PUBLICATIONS
International Publications

▶ Journal

  • P. Choi and D. K. Kim, "Lightweight Polynomial Multiplication Accelerator for NTRU Using Shared SRAM," in IEEE Transactions on Circuits and Systems II: Express Briefs, vol. 70, no. 12, pp. 4574-4578, Dec. 2023
  • Y. Oh, S. -C. Park, J. -C. Na and D. K. Kim, "GPU Acceleration of Chinese Remainder Theorem for Fully Homomorphic Encryption," 2023 International Conference on Electronics, Information, and Communication (ICEIC), Singapore, 2023, pp. 1-4
  • D. Jeon, D. Lee, D. K. Kim and B. -D. Choi, "A 325F2 Physical Unclonable Function Based on Contact Failure Probability With Bit Error Rate < 0.43 ppm After Preselection With 0.0177% Discard Ratio," in IEEE Journal of Solid-State Circuits, vol. 58, no. 4, pp. 1185-1196, April 2023
  • D. Jeon, D. Lee, D. K. Kim and B. -D. Choi, "Contact PUF: Highly Stable Physical Unclonable Functions Based on Contact Failure Probability in 180 nm, 130 nm, and 28 nm CMOS Processes," 2022 IEEE International Symposium on Hardware Oriented Security and Trust (HOST), McLean, VA, USA, 2022, pp. 85-88
  • J. S. Lee, P. Choi and D. K. Kim, "Lightweight and Low-Latency AES Accelerator Using Shared SRAM," in IEEE Access, vol. 10, pp. 30457-30464, 2022
  • P. Choi, W. Kong, J. . -H. Kim, M. . -K. Lee and D. K. Kim, "Architectural Supports for Block Ciphers in a RISC CPU Core by Instruction Overloading," in IEEE Transactions on Computers, vol. 71, no. 11, pp. 2844-2857, 1 Nov. 2022
  • H. Heo, D. You, H. Kim, Y. Kwon, H. Ko, D. K. Kim, B. -D. Choi and J. -H. Kim , "Secure IC with Countermeasure to Unpowered Physical Attack using On-chip Photodiode and Charge Pump," 2021 International Conference on Electronics, Information, and Communication (ICEIC), Jeju, Korea (South), 2021
  • P. Choi, M. -K. Lee and D. K. Kim, "ECC Coprocessor Over a NIST Prime Field Using Fast Partial Montgomery Reduction," in IEEE Transactions on Circuits and Systems I: Regular Papers, vol. 68, no. 3, pp. 1206-1216, March 2021
  • D. Jeon, J. H. Baek, Y. -D. Kim, J. Lee, D. K. Kim and B. -D. Choi, "A Physical Unclonable Function With Bit Error Rate < 2.3 $\times$ 10−8 Based on Contact Formation Probability Without Error Correction Code," in IEEE Journal of Solid-State Circuits, vol. 55, no. 3, pp. 805-816, March 2020
  • Wonbae Gong, Piljoo Choi, and Dong Kyue Kim, "Hardware Implementation of Lightweight Block Ciphers for IoT Sensors." JOURNAL OF SEMICONDUCTOR TECHNOLOGY AND SCIENCE 20.4 (2020): 381-389.
  • Won Bae Kong, Pil Joo Choi, and Dong Kyue Kim, "Security SoC Architecture with Hardware-Based Pre-Authentication.", IDEC Journal of Integrated Circuits and Systems, Vol.5 No.4 October 2019, 2019.
  • Piljoo Choi, Ji-Hoon Kim, and Dong Kyue Kim, "Fast and Power-Analysis Resistant Ring Lizard Crypto-Processor Based on the Sparse Ternary Property." IEEE Access 7, pp. 98684-98693, 2019.
  • Piljoo Choi, Ji-Hoon Kim, and Dong Kyue Kim, "Improving Ring-oscillator-based True Random Number Generators using Multiple Sampling." Journal of Semiconductor Technology and Science 19.3, pp.305-309, 2019.
  • Ryang Ki, Sung Ha Lee, and Dong Kyue Kim, “Dependent Attack Effects on HEAVENS for Automotive Cybersecurity Model”, IEEE/IEIE ICCE-Asia, pp.450-451, 2018.
  • Hyungseup Kim, Youngwoon Ko, Yeongjin Mun, Byeoncheol Lee, Byong-Deok Choi, Ji-Hoon Kim, Hyoungho Ko and Dong Kyue Kim, "Secure circuit with optical energy harvesting against unpowered physical attacks," Journal of Computers and Electrical Engineering, vol. 70, pp. 74-82, 2018
  • Piljoo choi, Mun-Kyu Lee, Ji-Hoon Kim and Dong Kyue Kim, "Low-Complexity Elliptic Curve Cryptography Processor based on Configurable Partial Modular Reduction over NIST Prime Fields," IEEE Transactions on Circuits and Systems II: Express Briefs, 2017.
  • Piljoo Choi, Mun-Kyu Lee, Jeong-Taek Kong and Dong Kyue Kim, "Efficient Design and Performance Analysis of a Hardware Right-Shift Binary Modular Inversion Algorithm in GF(p) ," Journal of Semiconductor Technology and Science (JSTS), vol. 17, no. 3, pp. 425-437, 2017.
  • Piljoo Choi, Mun-Kyu Lee and Dong Kyue Kim, "Fast Compact True Random Number Generator based on Multiple Sampling," Electronics Letters, vol. 53, no. 13, pp. 841-843, 2017.
  • Mun-Kyu Lee, Hyeonjin Nam and Dong Kyue Kim, "Secure bimodal PIN-entry method using audio signals," Computers & Security, vol. 56, pp. 140-150, 2016.
  • Dong Kyue Kim, Piljoo Choi, Mun-Kyu Lee and Heejin Park, "Design and Analysis of Efficient Parallel Hardware Prime Generators," JSTS(Journal of Semiconductor Technology and Science), vol. 16, no. 5, pp. 564-581, 2016.
  • T.W.Kim, B.D. Choi and Dong Kyue Kim, "Zero bit error rate ID generation circuit using via formation probability in 0.18 μm CMOS process," ELECTRONICS LETTERS 5th June 2014, vol. 50, no. 12, pp. 876–877 (SCI), 2014.
  • Jae Seong Lee, Piljoo Choi, Song-Ju Kim, Byong-Deok Choi and Dong Kyue Kim, "Built-in hardware pseudo-random test module for physical unclonable functions," Nonlinear Theory and Its Applications, IEICE, vol. 5, no. 2, pp. 101-112, 2014.
  • H. -J. Ju, K. -C. Ko and D. -K. Kim, "Optimization of a grounded electrode shape in gas insulated switchgear with a reversely elliptical permittivity graded insulator," in IEEE Transactions on Dielectrics and Electrical Insulation, vol. 20, no. 5, pp. 1749-1754, Oct. 2013
  • Heejin Park and Dong Kyue Kim, "Probabilistic Analysis on the Optimal Combination of Trial Division and Probabilistic Primality Tests for Safe Prime Generation," IEICE Transaction on Information and Systems vol. E94-D no. 6 pp. 1210-1215 (SCIE), 2011.
  • Sung-Jae Lee, Jae Seong Lee, Mun-Kye Lee, Sang Jin Lee, Doo-Ho Choi and Dong Kyue Kim, "Low-power Design of Hardware One-Time-Password Generators for Card-type OTPs," ETRI Journal,2011 vol. 33 no. 4 pp. 611-620, 2011.
  • Byong-Deok Choi, Tae-Wook Kim, Mun-Kyu Lee, Ki-Seok Chung and Dong Kyue Kim, "Integrated circuit design for physical unclonable function using differential amplifiers," Analog Integrated Circuits and Signal Processing, Volume 66, Issue 3 (2011), Page 467-474 (SCI), 2011.
  • Hankook Jang, Sang-Hwa Chung, Dong Kyue Kim and Yun-Sung Lee, "An Efficient Architecture for a TCP Offload Engine Based on Hardware/Software Co-design," Journal of Infomation Science and Engineering, vol. 27, no. 2, pp. 493-509 (SCIE), 2011.
  • Dong Kyue Kim, Joong Chae Na, Jeong Seop Sim and Kunsoo Park, "Linear-Time Construction of Two-Dimensional Suffix Trees," Algorithmica, Volume 59 , Number 2 (February 2011), pp. 269-297 (SCI), 2011.
