Abstract). CPM 1997: 28-39 - 1995
- [c1]Kunsoo Park, Dong Kyue Kim:
String Matching in Hypertext. CPM 1995: 318-329
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:04 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint