Y
Yongdae Kim
Researcher at KAIST
Publications - 218
Citations - 7694
Yongdae Kim is an academic researcher from KAIST. The author has contributed to research in topics: Computer science & Cryptography. The author has an hindex of 41, co-authored 181 publications receiving 6745 citations. Previous affiliations of Yongdae Kim include University of Southern California & University of California.
Papers
More filters
Proceedings ArticleDOI
Simple and fault-tolerant key agreement for dynamic collaborative groups
TL;DR: This work investigates a novel approach to group key agreement by blending binary key trees with DiAEe-Hellman key exchange, resulting in a protocol suite that is very simple, secure and fault-tolerant.
Journal ArticleDOI
Tree-based group key agreement
TL;DR: This work investigates a novel group key agreement approach which blends key trees with Diffie--Hellman key exchange and yields a secure protocol suite called Tree-based Group Diffie-Hellman (TGDH) that is both simple and fault-tolerant.
Proceedings ArticleDOI
Ghost Talk: Mitigating EMI Signal Injection Attacks against Analog Sensors
Denis Foo Kune,J. Backes,Shane S. Clark,Daniel B. Kramer,Matthew R. Reynolds,Kevin Fu,Yongdae Kim,Wenyuan Xu +7 more
TL;DR: This work measures the susceptibility of analog sensor systems to signal injection attacks by intentional, low-power emission of chosen electromagnetic waveforms, and proposes defense mechanisms to reduce the risks.
Proceedings Article
Rocking drones with intentional sound noise on gyroscopic sensors
Yunmok Son,Hocheol Shin,Dongkwan Kim,Youngseok Park,Juhwan Noh,Kibum Choi,Jung-Woo Choi,Yongdae Kim +7 more
TL;DR: This paper investigated whether an adversary could incapacitate drones equipped with Micro-Electro-Mechanical Systems (MEMS) gyroscopes using intentional sound noise to disrupt the operation of drones.
Book ChapterDOI
Communication-efficient group key agreement
TL;DR: A key agreement protocol previously proposed by Steer et al. is resurrected and extended to handle dynamic groups and network failures such as network partitions and merges and provides key independence, i.e. a passive adversary who knows any proper subset of group keys cannot discover any other group keys not included in the subset.