  • Byong-Deok Choi, Kyung Eun Kim, Ki-Seok Chung and Dong Kyue Kim, "Symmetric Adiabatic Logic Circuits against Differential Power Analysis Attacks," ETRI Journal, vol. 32, no. 1, Feb. 2010 pp. 166-168, 2010.
  • Joong Chae Na, Ji Eun Kim, Kunsoo Park and Dong Kyue Kim, "Fast Computation of Rank and Select Functions for Succinct Representation," IEICE Transaction on Information and Systems E92.D, no. 10 pp. 2025-2033, 2009.
  • Joong Chae Na, Dong Kyue Kim and Jeong Seop Sim, "Finding the longest common nonsuperstring in linear time," IPL(Information Processing Letters) vol. 109, Issue. 18, pp. 1066-1070, 2009.
  • Joong Chae Na, Nam hee Kim, Jeong Seop Sim and Dong Kyue Kim, "Improving On-line Construction of Two-Dimensional Suffix Trees for Square Matrices," IPL(Information Processing Letters), vol. 109, Issue.10, pp. 504-508, 2009.
  • Dong Kyue Kim, Minhwan Kim and Heejin Park, "Linearized Suffix Tree: An Efficient Index Data Structure with the Capabilities of Suffix," Algorithmica, Volume 52 , Issue 3 (October 2008), pp. 350-377, 2008.
  • Dong Kyue Kim, Mun-Kyu Lee, You Sung Kang, Sang-Hwa Chung, Won-Ju Yoon, Jung Ki Min and Howon Kim, "Design and Performance Analysis of Electronic Seal Protection Systems Based on AES," ETRI Journal, vol. 29, no. 6, 755-768(ISSN 1225-64636), 2007.
  • Dong Kyue Kim, Joong Chae Na, Jeong Seop Sim and Kunsoo Park, "A Simple Construction of Two-Dimensional Suffix Trees in Linear Time," LNCS(Lecture Notes in Computer Science), vol. 4580, pp. 352-364, 2007.
  • Mun-Kyu Lee, Dowon Hong and Dong Kyue Kim, "Chosen Message Attack Against Mukherjee-Ganguly-Chaudhuri's Message Authentication Scheme," LNAI(Lecture Notes in Artificial Intelligence), vol. 4456, pp. 427-434, 2006.
  • Mun-Kyu Lee, Jung Ki Min, Seok Hun Kang, Sang-Hwa Chung, Howon Kim and Dong Kyue Kim, "Efficient Implementation of Pseudorandom Functions for Electronic Seal Protection Protocols," LNCS(Lecture Notes in Computer Science), vol. 4298, pp. 173-186, 2006.
  • Suk-Hwan Lee, Ki-Ryong Kwon and Dong Kyue Kim, "Watermarking for 3D Keyframe Animation Based on Geometry and Interpolator," LNCS(Lecture Notes in Computer Science), vol. 4283, pp. 138-149, 2006.
  • Chan-Ho Han, Suk-Hwan Lee, Seong-Geun Kwon, Ki-Ryong Kwon and Dong Kyue Kim, "MPEG Postprocessing System Using Edge Signal Variable Filter," LNCS(Lecture Notes in Computer Science), vol. 4141, pp. 146-155, 2006.

▶ Conference

  • Sung Ha Lee, Won Bae Kong, Ga Yeon Kim and Dong Kyue Kim, "Performance Comparison of SM4 and AES Hardware Modules," ITC-CSCC, pp. 174-176, 2017.
  • Jae Seong Lee, Piljoo Choi, Sangjun Oh and Dong Kyue Kim, "Design and Analysis of Efficient True Random Number Generator," KJCCS'16 - K2, 2016.
  • Piljoo Choi, Hyun Il Kim, Ryang Ki and Dong Kyue Kim, "High Speed WAVE Security Chip," IDEC Journal of Integrated Circuits And Systems(JICAS), vol. 3, no. 2, April 2017.
  • 최필주, 김동규, "Analysis of Hardware True Random Number Generator based on Ring Oscillator," 5th Japan-Korea Joint Workshop on Complex Communication Sciences (JKCCS), 2016.
  • Piljoo Choi and Dong Kyue Kim, "Analysis model for automotive security systems with regard to functional safety," KJCCS'16 - K1, 2016.
  • Wonbae Gong*, Piljoo Choi*, Byung Chul Kim** and Dong Kyue Kim*, "Analysis of Masking Effects on DPA Countermeasure for Lightweight Cryptographic Algorithms," ISOCC 2015 - PS47, 2015.
