B
Bon-Seok Koo
Researcher at Electronics and Telecommunications Research Institute
Publications - 7
Citations - 674
Bon-Seok Koo is an academic researcher from Electronics and Telecommunications Research Institute. The author has contributed to research in topics: Encryption & Block cipher. The author has an hindex of 2, co-authored 7 publications receiving 606 citations. Previous affiliations of Bon-Seok Koo include Center for Information Security Technologies.
Papers
More filters
Book ChapterDOI
HIGHT: a new block cipher suitable for low-resource device
Deukjo Hong,Jaechul Sung,Seokhie Hong,Jongin Lim,Sangjin Lee,Bon-Seok Koo,Changhoon Lee,Donghoon Chang,Jesang Lee,Kitae Jeong,Hyun Kim,Jongsung Kim,Seongtaek Chee +12 more
TL;DR: This paper proposes a new block cipher HIGHT with 64-bit block length and 128-bit key length, which provides low-resource hardware implementation, which is proper to ubiquitous computing device such as a sensor in USN or a RFID tag.
Proceedings Article
Low-cost AES Implementation for RFID tags
TL;DR: The ultra-light weight Advanced Encryption Standard (AES) processor which is suitable for RFID tags requires only 3,992 logic gates and is capable of both 128-bit encryption and decryption.
Proceedings Article
High-Speed FPGA Implementation of SATA HDD Encryption Device based on Pipelined Architecture
TL;DR: The proposed processor mainly consists of two blocks: the first block processes XTS-AES block cipher which is the IEEE P1619 standard of storage media encryption and the second block executes the interface between SATA Host and Device (HDD).
Proceedings Article
Design of an Efficient AES-ARIA Processor using Resource Sharing Technique
TL;DR: This paper addresses the first efficient unified hardware architecture of AES and ARIA, and shows the implementation results with 0.25um CMOS library.
Patent
Apparatus and method for encrypting hard disk
Jeong-Seok Lim,Bon-Seok Koo,Soo-Hyeon Kim,Hyo-won Kim,Jung Hyung Park,Kwang-Mo Yang,Jae-Woo Han,Choon-Soo Kim,E-Joong Yoon +8 more
TL;DR: An apparatus and method for encrypting a hard disk is described in this article, which includes a program management unit, an Internet Protocol (IP) management unit and an encryption processing unit.