Jon-Lark Kim
Sogang University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Jon-Lark Kim.
International Journal of Information and Coding Theory | 2017
Steven T. Dougherty; Jon-Lark Kim; Buket Ozkaya; Lin Sok; Patrick Solé
Linear Complementary Dual codes (LCD) are binary linear codes that meet their dual trivially. We construct LCD codes using orthogonal matrices, self-dual codes, combinatorial designs and Gray map from codes over the family of rings
IEEE Transactions on Information Theory | 2014
Yeow Meng Chee; Zouha Cherif; Jean-Luc Danger; Sylvain Guilley; Han Mao Kiah; Jon-Lark Kim; Patrick Solé; Xiande Zhang
R_k
IEEE Transactions on Information Theory | 2014
Claude Carlet; Finley Freibert; Sylvain Guilley; Michael Kiermaier; Jon-Lark Kim; Patrick Solé
. We give a linear programming bound on the largest size of an LCD code of given length and minimum distance. We make a table of lower bounds for this combinatorial function for modest values of the parameters.
Cryptography and Communications | 2018
Lucky Galvez; Jon-Lark Kim; Nari Lee; Young Gun Roe; Byung-Sun Won
We introduce the class of multiply constant-weight codes to improve the reliability of certain physically unclonable function response, and extend classical coding methods to construct multiply constant-weight codes from known (q) -ary and constant-weight codes. We derive analogs of Johnson bounds and give constructions showing these bounds to be asymptotically tight up to a constant factor under certain conditions. We also examine the rates of multiply constant-weight codes and demonstrate that these rates are the same as those of constant-weight codes of corresponding parameters.
international symposium on information theory | 2013
Zouha Cherif; Jean-Luc Danger; Sylvain Guilley; Jon-Lark Kim; Patrick Solé
We introduce complementary information set codes of higher order. A binary linear code of length tk and dimension k is called a complementary information set code of order t (t-CIS code for short) if it has t pairwise disjoint information sets. The duals of such codes permit to reduce the cost of masking cryptographic algorithms against side-channel attacks. As in the case of codes for error correction, given the length and the dimension of a t-CIS code, we look for the highest possible minimum distance. In this paper, this new class of codes is investigated. The existence of good long CIS codes of order 3 is derived by a counting argument. General constructions based on cyclic and quasi-cyclic codes and on the building up construction are given. A formula similar to a mass formula is given. A classification of 3-CIS codes of length ≤ 12 is given. Nonlinear codes better than linear codes are derived by taking binary images of Z4-codes. A general algorithm based on Edmonds basis packing algorithm from matroid theory is developed with the following property: given a binary linear code of rate 1/t, it either provides t disjoint information sets or proves that the code is not t-CIS. Using this algorithm, all optimal or best known [tk, k] codes, where t = 3, 4, . . . , 256 and 1≤ k ≤⌊256/t⌋ are shown to be t-CIS for all such k and t, except for t = 3 with k = 44 and t = 4 with k = 37.
Finite Fields and Their Applications | 2012
Stefka Bouyuklieva; Nikolay Yankov; Jon-Lark Kim
A linear code with a complementary dual (or An LCD code) is defined to be a linear code C whose dual code C⊥ satisfies C ∩ C⊥= 0
Designs, Codes and Cryptography | 2015
Steven T. Dougherty; Jon-Lark Kim; Yoonjin Lee
left { mathbf {0}right }
Finite Fields and Their Applications | 2014
Finley Freibert; Jon-Lark Kim
. Let LD (n, k) denote the maximum of possible values of d among [n, k, d] binary LCD codes. We give the exact values of LD (n, k) for k = 2 for all n and some bounds on LD (n, k) for other cases. From our results and some direct search we obtain a complete table for the exact values of LD (n, k) for 1 ≤ k ≤ n ≤ 12. As a consequence, we also derive bounds on the dimensions of LCD codes with fixed lengths and minimum distances.
Applicable Algebra in Engineering, Communication and Computing | 2013
Finley Freibert; Jon-Lark Kim
The function M(m, n, d, w), the largest size of an unrestricted binary code made of m by n arrays, with constant row weight w, and minimum distance d is introduced and compared to the classical functions of combinatorial coding theory Aq(n, d) and A(n, d, w). The analogues for systematic codes of A(n, d) and A(n, d, w) are introduced apparently for the first time. An application to the security of embedded systems is given: these codes happen to be efficient challenges for physically unclonable functions.
public key cryptography | 2018
Jon-Lark Kim; Lucky Galvez; Young-Sik Kim; Nari Lee
The purpose of this paper is to complete the classification of binary self-dual [48,24,10] codes with an automorphism of odd prime order. We prove that if there is a self-dual [48, 24,10] code with an automorphism of type p-(c,f) with p being an odd prime, then p = 3,c = 16,f = 0. By considering only an automorphism of type 3-(16,0), we prove that there are exactly 264 inequivalent self-dual [48,24,10] codes with an automorphism of odd prime order, equivalently, there are exactly 264 inequivalent cubic self-dual [48,24,10] codes.