  • Pil Joo Choi, Hyun Il Kim and Dong Kyue Kim, "AMI Authentication Method based on Hardware," ISOCC 2015 - PS60, 2015.
  • Piljoo Choi, Jeong-Taek Kong and Dong Kyue Kim, "Analysis of Hardware Modular Inversion Modules for ECC," ISOCC 2015 - PS46, 2015.
  • 전두현, 백종학, 김동규, 최병덕, "Toward Zero Bit-Error-Rate Physical Unclonable Function: Mismatch-Based vs. Physical-Based Approaches in Standard CMOS Technology," Digital System Design(DSD), 2015.
  • 최필주, 이성하, 김동규, "Design on Efficient Modular inversion module using Resource Sharing," The 11th International conference on Multimedia Information Technology and Applications, pp. 298-299, 2015.
  • 조준환, 최필주, 김동규, "Analysis of Vulnerabilities for Collision Avoidance System (CAS)," The 11th International conference on Multimedia Information Technology and Applications, pp. 403-404, 2015.
  • 이재성, 김동규, "DPA analysis of an AES hardware module with a switched capacitor current," 2nd Korea-Japan Joint Workshop on Complex Communication Sciences, 2013.
  • 최필주, 김동규, "Implementation and analysis of the hardware-optimized prime generator," 2nd Korea-Japan Joint Workshop on Complex Communication Sciences, 2013.
  • Piljoo Choi and Dong Kyue Kim, "Performance Analysis of AES Hardware Modules with Parallel Implementation of S-boxes," Conference Proceedings MITA 2012, pp. 384, 2012.
  • Jin Young Lim, Piljoo Choi and Dong Kyue Kim, "Performance Analysis of the RSA Algorithm in Smart Grid Devices," Conference Proceedings MITA 2012, pp. 305, 2012.
  • Dae young Kim, Piljoo Choi and Dong Kyue Kim, "Performance Analysis of Elliptic Curve Cryptographic Algorithms in Smart Grid Devices," Conference Proceedings MITA 2012, pp. 306, 2012.
  • Piljoo Choi and Dong Kyue Kim, "Design of Security Enhanced TPM Chip against Invasive Physical Attacks," ISCAS2012, pp. 1787-1790, 2012.
  • Ji Hyuk Lim and Dong Kyue Kim, "Performance Analysis of Fermi GPU Architecture," Conference Proceedings MITA 2011, pp. 146-147, 2011.
  • Jae Seong Lee, Jun Hwan Jo and Dong Kyue Kim, "Energy Consumption Analysis of the Inner Data Bus for AES Hardware Modules," Conference Proceedings MITA 2011, pp. 3-5, 2011.
  • Piljoo Choi, Seung Ho Chung and Dong Kyue Kim, "Montgomery Multiplication Hardware Module with Combined Pre-computation Module," Conference Proceedings MITA 2011, pp. 6-7, 2011.
  • Jae Seong Lee, Yongmin Kim and Dong Kyue Kim, "S-box Hiding Methods for AES Hardware Modules against Differential Power Analysis based on Composite Fields," 2010 IEEE International Conference on Network Infrastructure and Digital Contents(IC-NIDC 2010) Proceedings, pp. 778-782, 2010.
  • Yongmin Kim, Jae Seong Lee and Dong Kyue Kim, "Countermeasure Techniques for SEED Hardware Modules against Differential Power Analysis," 2010 IEEE International Conference on Network Infrastructure and Digital Contents(IC-NIDC 2010) Proceedings, pp. 763-767, 2010.
  • Jae Seong Lee and Dong Kyue Kim, "Performance analysis of hardware modules of the hash function "ARIRANG"," 2009 IEEE International Conference on Network Infrastructure and Digital Contents(IC-NIDC 2009) Proceedings, pp. 1056-1060, 2009.
  • Sunho Lee and Dong Kyue Kim, "Efficient multiple pattern matching algorithms for network intrusion detection system," 2009 IEEE International Conference on Network Infrastructure and Digital Contents(IC-NIDC 2009) Proceedings, pp. 609-613, 2009.
  • Eung Jun Kim, Jae Sung Lee and Dong Kyue Kim, "An Architecture Information Assurance Model for TICN(Tactical Information Communication Network)," Conference Proceedings MITA, 2009, pp. 289-292, 2009.
  • Kyung Eun Kim, Byong-Deok Choi and Dong Kyue Kim, "Delayed-input Differential Power Analysis of Symmetric Discharge Logic," Conference Proceedings MITA, 2009, pp. 252-255, 2009.
  • Jae Seong Lee, and Dong Kyue Kim, "Compact Hardware Chip Implementation of NTRU," Conference Proceedings MITA, 2009, pp. 285-288, 2009.
  • Joong Chae Na, Namhee Kim, Jeong Seop Sim and Dong Kyue Kim, "Randomized Linear-Time On-line Construction of Two-Dimensional Suffix Trees," The 11th JAPAN-KOREA Joint Workshop on Algorithms and Computation, pp. 51-58, 2008.
  • Jae Seong Lee, Tae Gu Lee, Mun-Kyu Lee, Byong-Deok Choi and Dong Kyue Kim, "Performance Evaluation of High-Throughput AES Chips Using Fully Pipelined Architecture," Conference Proceedings MITA 2008, pp. 282-285, 2008.
  • Hee Yong Yang, Soon Dong Park, Mun-Kyu Lee and Dong Kyue Kim, "Efficient Implementation of Compact AES Hardware Modules on FPGA," Conference Proceedings MITA 2008, pp. 404-407, 2008.
  • Namhee Kim, H.L. Obeyesekara, and Dong Kyue Kim, "Comparisons of True and Pseudo Random Number Testing," Conference Proceedings MITA 2008, pp. 459-462, 2008.
  • Bong-Joo Jang, Suk-Hwan Lee, Seung-Seob Park, Young-Deuk Moon, Eung-Joo Lee Dong-Kyue Kim, and Ki-Ryong Kwon, "Postprocessing algorithm for Compressed Images in Multiscale Edge Detection," Proceedings of 14th Korea-Japan Joint Workshop on Frontiers of Computer Vision(FCV2008), pp. 290-295, 2008.
  • Soon Dong Park, Seung Ho Cheong, Jung-Ki Min, Young-Hwan Kim and Dong Kyue Kim, "Efficient OTP(One Time Password) Generation Using AES-Based MAC," Proceedin g of the 2007 International Conference on Multimedia, Information Technology and its Applications, pp. 284-287, 2007.
  • Hankook Jang, Jae Seong Lee, Dae-Hyun Yoo, Sang Hwa Chung, and Dong Kyue Kim, "Integrate Embodiment of TCP/IP Offload Engine and IPSec Hardware Modules," 2nd ICUT Proceeding, pp. 735-740, 2007.
  • Jae Seong Lee, Lee Mun-kyu and Dong Kyue Kim, "Performance Analysis Of Internet Key Exchange Protocols On Embedded Systems," Proceeding of the 2007 International Conference on Multimedia, Information Technology and its Applications, pp. 280-283, 2007.
  • Dong Kyue Kim, Joong Chae Na, Jeong Seop Sim and Kunsoo Park, "A Simple Merging for Constructing Two-Dimensional Suffix Trees in Linear Time," KOREA-JAPAN Joint Workshop on Algorithms and Computation, vol.10, pp. 142-150, 2007.
  • Suk-Hwan Lee, Seong-Geun Kwon, Bong-Ju Jang, Ji-Hoon Kim, Ki-Ryong Kwon and Dong kyue Kim, "3D Animation Watermarking Scheme Using Orientation Interpolator," Proceeding of ICME 2007, pp. 1223-1226, 2007.
  • Jeong Seop Sim, Mun-Kyu Lee, Ki-Ryoung Kwon, and Dong Kyue Kim, "Dynamic Addition Chains Using DAGs and Suffix Trees," Proceeding of ICUT, pp. 71-79, 2007
  • Dong Kyue Kim and Mun-Kyu Lee, "A Computational Model For Modular Exponentiation Using Graph Representation," Proceeding of the 2006 International Conference on Multimedia, Information Technology and its Applications, pp. 487-490, 2006.
  • Chi Seong Park, Minhwan Kim, Heejin Park, and Dong Kyue Kim, "Comparisons of Practical Performance for Constructing Compressed Suffix Arrays," JAPAN-KOREA Joint Workshop on Algorithms and Computation, vol.9, pp. 87-94, 2006.